an integrated operation module for individual risk management

8
Decision Support An integrated operation module for individual risk management Hsiao-Fan Wang * , Fei-Chen Hsu Department of Industrial Engineering and Engineering Management, National Tsing Hua University, No. 101, Section 2 Kuang Fu Road, Hsinchu 30013, Taiwan article info Article history: Received 29 July 2005 Accepted 26 September 2008 Available online 10 October 2008 Keywords: IRM Preference structure Cumulative prospect theory Risk analysis Risk response abstract In this study, we used the cumulative prospect theory to propose the individual risk management process (IRM) which includes risk analysis and risk response stages. According to an individual’s preferential structure, the process has been developed into an operational module which includes two sub-modules. From this, the individual’s risk level for the confronted risk can be identified from the risk analysis, while the response strategies can be assessed at the risk response stage. Therefore, optimal response strategies can be recommended based on individual risk tolerance levels. The applicability of the proposed module is evaluated using an A–C court case. The results show that the proposed method can provide more useful and pertinent information than the traditional method of decision tree by using the expected monetary value (EMV). Ó 2008 Elsevier B.V. All rights reserved. 1. Introduction Risk management has been widely applied in various fields such as economics, insurance, industries, and so on. While the word ‘‘risk” means that uncertainty can be expressed through probabil- ity, risk management is a structured process for the management of uncertainty through risk assessment. Most studies on risk management have focused on the causes and effects of a risk event that occurs in an enterprise or an orga- nization (e.g. Alexander and Sheedy, 2004; Borodzicz, 2005). While this is important, follow-up considerations for assessing risks and response for an individual of an organization not only can provide valuable information in the face of risks but also effectively result in impact reduction. However, different individuals take the same risk event with different degrees of impacts ( Ward, 2007). As a con- sequence, the adopted actions will be different from individual to individual. In addition, studies from individuals’ viewpoints are rarely found in the literature despite their significance, in particu- lar, for an increasingly complex environment especially if an effec- tive strategy were to be proposed for an individual. Thus, in this study, we intend to base on an individual’s charac- teristics to propose an individual risk management process we call IRM in brief, which includes two parts of risk analysis and risk re- sponse. The risk analysis procedure is to identify the degree of risk with respect to the individual’s tolerance level, while the risk re- sponse process is to assess the considered response strategy in or- der to provide appropriate action. To ensure the applicability and implementation of the process, the quantification and measures of each stage are investigated and developed into an operation sys- tem including two modules of risk analysis and risk response. The result will be evaluated and compared using an illustrative case. To demonstrate the proposed system, this article is organized as follows. In Section 2, concepts of risk management and related theoretical backgrounds are introduced. Two operational modules which include a risk classification model with risk magnitude esti- mation for risk analysis, and a decision model for response strategy development are proposed in Section 3 with a summary of the overall system. An A–C court case will be demonstrated and evalu- ated in Section 4. Finally, the conclusions will be drawn in Section 5. 2. Basic concepts The study and implementation of risk management have a long history (e.g. Fishburn, 1982; Crockford, 1986; Tummala and Leung, 1996; Tummala and Burchett, 1999). The risk management process (RMP) provides a systematic structure to assess the consequences and likelihood of occurrence associated with a given risk event. Risk analysis and risk response are two major parts of RMP (Tummala and Burchett, 1999). At the risk analysis stage, identifi- cation of the risk sources and threats is the main task, while at the risk response stage, evaluation and development of the risk response strategies to avoid or control the identified risks are the main goals. Although risk management procedures have been developed extensively, the lack of consideration of complete factors has been an issue. Most existing studies have focused on objective evalua- tion and have largely ignored subjective factors which can help dif- ferentiate the different impacts of risk events for different 0377-2217/$ - see front matter Ó 2008 Elsevier B.V. All rights reserved. doi:10.1016/j.ejor.2008.09.039 * Corresponding author. Tel.: +886 3 5742654; fax: +886 3 5722685. E-mail addresses: [email protected] (H.-F. Wang), [email protected]. edu.tw (F.-C. Hsu). URL: http://softlab.ie.nthu.edu.tw (H.-F. Wang). European Journal of Operational Research 198 (2009) 610–617 Contents lists available at ScienceDirect European Journal of Operational Research journal homepage: www.elsevier.com/locate/ejor

Upload: hsiao-fan-wang

Post on 21-Jun-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

European Journal of Operational Research 198 (2009) 610–617

Contents lists available at ScienceDirect

European Journal of Operational Research

journal homepage: www.elsevier .com/locate /e jor

Decision Support

An integrated operation module for individual risk management

Hsiao-Fan Wang *, Fei-Chen HsuDepartment of Industrial Engineering and Engineering Management, National Tsing Hua University, No. 101, Section 2 Kuang Fu Road, Hsinchu 30013, Taiwan

a r t i c l e i n f o a b s t r a c t

Article history:Received 29 July 2005Accepted 26 September 2008Available online 10 October 2008

Keywords:IRMPreference structureCumulative prospect theoryRisk analysisRisk response

0377-2217/$ - see front matter � 2008 Elsevier B.V. Adoi:10.1016/j.ejor.2008.09.039

* Corresponding author. Tel.: +886 3 5742654; fax:E-mail addresses: [email protected] (H.-F. W

edu.tw (F.-C. Hsu).URL: http://softlab.ie.nthu.edu.tw (H.-F. Wang).

