• Title/Summary/Keyword: risk process

Search Result 2,920, Processing Time 0.028 seconds

Optimal Asset Allocation with Minimum Performance and Inflation Risk (최소 자산제약 및 인플레이션을 고려한 자산 할당에 관한 연구)

  • Lim, Byung Hwa
    • Korean Management Science Review
    • /
    • v.30 no.1
    • /
    • pp.167-181
    • /
    • 2013
  • We investigate the dynamic asset allocation problem under inflation risk when the wealth of an investor is constrained with minimum requirements. To capture the investor's risk preference, the CRRA utility function is considered and he maximizes his expected utility at predetermined date of the refund by participation in the financial market. The financial market is supposed to consist of three kinds of financial instruments which are a risk free asset, a risky asset, and an index bond. The role of an index bond is managing inflation risk represented by price process. The optimal wealth and the optimal asset allocation are derived explicitly by using the method to get the European call option pricing formula. From the numerical results, it is confirmed that the investments on index bond is high when the investor's wealth level is low. However, as his wealth increases, the investments on index bond decreases and he invests on risky asset more. Furthermore, the minimum wealth constraint induces lower investment on risky asset but the effect of the constraints is reduced as the wealth level increases.

A Study on the Risk Measurement of Construction Method for Fie1d Work (건축공사를 위한 공법별 리스크 측정에 관한 연구)

  • Yoo In-Geun;Choi Sang-Chun;Cho Taek-Hee;Koo Bron-Woo;Yoon Yer-Wan
    • Proceedings of the KSR Conference
    • /
    • 2005.11a
    • /
    • pp.1121-1129
    • /
    • 2005
  • The purpose of this study. was to Identification the Risk of construction method to protect and reduce the risk of construction period. The inspection list usually has the difference of importance because this list is not made by Method which is not focused on Method. We tested Risk occurring frequency and it's strength by checking the level of Risk. To solve and compensate the matter which happened by changing the each Method Check List to each General Inspection List, we added the each Method Check List by checking the importance of check list of each process. By doing this, the Check List for finding Risk level of Method was created by using the check list of each Method.

  • PDF

A Study on Correlation Analysis of Risk Factors for Urban Regeneration Using ISM method (ISM기법을 이용한 도시재생사업 리스크 요인의 상관성 분석에 관한 연구)

  • Park, Beom-Suk;Jin, Run-Zhi;Han, Sangwon;Hyun, Chang-Taek
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2013.05a
    • /
    • pp.192-193
    • /
    • 2013
  • In recent years, risks associated with mixed used development in urban regeneration projects which have actively been implemented have been on the rise due to uncertainties and complexities of those projects. Thus, risk management is needed to effectively manage those risks that may occur during the process of a project. Many studies have contributed to deal with risk management of those projects. These studies, however, have focused main on identification stage and deriving the main risk factors and have limitations on presenting the relationship among those risk factors. Since many risks are interdependent and have multiple effects, the purpose of this study is to present a way(ISM method) to provide a hierarchical structural framework of risks in Urban Regeneration. The structural of risks can helps decision makers to trace the actual source of these risks.

  • PDF

A Study on the Risk Index Model of Work Type in Architectural Construction Work (건축공사 공종별 위험지수 산정모델에 관한 연구)

  • Chang, Seong-Rok;Go, Seong-Seok;Lee, Jong-Bin
    • Journal of the Korean Society of Safety
    • /
    • v.22 no.6
    • /
    • pp.63-68
    • /
    • 2007
  • The purpose of this study is to verify the relation between the risk index using AHP(Analytic Hierarchy Process) and the risk index using Computing Model. For doing the objective, this research classified 22 work types in architectural construction work from the analysis Korean architectural standard specification and Korea occupational safety & health agency code. Based on the classified 22 work types in architectural construction work, the risk index of each work type was calculated by AHP and Computing Model. For verifying the correlation of risk index between AHP and Computing Model methods, SAS version 8.0 System, which is one of the statistics programs, was used.

A Risk Metric for Failure Cause in FMEA under Time-Dependent Failure Occurrence and Detection (FMEA에서 고장발생 및 탐지시간을 고려한 고장원인의 위험평가 척도)

  • Kwon, Hyuck Moo;Hong, Sung Hoon;Lee, Min Koo
    • Journal of Korean Society for Quality Management
    • /
    • v.47 no.3
    • /
    • pp.571-582
    • /
    • 2019
  • Purpose: To develop a risk metric for failure cause that can help determine the action priority of each failure cause in FMEA considering time sequence of cause- failure- detection. Methods: Assuming a quadratic loss function the unfulfilled mission period, a risk metric is obtained by deriving the failure time distribution. Results: The proposed risk metric has some reasonable properties for evaluating risk accompanied with a failure cause. Conclusion: The study may be applied to determining action priorities among all the failure causes in the FMEA sheet, requiring further studies for general situation of failure process.

