PLANNING AND BUILDING QUALIFIABLE EMBEDDED SYSTEMS: SAFETY AND RISK PROPERTIES ASSESSMENT FOR A LARGE AND COMPLEX SYSTEM WITH EMBEDDED SUBSYSTEMS
|
|
- Ethelbert Porter
- 5 years ago
- Views:
Transcription
1 PLANNING AND BUILDING QUALIFIABLE EMBEDDED SYSTEMS: SAFETY AND RISK PROPERTIES ASSESSMENT FOR A LARGE AND COMPLEX SYSTEM WITH EMBEDDED SUBSYSTEMS Nuno Silva (1), Rui Lopes (1), Ricardo Barbosa (1) (1) Critical Software, S.A., Parque Industrial de Taveiro, Lote 48, Coimbra, Portugal, {nsilva, rmlopes, rbarbosa}@criticalsoftware.com ABSTRACT Systems based on embedded components and applications are today used in all markets. They are planned and developed by all types of institutions with different types of background experience, multidisciplinary teams and all types of capability and maturity levels. Organisational/engineering maturity has an impact on all aspects of the engineering of large and complex systems. An embedded system is a specific computer system designed to perform one or more dedicated functions, usually with real-time constraints. It is generally integrated as part of a more complex device typically composed of specific hardware such as sensors and actuators. This article presents an experimented technique to evaluate the organisation, processes, system and software engineering practices, methods, tools and the planned/produced artefacts themselves, leading towards certification/qualification. The safety and risk assessment of such core and complex systems is explained, described on a step-bystep manner, while presenting the main results and conclusions of the application of the technique to a real case study. 1. INTRODUCTION Systems based on embedded components and applications are today used in all markets. They are planned and developed by all types of institutions with different types of background experience, multidisciplinary teams and all types of capability and maturity levels. Organisational/engineering maturity has an impact on all aspects of the engineering of large and complex systems. An embedded system is a specific computer system designed to perform one or more dedicated functions, usually with real-time constraints. It is generally integrated as part of a more complex device typically composed of specific hardware such as sensors and actuators. This article presents an experimented technique to evaluate the organisation, processes, system and software engineering practices, methods, tools and the planned/produced artefacts themselves, leading towards certification/qualification. The safety and risk assessment of such core and complex systems is explained, described on a step-by-step manner, while presenting the main results and conclusions of the application of the technique to a real case study. The implementation of a proper risk and safety management strategy is essential to guarantee the success in any project. Moreover, quantification, monitoring, control and acting upon the dynamic behavior of risks and the dynamicity of projects shall always be accomplished for the whole project duration. According to good practices of Project Management Institute (PMI), about 10% of the overall project budget should be accounted for risks (or will somehow be related to it). Also, it is quite common to use around 2% for non-quantified risks (either not registered or with low probability and impact). This work has been made possible with support from the CRITICAL STEP project [1]. 2. SAFETY AND RISK MANAGEMENT There are several types of safety concerns, and innumerous types of risks, the current work will focus on embedded systems safety concerns and related projects risks. They are tightly related, since the project risks and safety properties shall be identified, monitored and controlled all along the project duration and during operations and maintenance of the system, being it a simple embedded system or a complex system with embedded components. From this moment on we include the safety management in the risk management process and the safety properties assessment in the risk assessment process. 2.1 Risk Management Plan The Project Manager (PM) shall undertake risk management jointly with key project personnel on a periodic and consistent basis. The main steps for risk management include risk identification, risk analysis and risk response planning. Risk identification involves determining which risks might affect the project or the system safety and documenting their characteristics. The PM shall carry out these activities during the regular project meetings
2 and shall record the potential risks in the Risk Record Database. But the risks and hazards shall also be identified during the project planning and construction. Risk analysis evaluates the impact and likelihood of identified risks. The PM, with the assistance of the project members who can best contribute to the evaluation, assess the impact of the risks on cost, schedule, scope, and quality, the probability of its occurrence and where, in the project structure, they might have impact. This process prioritizes risks according to their potential effect on project objectives. The Risk Record Database shall be updated with the analysis information collected during this process. Risk response planning is the process of determining actions or decisions that will reduce the probability or the impact of each risk event. The PM shall propose such actions/decisions which shall be included in the AIL (Action Item List) when approved. 2.2 Risk Management for the case study Large and complex systems composed by embedded systems or relying on embedded components have specific characteristics that highlight the importance of proper Safety and Risk Management. For the specific case of this study we identify: Past similar projects (lessons learned, unexpected delays, extra effort associated, etc); The case study will not be feasible if similar delays and extra effort is required; The case study will be several times more complex than previous similar projects, using new technologies in which the project team has limited experience; Early identification of project's risks allows planning of preventive actions and implementation of proper management activities in order to mitigate the probability of delays and extra effort. 2.3 Advantages of having Risk Management process in place The main advantages of having a Safety and Risk Management process in place for the case study are identified hereafter: Preventive actions: By identifying the projects risks, the project management is able to plan, and execute if necessary, preventive actions in order to avoid or mitigate the impact of risks consequences in the project; Timely adaptation of project management: Management activities may be created or modified in order to address identified risks, increasing the ability to: o Increase monitoring and control: Risks monitoring allow to request and access information that provide increased monitoring and control over the projects activities. The access to this information may result in further risks identification, contributing to mitigate unexpected events that have impact on projects activities. Monitoring and control allows to: Track the evolution of events that lead to the identified risks; Avoid the events leading to the identified risks; o Mitigation of the probability of project delays and extra effort. Risk Management leads to the implementation of several changes in project management practices and execution of preventive actions with impact in other areas (e.g. engineering, validation, quality assurance). By implementing new activities for risk mitigation, there is always the possibility of new risks being identified by the implementation of these activities. This possibility highlights the importance of classifying the risks according to probability and criticality. A mitigation action shall only be implemented if the associated risks of implementing it have a lower probability/impact than the risk that is being mitigated. 3. RISK REGISTER In order to perform a proper risk identification and assessment, risks shall be correctly defined and classified according to their specific characteristics. Each identified risk shall be defined according to fields such as the ones described in Table 1, used for the current case study.