The development of CAMBRA; Updated CRA (Caries management by risk assessment (CAMBRA)의 발전; CRA 업데이트)

  • Lee, Su-Young
    • Journal of Korean society of Dental Hygiene
    • /
    • v.21 no.4
    • /
    • pp.321-336
    • /
    • 2021
  • The aim of this study was to investigate the caries management by risk assessment (CAMBRA) development process and the latest updated caries risk assessment for the domestic settlement of the CAMBRA program and the activation of dental clinics. A system for CAMBRA was published in California Dental Association (CDA) in 2007. To investigate whether CAMBRA can be successfully implemented outside a university setting, a practice-based research network (PBRN) was created in the San Francisco Bay Area. Based on the CAMBRA-PRAN clinical studies, the caries risk assessment (CRA) tool was updated for patients aged 6 through adults in 2019. The CAMBRA system is expected to be widely and actively used in the dental field in Korea to contribute to oral health care.

An Exploratory Study on the Information Technology Outsourcing Risk Factors: An IPO Perspective (IPO 관점에서의 정보기술 아웃소싱 위험요인에 관한 탐색적 연구)

  • Yang Kyung sik;Kim Hyun soo
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.3
    • /
    • pp.35-62
    • /
    • 2004
  • Recently, IT outsouricng has been one of the major concerns of many companies. This paper explores the relationship between information technology outsourcing risk factors and outsourcing performance. It is based upon a three-phase process utilizing IPO (Input-Process-Output) system. The first phase means the outsourcing planning risks t~at arise from overall environment of outsourcing, organizational refuse, and wrong contracts. The second phase implies outsourcing operational risks, which are occurred while out-sourcing perform and consist of organizational acceptances of outsourcing, partnership and hidden costs. The last phase is outsourcing performance based on four perspective of BSC(Blanced Scored Card). The survey was performed on the IT/IS firms, and the data was collected from 53 service receivers. The result of the analysis are as follows. First, Outsourcing planning risks positively affects the operational risks. Second, Outsourcing operational risks negatively affects the Outsourcing Performance.

  • PDF

Extended Linear Vulnerability Discovery Process

  • Joh, HyunChul
    • Journal of Multimedia Information System
    • /
    • v.4 no.2
    • /
    • pp.57-64
    • /
    • 2017
  • Numerous software vulnerabilities have been found in the popular operating systems. And recently, robust linear behaviors in software vulnerability discovery process have been noticeably observed among the many popular systems having multi-versions released. Software users need to estimate how much their software systems are risk enough so that they need to take an action before it is too late. Security vulnerabilities are discovered throughout the life of a software system by both the developers, and normal end-users. So far there have been several vulnerability discovery models are proposed to describe the vulnerability discovery pattern for determining readiness for patch release, optimal resource allocations or evaluating the risk of vulnerability exploitation. Here, we apply a linear vulnerability discovery model into Windows operating systems to see the linear discovery trends currently observed often. The applicability of the observation form the paper show that linear discovery model fits very well with aggregate version rather than each version.

Transient and Stationary Analyses of the Surplus in a Risk Model

  • Cho, Eon Young;Choi, Seung Kyoung;Lee, Eui Yong
    • Communications for Statistical Applications and Methods
    • /
    • v.20 no.6
    • /
    • pp.475-480
    • /
    • 2013
  • The surplus process in a risk model is stochastically analyzed. We obtain the characteristic function of the level of the surplus at a finite time, by establishing and solving an integro-differential equation for the distribution function of the surplus. The characteristic function of the stationary distribution of the surplus is also obtained by assuming that an investment of the surplus is made to other business when the surplus reaches a sufficient level. As a consequence, we obtain the first and second moments of the surplus both at a finite time and in an infinite horizon (in the long-run).

Quantitative Hazard Analysis of Information Systems Using Probabilistic Risk Analysis Method

  • Lee, Young-Jai;Kim, Tae-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.59-71
    • /
    • 2009
  • Hazard analysis identifies probability to hazard occurrence and its potential impact on business processes operated in organizations. This paper illustrates a quantitative approach of hazard analysis of information systems by measuring the degree of hazard to information systems using probabilistic risk analysis and activity based costing technique. Specifically the research model projects probability of occurrence by PRA and economic loss by ABC under each identified hazard. To verify the model, each computerized subsystem which is called a business process and hazards occurred on information systems are gathered through one private organization. The loss impact of a hazard occurrence is produced by multiplying probability by the economic loss.

  • PDF