3 Field Risk ID Risk Statement Probability Impact Impact On Priority Cost Impact Category Table 1: Risk definition fields Description Unique ID for risk identification (e.g. RSK001) Description of the risk. This field shall contain: Risk title Risk description Consequence if risk takes place Likelihood of occurrence. Categorised as: Low (1) Medium (2) High (4) Impact that the consequences if risk takes place has in the project. Categorised as: Low (1) Medium (2) High (4) Indicates the variable impacted by the risk consequence. Categorised as: Budget Schedule Effort Quality Priority ranking of the risk. Calculated based on the "Probability" and "Impact". The highest priority risk shall have priority 16 (4x4, high probability and high impact) and the lowest 1 (1x1, low probability and low impact). Represents the perceived cost of the risk at the instant of evaluation. Can be estimated in: Effort Monetary value Identify which area is risk impacting if it occurs. Hereafter is presented as an example a set of areas that can be used. This shall be tailored according to the project needs. Requirements Risk Response Mitigation strategy Mitigation risks Risk status Status date Assigned To Closing rationale Date identification Design Code and Unit Test Integration and Test Eng. Specialties Develop. Process Develop. System Management Process Management Methods Work Environment Resources Contract Program Interfaces ID of the actions that have been identified to mitigate the risk. The selected strategy for mitigating the risk. IDs of the risks that have been created by the implementation of the "Mitigation strategy" (if any). Running status that provides a history of what is being done for the risk and changes in the risk. Categorised as: Identified Dismissed Monitored Occurred Identify the date corresponding to the latest change in the risk status. The person responsible for mitigating the risk. Rationale for risk closure, when risk becomes Dismissed or Occurred. Date in which the risk has been identified. 4. RESULTS SUMMARY AND CONCLUSIONS This section presents the results summary of the risk assessment performed in the scope of the case study. Table 2 provides the risk classification according to a specific set of categories while Table 3 presents an overview of the risks source.
4 Table 2: Risks categories results Category Score Requirements 5 Design 1 Code and Unit Test 2 Integration and Test 4 Eng. Specialties 4 Develop. Process 3 Develop. System 2 The risks identified part of the main areas of concern represent almost 60% (21 of 36) of the total number of risks for this case study. Management Process 4 Management Methods 2 Work Environment 2 Resources 1 Contract 4 Program Interfaces 2 Total 36 Source Table 3: Risks source results Internal 24 External 12 Total 36 Score For the case study where the safety and risk assessment activities have been performed, risks have been identified in all possible categories. Nonetheless, there are some categories that can be highlighted as main areas of concern regarding the specific case study, namely: Requirements Integration and Test Engineering specialties Management process Contract Figure 1: Risks by criticality Figure 1 shows that 49% of the risks have been classified within the "red zone", which indicates that almost half of the risks should be dealt as soon as possible. This classification is based on the risk probability of becoming real and the impact of its consequences. The percentage of "red zone" risks indicates that the case study responsible should act immediately upon the identified risks and maintain a detailed Risk Register throughout the entire project lifecycle. From all the risks with high priority (i.e. inside de red zone ), 12 out of a total of 17 are part of the referred main areas of concern. Therefore by focusing, at an initial stage, on the identified main areas of concern, one is mitigating risks that are both high priority (i.e. high probability and high impact) and affecting the most vulnerable areas of the project. One shall highlight that, by implementing mitigating actions, new risks might be identified related to this implementation. A careful analysis shall be performed regarding the potential risks of implementing each mitigating action. In order to implement an action, the new associated risks shall have less impact and probability than the risk being mitigated. 5. RISK COST/BENEFIT ANALYSIS This section presents a cost/benefit analysis between the identified risks and the associated mitigating actions. In order to perform this analysis, risks cost impact has been estimated, as well as the cost of mitigating actions.
5 5.1 Cost Impact It is necessary to quantify the impact of the identified risks if not mitigated against the cost of mitigation activities. Quantifying the risks impact on the project before the start of the project is always an academic exercise and shall be evaluated as such. The quantification performed has been based on Critical Software experience on past projects and do not reflect any current impact on the project or case study. The following process has been used to reach the rough estimation for risk cost impact (time impact has not been analyzed): all risks have been identified and detailed; a few of the smallest risks (easier to quantify) have been quantified according to experience; a composition of probability versus impact has been used to grade all the risks; based on this composition all risks have been proportionally quantified; a meeting has been held to discuss the value reached by each risk and to make adaptations according to expert judgment, both from Critical Software and the customer. As expected, some of the risks were very hard to quantify since its impact may vary according to several factors. Nonetheless, the figures reached have been estimated through a conservative approach. This means that the real value would probably be higher than the one presented to the customer. The total cost impact will only become real if all risks would occur. Although this appears to be highly improbable, one shall underline that the majority of the risks identified have become real in past projects of that customer. This indicates that the probability of a considerable number of the risks becoming real is high. 5.2 Mitigation activities All the risks have been analyzed and mitigating actions have been identified. One shall highlight that the identified actions are not strictly related to V&V activities. There were several risks with more than one mitigating action identified, not all related to V&V activities and there were also risks not mitigated by V&V activities. Two thirds (24 risks, 67%) of the identified risks could be mitigated by V&V related actions, which demonstrates the impact that V&V activities can have naturally in risk mitigation. Therefore, V&V activities cost impact has been analyzed for the cost/benefit analysis for this case study (and compared to the sum of risk cost of all risks that are mitigated by V&V activities). Besides the high number or risks addressed by the V&V activities, one shall highlight that the same V&V activity is able to address several risks at the same time. By performing a single V&V activity, several risks are mitigated which highlights the activities effectiveness and added value. The mitigation capability of the V&V activities is also different from risk to risk. 5.3 Costs and effectiveness V&V costs are mainly driven by the size of the SW to be analyzed. The project estimates are still high-level, at this stage of the case study. Nonetheless, the project development is planned to be executed in a large amount of years due to the embedded systems complexity and number of components. Since the considered V&V activities follow the entire SW development process, V&V costs have been estimated taking in consideration the following assumptions: V&V activities shall last for the full duration of the project (following the entire SW development process) On average, one engineer shall be allocated to the V&V activities at customer premises Another important metric is the effectiveness of V&V activities in mitigating risks. According to industry assumptions, V&V activities are able to identify and solve between 80% and 90% of the SW issues. Taking a conservative approach, the V&V activities have been considered to have an effectiveness of 80% in this analysis. 5.4 Cost/Benefits Conclusions Hereafter are presented the results of the cost/benefit analysis, taking in consideration the cost estimates deducted from the activities of the previous subsections. The following assumptions shall be taken into account: No other mitigating actions besides V&V related actions are being considered for this analysis;
6 V&V related mitigating action have the same effectiveness in all risks (reduce 80% of the risk cost); Not all risks are mitigated by V&V related actions. Finally, by taking the estimation of the identified risks and their possible impact in terms of extra cost, delays, or safety issues and by comparing with the simple V&V mitigation actions the project concluded that a reduction of 40% of costs would be possible. The estimation for the effectiveness of the V&V activities was estimated at around 50%. 6. ACKNOWLEDGMENT This work has been partially supported by the project CRITICAL Software Technology for an Evolutionary Partnership (CRITICAL-STEP, Marie Curie Industry-Academia Partnerships and Pathways (IAPP) number , within the context of the EU Seventh Framework Programme (FP7). 7. REFERENCES 1. Critical Step website,
Project Theft Management,
Project Theft Management, by applying best practises of Project Risk Management Philip Rosslee, BEng. PrEng. MBA PMP PMO Projects South Africa PMO Projects Group www.pmo-projects.co.za philip.rosslee@pmo-projects.com
More informationRisk Management Plan for the <Project Name> Prepared by: Title: Address: Phone: Last revised:
for the Prepared by: Title: Address: Phone: E-mail: Last revised: Document Information Project Name: Prepared By: Title: Reviewed By: Document Version No: Document Version Date: Review Date:
More information12 GeV CEBAF Upgrade. Risk Management Plan
12 GeV CEBAF Upgrade Risk Management Plan May 29, 2007 12 GeV CEBAF Upgrade Risk Management Plan 1 Apr 05 ISSUE DATE PAGES AFFECTED DESCRIPTION Original CD-2 4/01/05 5/29/07 All All General update to maintain
More informationRisk Management FUN! Humor Me
Risk Management FUN! Humor Me Leveraging Project Risk Management to Solidify Your RIM Business Continuity P R E S E N T E D B Y : M A R Y L. C L I N T O N, M B A, P M P W E D N E S D A Y, J U N E 2 1,
More informationRisk Management Plan Project Name: Version 1.0 Date: dd/mm/yyyy
Risk Management Plan Project Name: Version 1.0 Date: dd/mm/yyyy Contents DOCUMENT OVERVIEW... 3 RISK METHODOLOGY... 3 RISK IDENTIFICATION... 3 Risk Categories... 3 RISK ANALYSIS... 4 RISK RESPONSE PLANNING...
More informationCase Study. IR-SIP Risk Management Plan Outline
Case Study IR-SIP Risk Management Plan Outline Baselined: Last Modified: Owner: Purpose: Section 1. Introduction 1.1 Purpose and Scope 1.2 Assumptions, Constraints, and Policies 1.3 Related Documents and
More informationINSE 6230 Total Quality Project Management
INSE 6230 Total Quality Project Management Lecture 6 Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding to risk throughout the life of a project
More informationTitle of the Paper: Integrating Management and cost management to arrive at a realistic Estimate at Completion Theme: Project Management leadership -> To accelerate Economic Growth Keywords: Cost overrun,
More informationGuidelines on PD estimation, LGD estimation and the treatment of defaulted exposures
Guidelines on PD estimation, LGD estimation and the treatment of defaulted exposures European Banking Authority (EBA) www.managementsolutions.com Research and Development December Página 2017 1 List of
More informationProject Selection Risk
Project Selection Risk As explained above, the types of risk addressed by project planning and project execution are primarily cost risks, schedule risks, and risks related to achieving the deliverables
More informationHUBTOWN LIMITED REVISED RISK MANAGEMENT POLICY. (Effective from December 1, 2015)
HUBTOWN LIMITED REVISED RISK MANAGEMENT POLICY (Effective from December 1, 2015) HUBTOWN LIMITED REVISED RISK MANAGEMENT POLICY TABLE OF CONTENTS SR. NO. PARTICULARS PAGE NO. 1. Introduction 1 2. Preamble
More informationSlide 3: What are Policy Analysis and Policy Options Analysis?
1 Module on Policy Analysis and Policy Options Analysis Slide 3: What are Policy Analysis and Policy Options Analysis? Policy Analysis and Policy Options Analysis are related methodologies designed to
More informationAPPENDIX 1. Transport for the North. Risk Management Strategy
APPENDIX 1 Transport for the North Risk Management Strategy Document Details Document Reference: Version: 1.4 Issue Date: 21 st March 2017 Review Date: 27 TH March 2017 Document Author: Haddy Njie TfN
More informationANNEX 15 of the Commission Implementing Decision on the 2015 Annual Action programme for the Partnership Instrument
ANNEX 15 of the Commission Implementing Decision on the 2015 Annual Action programme for the Partnership Instrument Action Fiche for EU- Brazil Sector Dialogues Support Facility 1. IDENTIFICATION Title
More informationInformation Technology Project Management, Sixth Edition
Management, Sixth Edition Prepared By: Izzeddin Matar. Note: See the text itself for full citations. Understand what risk is and the importance of good project risk management Discuss the elements involved
More informationAcceptance criteria for external rating tool providers in the Eurosystem Credit Assessment Framework
Acceptance criteria for external rating tool providers in the Eurosystem Credit Assessment Framework 1 Introduction The Eurosystem credit assessment framework (ECAF) defines the procedures, rules and techniques
More informationManaging Project Risk DHY
Managing Project Risk DHY01 0407 Copyright ESI International April 2007 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or
More informationGuidelines on PD estimation, LGD estimation and the treatment of defaulted exposures
EBA/GL/2017/16 23/04/2018 Guidelines on PD estimation, LGD estimation and the treatment of defaulted exposures 1 Compliance and reporting obligations Status of these guidelines 1. This document contains
More informationCrowe, Dana, et al "EvaluatingProduct Risks" Design For Reliability Edited by Crowe, Dana et al Boca Raton: CRC Press LLC,2001
Crowe, Dana, et al "EvaluatingProduct Risks" Design For Reliability Edited by Crowe, Dana et al Boca Raton: CRC Press LLC,2001 CHAPTER 13 Evaluating Product Risks 13.1 Introduction This chapter addresses
More informationHow to Compile and Maintain a Risk Register
How to Compile and Maintain a Risk Register Management of (negative) risks is fundamentally a simple process that consists of identifying something that can happen, what its consequences are, what your
More informationAn Investigative Study of Risk Management Practices of Major U.S. Contractors
An Investigative Study of Risk Management Practices of Major U.S. Contractors Musibau SHOFOLUWE & Tesfa BOGALE Department of Construction Management & Occupational Safety & Health North Carolina Agricultural
More information1. Define risk. Which are the various types of risk?
1. Define risk. Which are the various types of risk? Risk, is an integral part of the economic scenario, and can be termed as a potential event that can have opportunities that benefit or a hazard to an
More informationProject Title: INFRASTRUCTURE AND INTEGRATED TOOLS FOR PERSONALIZED LEARNING OF READING SKILL
Project Title: INFRASTRUCTURE AND INTEGRATED TOOLS FOR PERSONALIZED LEARNING OF READING SKILL Project Acronym: Grant Agreement number: 731724 iread H2020-ICT-2016-2017/H2020-ICT-2016-1 Subject: Dissemination
More informationTHE METHODOLOGY OF PROJECT MANAGEMENT OF SOFTWARE DEVELOPMENT AT THE NATIONAL BANK OF SERBIA
Impact of Internet on Business activities in Serbia and Worldwide Uticaj Interneta na poslovanje u Srbiji i svetu doi: 10.15308/SInteZa-2014-530-536 THE METHODOLOGY OF PROJECT MANAGEMENT OF SOFTWARE DEVELOPMENT
More informationThere are many definitions of risk and risk management.
Definition of risk There are many definitions of risk and risk management. The definition set out in ISO Guide 73 is that risk is the effect of uncertainty on objectives. In order to assist with the application
More informationRisk Management: Assessing and Controlling Risk
Risk Management: Assessing and Controlling Risk Introduction Competitive Disadvantage To keep up with the competition, organizations must design and create a safe environment in which business processes
More informationProject Management and Scheduling
Question 1: What are the triple constraints of project management? Answer 1: The triple constraints deal with the time, cost, and scope of a project. Time is the duration between the project start and
More informationEarning Value From Risk
Earning Value From Risk Ron Higuera March 1999 rph@cise.cmu.edu Agenda Overview Earned Value Overview Risk Management Investment Strategy Summary 2 Presentation Objective Relate risk management and earned
More informationMaster Class: Construction Health and Safety: ISO 31000, Risk and Hazard Management - Standards
Master Class: Construction Health and Safety: ISO 31000, Risk and Hazard Management - Standards A framework for the integration of risk management into the project and construction industry, following
More informationBERGRIVIER MUNICIPALITY. Risk Management Risk Appetite Framework
BERGRIVIER MUNICIPALITY Risk Management Risk Appetite Framework APRIL 2018 1 Document review and approval Revision history Version Author Date reviewed 1 2 3 4 5 This document has been reviewed by Version
More informationVersion: th November 2010 RISK MANAGEMENT POLICY
Version: 1.2-25th November 2010 RISK MANAGEMENT POLICY Document History Document Location To be completed. Revision History Date of this revision: 17/09/2010 Date of next revision: N/A Revision Number
More informationRisk Management Plan for the Ocean Observatories Initiative
Risk Management Plan for the Ocean Observatories Initiative Version 1.0 Issued by the ORION Program Office July 2006 Joint Oceanographic Institutions, Inc. 1201 New York Ave NW, Suite 400, Washington,
More informationRISK M A N A G E M E N T P L A N
CONTENTS LEARNING OUTCOMES... 2 INTRODUCTION... 3 RISK DEFINITION OVERVIEW... 3 RISK MANAGEMENT ROLES AND RESPONSIBILITIES... 3 RISK MANAGEMENT APPROACH... 4 RISK IDENTIFICATION... 4 RISK QUALIFICATION
More informationRisk and Risk Management. Risk and Risk Management. Martin Schedlbauer, Ph.D., CBAP, OCUP Version 1.1
Risk and Risk Management Risk and Risk Management Martin Schedlbauer, Ph.D., CBAP, OCUP m.schedlbauer@neu.edu Version 1.1 Risk and Risk Management Copyright 2012 by Martin Schedlbauer ALL RIGHTS RESERVED.
More informationEuropean Railway Agency Recommendation on the 1 st set of Common Safety Methods (ERA-REC SAF)
European Railway Agency Recommendation on the 1 st set of Common Safety Methods (ERA-REC-02-2007-SAF) The Director, Having regard to the Directive 2004/49/EC 1 of the European Parliament, Having regard
More informationMODULE 5 PROJECT RISK MANAGEMENT, PROCUREMENT AND CONTRACTS
Advanced Project Management MODULE 5 PROJECT RISK MANAGEMENT, PROCUREMENT AND CONTRACTS 06 07 November 2018 Facilitator: Mr Mondli Mbambo Module Purpose Project Risk & Procurement Managment Knowledge Risk
More informationA Statistical Analysis to Predict Financial Distress
J. Service Science & Management, 010, 3, 309-335 doi:10.436/jssm.010.33038 Published Online September 010 (http://www.scirp.org/journal/jssm) 309 Nicolas Emanuel Monti, Roberto Mariano Garcia Department
More informationUnderstanding the customer s requirements for a software system. Requirements Analysis
Understanding the customer s requirements for a software system Requirements Analysis 1 Announcements Homework 1 Correction in Resume button functionality. Download updated Homework 1 handout from web
More informationRisk Analysis Risk Management
Risk Analysis Risk Management References: T. Lister, Risk Management is Project Management for Adults, IEEE Software, May/June 1997, pp 20 22. M.J. Carr, Risk management May Not Be for Everyone, IEEE Software,
More informationWe will begin the web conference shortly. When you arrive, please type the phone number from which you are calling into the chat field.
Welcome We will begin the web conference shortly. When you arrive, please type the phone number from which you are calling into the chat field. To login to the audio portion of the web conference, dial
More informationRESERVE BANK OF MALAWI
RESERVE BANK OF MALAWI GUIDELINES ON INTERNAL CAPITAL ADEQUACY ASSESSMENT PROCESS (ICAAP) Bank Supervision Department March 2013 Table of Contents 1.0 INTRODUCTION... 2 2.0 MANDATE... 2 3.0 RATIONALE...
More informationRisk Management Strategy
Risk Management Strategy 2016 2019 Version: 6 Policy Lead/Author & Deputy Director of Quality position: Ward / Department: Nursing Directorate Replacing Document: Version 5 Approving Committee Quality
More informationMILA SULLIVAN PROCUREMENT CONSULTANT
INTERNATIONAL CONFERENCE ON PUBLIC PRIVATE PARTNERSHIPS AND PUBLIC PROCUREMENT 2017 BLED, SLOVENIA MILA SULLIVAN PROCUREMENT CONSULTANT MILA@DAXPARTNERSHIP.COM FINE TUNING OF OBJECTIVES & RISKS SIGNIFICANT
More informationGP Global Ltd Tel.: Fax:
Newsletter 6 June 2009 Compliance / Fraud / Anti Money Laundering Newsletter Introduction In this newsletter we will present the topic Important measures and procedures that a Financial Organisation (Investment
More informationFundamentals of Project Risk Management
Fundamentals of Project Risk Management Introduction Change is a reality of projects and their environment. Uncertainty and Risk are two elements of the changing environment and due to their impact on
More informationCEIOPS-DOC-61/10 January Former Consultation Paper 65
CEIOPS-DOC-61/10 January 2010 CEIOPS Advice for Level 2 Implementing Measures on Solvency II: Partial internal models Former Consultation Paper 65 CEIOPS e.v. Westhafenplatz 1-60327 Frankfurt Germany Tel.
More informationCONSTRUCTION ENGINEERING & TECHNOLOGY: EMV APPROACH AS AN EFFECTIVE TOOL
CONSTRUCTION ENGINEERING & TECHNOLOGY: EMV APPROACH AS AN EFFECTIVE TOOL Dr Suwarna Torgal Assistatnt Professor, IET, DAVV, Indore ( M P ) ABSTRACT There are many risks events that adversely affect the
More informationFonds de Compensation FDC SICAV Obligations EUR Actif 3
Fonds de Compensation FDC SICAV Obligations EUR Actif 3 Sustainable Approach March 2018 Amundi Sustainable Approach Sustainable and Responsible Investing has been a long standing and essential part of
More informationSAB 74 DISCLOSURE ANALYSIS FOR LEASE ACCOUNTING
SAB 74 DISCLOSURE ANALYSIS FOR LEASE ACCOUNTING Top 100 US Public Companies Ranked By Leasing Obligations ASC 842 LEASE ACCOUNTING STANDARDS TABLE OF CONTENTS Executive Summary... 3 SAB 74 Disclosures...
More informationL U N D S U N I V E R S I T E T. Projektledning och Projektmetodik
Projektledning och Projektmetodik 1 Project Risk Management Project risk management is the art and science of identifying, assigning, and responding to risk throughout the life of a project and in the
More informationRED 2.1 & 4.2: Quantifying Risk Exposure for ORSA. Moderator: Presenters: Lesley R. Bosniack, CERA, FCAS, MAAA
RED 2.1 & 4.2: Quantifying Risk Exposure for ORSA Moderator: Lesley R. Bosniack, CERA, FCAS, MAAA Presenters: Lesley R. Bosniack, CERA, FCAS, MAAA William Robert Wilkins, ASA, CERA, FCAS, MAAA SOA Antitrust
More informationPublic-Private Partnerships in Infrastructure From Theory to Practice Astana, February 12-16, 2007
Monday, February 12, 2007 8:00 am Registration Opening Session Opening of the PPPI in Kazakhstan Workshop Welcome note from the host country representative: Mr. Aslan Musin, Minister of Economy and Budget
More informationExpenditure Forecast Methodology
Forecast Methodology Regulatory Control Period 2018-19 to 2022-23 Version 1.0 Security Classification: Public ElectraNet Corporate Headquarters 52-55 East Terrace, Adelaide, South Australia 5000 PO Box
More informationNHS North Somerset Clinical Commissioning Group Risk Management Strategy and Framework
NHS North Somerset Clinical Commissioning Group Risk Management Strategy and Framework An Integrated Risk Management Framework Clinical Risk Management Financial Risk Management Corporate Risk Management
More informationZurich Hazard Analysis (ZHA) Introducing ZHA
Introducing ZHA March 8, 2019 21st Annual Master Property Program Annual Loss Control Workshop Michael Fairfield, CSP Zurich North America - Risk Engineering Introducing ZHA Objectives After this introduction,
More informationReducing Project Lifecycle Cost with exsilentia
Reducing Project Lifecycle Cost with exsilentia Kate Hildenbrandt Iwan van Beurden exida Sellersville PA, 18960, USA khildenbrandt@exida.com January 2017 1 Abstract The international functional safety
More informationFor further information, please see online or contact
For further information, please see http://ec.europa.eu/research/sme-techweb online or contact Lieve.VanWoensel@ec.europa.eu Sixth Progress Report on participation in the 7 th R&D Framework Programme Statistical
More informationSections of the ORSA Report
Lessons Learned From Orsa Reviews Impact on Risk Focused Examination NAIC Insurance Summit INS Companies Joe Fritsch, Director INS Companies Don Carbone, Exam Manager INS Companies Sections of the ORSA
More informationProgrammatic Risk Management in Space Projects
r bulletin 103 august 2000 Programmatic Risk Management in Space Projects M. Belingheri, D. von Eckardstein & R. Tosellini ESA Directorate of Manned Space and Microgravity, ESTEC, Noordwijk, The Netherlands
More informationRisk Assessment Mitigation Phase Risk Mitigation Plan Lessons Learned (RAMP B) November 30, 2016
Risk Assessment Mitigation Phase Risk Mitigation Plan Lessons Learned (RAMP B) November 30, 2016 #310403 Risk Management Framework Consistent with the historic commitment of Southern California Gas Company
More informationInvestment Modelling at the Euro Area Level
Expert Journal of Finance (2014) 2, 26-30 2014 The Author. Published by Sprint Investify. ISSN 2359-7712 http://finance.expertjournals.com Investment Modelling at the Euro Area Level Alin OPREANA * Lucian
More informationObjectives. What is Risk? But a Plan is not Reality. Positive Risks? What do we mean by Uncertainty?
Objectives RISK MANAGEMENT What is risk? Why should risk be managed? How do we identify risk? How do we manage risk? What is Risk? Definition: An uncertain event or condition that, if it occurs, has a
More informationFinal draft RTS on the assessment methodology to authorize the use of AMA
Management Solutions 2015. All rights reserved. Final draft RTS on the assessment methodology to authorize the use of AMA European Banking Authority www.managementsolutions.com Research and Development
More informationSolvency II Detailed guidance notes for dry run process. March 2010
Solvency II Detailed guidance notes for dry run process March 2010 Introduction The successful implementation of Solvency II at Lloyd s is critical to maintain the competitive position and capital advantages
More informationRISK MANAGEMENT. Budgeting, d) Timing, e) Risk Categories,(RBS) f) 4. EEF. Definitions of risk probability and impact, g) 5. OPA
RISK MANAGEMENT 11.1 Plan Risk Management: The process of DEFINING HOW to conduct risk management activities for a project. In Plan Risk Management, the remaining FIVE risk management processes are PLANNED
More informationShort Guides to IDA Quality Assurance Guidelines. Introduction. Issue 2.0
Short Guides to IDA Quality Assurance Guidelines Introduction Issue 2.0 Short Guide Introduction Page ii TABLE OF CONTENTS 1 PREFACE...1 1.1 Purpose of this document...1 2 A SHORT GUIDE TO IDA QUALITY
More informationUsing analytics to prevent fraud allows HDI to have a fast and real time approval for Claims. SAS Global Forum 2017 Rayani Melega, HDI Seguros
Paper 1509-2017 Using analytics to prevent fraud allows HDI to have a fast and real time approval for Claims SAS Global Forum 2017 Rayani Melega, HDI Seguros SAS Real Time Decision Manager (RTDM) combines
More informationRisk Assessment of the Niagara Tunnel Project
Canadian Society of Value Analysis October 24, 2006 Risk Assessment of the Presented by: David Eden, P. Eng., Ontario Power Generation Susan Sherman, P.Eng.,URS Canada Inc Overview Qualitative Risk Analysis
More informationPost-Class Quiz: Information Security and Risk Management Domain
1. Which choice below is the role of an Information System Security Officer (ISSO)? A. The ISSO establishes the overall goals of the organization s computer security program. B. The ISSO is responsible
More informationProject Risk Management
Project Skills Team FME www.free-management-ebooks.com ISBN 978-1-62620-986-4 Copyright Notice www.free-management-ebooks.com 2014. All Rights Reserved ISBN 978-1-62620-986-4 The material contained within
More informationINTERNATIONAL ASSOCIATION OF INSURANCE SUPERVISORS
Guidance Paper No. 2.2.x INTERNATIONAL ASSOCIATION OF INSURANCE SUPERVISORS GUIDANCE PAPER ON ENTERPRISE RISK MANAGEMENT FOR CAPITAL ADEQUACY AND SOLVENCY PURPOSES DRAFT, MARCH 2008 This document was prepared
More informationCertified in Risk and Information Systems Control
Certified in Risk and Information Systems Control Dumps Available Here at: /isaca-exam/crisc-dumps.html Enrolling now you will get access to 540 questions in a unique set of CRISC dumps Question 1 Which
More informationBEST EXECUTION REPORT BANKINTER LUXEMBOURG S.A.
BEST EXECUTION REPORT BANKINTER LUXEMBOURG S.A. April 2018 1 I. Scope and Purpose In compliance with the Directive 2014/65/EU of the European Parliament and of the Council of 15 May 2014 on markets in
More informationS.Y.B.B.I. SEM - III LAWS RELATING TO BANKING AND INSURANCE. D) Provisions of Companies Act relating to Banking
1 BACHELOR OF COMMERCE (BANKING AND INSURANCE) LAWS RELATING TO BANKING AND INSURANCE A) Banking Regulations Act - Basic Terms - Banking, Business Permitted and Prohibited - Supervisory and Controlling
More informationCRISC. Isaca CRISC Certified in Risk and Information Systems Control Version: 1.0
Isaca CRISC Certified in Risk and Information Systems Control Version: 1.0 1 Topic 1, Volume A QUESTION: 1 Which of the following is the MOST important reason to maintain key risk indicators (KRIs)? A.
More informationBERMUDA MONETARY AUTHORITY THE INSURANCE CODE OF CONDUCT FEBRUARY 2010
Table of Contents 0. Introduction..2 1. Preliminary...3 2. Proportionality principle...3 3. Corporate governance...4 4. Risk management..9 5. Governance mechanism..17 6. Outsourcing...21 7. Market discipline
More informationPillar 3 Disclosures for the year ending 31 December 2015
29, Avenue de la Porte-Neuve Pillar 3 Disclosures for the year ending 31 December 2015 Pillar 3 Disclosures for the year ending 31 December 2015 Table of content 1. Overview 4 1.1. Background 4 1.2. Scope
More informationFor the PMP Exam using PMBOK Guide 5 th Edition. PMI, PMP, PMBOK Guide are registered trade marks of Project Management Institute, Inc.
For the PMP Exam using PMBOK Guide 5 th Edition PMI, PMP, PMBOK Guide are registered trade marks of Project Management Institute, Inc. 1 Contacts Name: Khaled El-Nakib, MSc, PMP, PMI-RMP URL: http://www.khaledelnakib.com
More informationIndicate whether the statement is true or false.
Indicate whether the statement is true or false. 1. Baselining is the comparison of past security activities and events against the organization s current performance. 2. To determine if the risk to an
More informationTONGA NATIONAL QUALIFICATIONS AND ACCREDITATION BOARD
TONGA NATIONAL QUALIFICATIONS AND ACCREDITATION BOARD RISK MANAGEMENT FRAMEWORK 2017 Overview Tonga National Qualifications and Accreditation Board (TNQAB) was established in 2004, after the Tonga National
More informationRisk Management Policy
Risk Management Policy October 2014 Risks 1. Risks can be identified under four principal headings a. Financial risks b. Strategic Risks c. Operational Risks, and d. Hazard Risks 2. These are either externally
More informationSection II PROJECT MANAGEMENT METHODOLOGY GUIDELINES
Section II B PROJECT MANAGEMENT METHODOLOGY GUIDELINES Chapter 8 INTRODUCTION TO A METHODOLOGY Vision The vision of the Project Management Center of Excellence (PMCoE) organization is to achieve a world-class
More informationPROGRAMMATIC RISK MANAGEMENT PLAN
Issue: 1 Rev.: 2 Date: 15 Dec 99 PROGRAMMATIC RISK MANAGEMENT PLAN 11 10 12 1 2 9 3 8 7 6 5 4 Directorate of Manned Spaceflight and Microgravity Issue:1 Rev.: 2 Programmatic Risk Management Plan Date:
More informationANTI-FRAUD STRATEGY INTERREG IPA CBC PROGRAMMES BULGARIA SERBIA BULGARIA THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA BULGARIA TURKEY
ANTI-FRAUD STRATEGY INTERREG IPA CBC PROGRAMMES 2014-2020 BULGARIA SERBIA BULGARIA THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA BULGARIA TURKEY VERSION NOVEMBER 2016 1 TABLE OF CONTENTS PRINCIPLE 3 FOREWORD
More information2) What is algorithm?
2) What is algorithm? Step by step procedure designed to perform an operation, and which (like a map or flowchart) will lead to the sought result if followed correctly. Algorithms have a definite beginning
More informationA Framework for Risk Assessment in Egyptian Real Estate Projects using Fuzzy Approach
A Framework for Risk Assessment in Egyptian Real Estate Projects using Fuzzy Approach By Ahmed Magdi Ibrahim Aboshady A Thesis Submitted to the Faculty of Engineering at Cairo University In Partial Fulfillment
More informationHamdouraby SY ESKEMA PhD PROGRAM
Hamdouraby SY ESKEMA PhD PROGRAM RISK IMPACT EVALUATION IN INTERNATIONAL CONSTRUCTION PROJECTS: THE CASE OF WEST AFRICA PRESENTATION OUTLINE RESEARCH BACKGROUND PROBLEM STATEMENT RESEARCH PHILOSOPHY RESEARCH
More informationRisk Assessment Service We Keep an Overview for You. Risk Assessment with SICK Safety Experts
P R O D U C T I N F O R M AT I O N Risk Assessment Service We Keep an Overview for You Risk Assessment with SICK Safety Experts Risk Assessment on the way to a new safety culture Safety has a high value.
More informationGuideline. Own Risk and Solvency Assessment. Category: Sound Business and Financial Practices. No: E-19 Date: November 2015
Guideline Subject: Category: Sound Business and Financial Practices No: E-19 Date: November 2015 This guideline sets out OSFI s expectations with respect to the Own Risk and Solvency Assessment (ORSA)
More informationAnalysis of Insurance Undertakings Preparedness for Solvency II. October 2010
Analysis of Insurance Undertakings Preparedness for Solvency II October 2010 Contents Introduction...2 1. General...3 1.1 Analyses in insurance undertakings and schedule of preparations...3 1.2 IT systems
More informationModel Maestro. Scorto TM. Specialized Tools for Credit Scoring Models Development. Credit Portfolio Analysis. Scoring Models Development
Credit Portfolio Analysis Scoring Models Development Scorto TM Models Analysis and Maintenance Model Maestro Specialized Tools for Credit Scoring Models Development 2 Purpose and Tasks to Be Solved Scorto
More informationRisk Management. CITS5501 Software Testing and Quality Assurance
Risk Management CITS5501 Software Testing and Quality Assurance (Source: Pressman, R. Software Engineering: A Practitioner s Approach. McGraw-Hill, 2005) 2017, Semester 1 Definition of Risk A risk is a
More informationRisk Management User Guide. Prepared By: Neville Turbit Version Feb /01/2009 Risk Management User Guide Page 1 of 36
Risk Management User Guide Prepared By: Neville Turbit Version 1.0 1 Feb 09 22/01/2009 Risk Management User Guide Page 1 of 36 Table of Contents Document Origin...2 Change History...2 Risk Guidelines...
More informationSecurity Shifts in Thinking
Impruve OCTAVE Security Shifts in Thinking It s not just an Information Technology Problem Single point of known responsibility to correct failures to Shared, sometimes unknown, responsibility You can
More informationQuality Control & Compliance Initiative. This document is publicly available to any staff member on the following network path:
Quality Control & Compliance Initiative RISK ASSESSMENT Author: Phonovation Quality Control Group Gavin Carpenter Effective Date: 20 th Nov 2013 Revised: 20 th Jan 2015 Revised by: To: Pedro Quintas All
More informationAN INTRODUCTION TO RISK CONSIDERATION
AN INTRODUCTION TO RISK CONSIDERATION Introduction This cookbook aims at recalling basic concepts and providing simple tools and possibilities of applying the "considering of risks and opportunities" in
More informationRisk Management Policy. Apollo Hospitals. Risk Management Policy
Apollo Hospitals Risk Management Policy Table of Contents 1. Introduction...1 2. Risk Management Policy...2 2.1 Applicability... 2 2.2 Risk Management Objectives... 2 2.3 Definitions... 2 2.3.1 Risk...
More informationEliciting Theory about a Retirement Process
J. Software Engineering & Applications, 2008, 1: 1-7 Published Online December 2008 in SciRes (www.scirp.org/journal/jsea) 1 Eliciting Theory about a Retirement Process Mira Kajko-Mattsson, Anna Hauzenberger,
More informationCORPORATE RISK 2017 ANNUAL REPORT
CORPORATE RISK 07 ANNUAL REPORT The City of Saskatoon, like all municipal governments, faces many types of risk, including strategic, operational, financial and compliance risks. If not effectively managed,
More informationProject Risk Management. Prof. Dr. Daning Hu Department of Informatics University of Zurich
Project Risk Management Prof. Dr. Daning Hu Department of Informatics University of Zurich Learning Objectives Understand what risk is and the importance of good project risk management Discuss the elements
More information