In this study, we used the cumulative prospect theory to propose the individual risk management process(IRM) which includes risk analysis and risk response stages. According to an individual’s preferentialstructure, the process has been developed into an operational module which includes two sub-modules.From this, the individual’s risk level for the confronted risk can be identified from the risk analysis, whilethe response strategies can be assessed at the risk response stage. Therefore, optimal response strategiescan be recommended based on individual risk tolerance levels.

The applicability of the proposed module is evaluated using an A–C court case. The results show thatthe proposed method can provide more useful and pertinent information than the traditional method ofdecision tree by using the expected monetary value (EMV).

� 2008 Elsevier B.V. All rights reserved.

1. Introduction

Risk management has been widely applied in various fields suchas economics, insurance, industries, and so on. While the word‘‘risk” means that uncertainty can be expressed through probabil-ity, risk management is a structured process for the managementof uncertainty through risk assessment.

Most studies on risk management have focused on the causesand effects of a risk event that occurs in an enterprise or an orga-nization (e.g. Alexander andSheedy, 2004; Borodzicz, 2005). Whilethis is important, follow-up considerations for assessing risks andresponse for an individual of an organization not only can providevaluable information in the face of risks but also effectively resultin impact reduction. However, different individuals take the samerisk event with different degrees of impacts (Ward, 2007). As a con-sequence, the adopted actions will be different from individual toindividual. In addition, studies from individuals’ viewpoints arerarely found in the literature despite their significance, in particu-lar, for an increasingly complex environment especially if an effec-tive strategy were to be proposed for an individual.

Thus, in this study, we intend to base on an individual’s charac-teristics to propose an individual risk management process we callIRM in brief, which includes two parts of risk analysis and risk re-sponse. The risk analysis procedure is to identify the degree of riskwith respect to the individual’s tolerance level, while the risk re-sponse process is to assess the considered response strategy in or-der to provide appropriate action. To ensure the applicability and

ll rights reserved.

+886 3 5722685.ang), [email protected].

implementation of the process, the quantification and measuresof each stage are investigated and developed into an operation sys-tem including two modules of risk analysis and risk response. Theresult will be evaluated and compared using an illustrative case.

To demonstrate the proposed system, this article is organized asfollows. In Section 2, concepts of risk management and relatedtheoretical backgrounds are introduced. Two operational moduleswhich include a risk classification model with risk magnitude esti-mation for risk analysis, and a decision model for response strategydevelopment are proposed in Section 3 with a summary of theoverall system. An A–C court case will be demonstrated and evalu-ated in Section 4. Finally, the conclusions will be drawn in Section 5.

2. Basic concepts

The study and implementation of risk management have a longhistory (e.g. Fishburn, 1982; Crockford, 1986; Tummala and Leung,1996; Tummala and Burchett, 1999). The risk management process(RMP) provides a systematic structure to assess the consequencesand likelihood of occurrence associated with a given risk event.Risk analysis and risk response are two major parts of RMP(Tummala and Burchett, 1999). At the risk analysis stage, identifi-cation of the risk sources and threats is the main task, while at therisk response stage, evaluation and development of the riskresponse strategies to avoid or control the identified risks are themain goals.

Although risk management procedures have been developedextensively, the lack of consideration of complete factors has beenan issue. Most existing studies have focused on objective evalua-tion and have largely ignored subjective factors which can help dif-ferentiate the different impacts of risk events for different

H.-F. Wang, F.-C. Hsu / European Journal of Operational Research 198 (2009) 610–617 611

individuals and thus allow the adopted actions to be more effec-tive. To address this gap, in this study, we shall introduce the indi-vidual’s subjective values into the process of risk management.

While personal judgments about uncertainty and values areimportant inputs for making any decision, defining an individual’svalue function becomes a preliminary step towards risk analysis.

The concept of utility was proposed by Bernoulli and Cramer inthe 18th century (Bleichrodt and Pinto, 2000; Levy, 2006). They sug-gested that risky monetary options should be evaluated not by theirexpected return but rather by the expectations of the utilities oftheir return. The utility of a gain or loss is measured by the degreeof pleasure (rejoicing) or pain (regret) that the amount gained or lostgenerates (Piney, 2003). The expected utility theory under risk wasproposed by Von Neumann and Morgenstern (2004), and was basedon the strict logic of a human being’s behavioral assumptions. This isthe guiding principle of decision making under risk conditions.

According to the risk attitudes of being risk averse, risk neutral,and risk seeking, one may obtain the parameter of a functionthrough lottery (Goicoechea et al., 1982; Clemen and Reilly,2001). Individuals who are afraid of risk or are sensitive to riskare considered risk averse. Their typical utility curve is upwardand concave. A convex utility curve indicates a risk seeker; thiskind of individual is eager to engage in a challenging task. Finally,the utility function of a risk neutral person is a straight line. Thecharacteristics of being risk neutral are lack of concern about riskand the ability to ignore the risk alternatives confronted. ExpectedMonetary Values (EMV) as conventionally used for risk analysis arebased on risk neutral assumptions (Clemen and Reilly, 2001).

However, in 1979, Kahneman and Tversky discovered that thedecision preferences of human beings violate the axioms of the ex-pected utility theory and thus proposed the prospect theory (PT)(Kahneman and Tversky, 1979). Then the cumulative prospect the-ory (CPT) that incorporated the descriptive advantages of the origi-nal PT and the theoretical advantages of the rank-dependent utility(Chateauneuf and Wakker, 1999) was developed through manyresearchers’ effort (e.g. Tversky and Kahneman, 1992; Fennemaand Wakker, 1997; Neilson and Stowe, 2002).

Instead of using a probability distribution in PT, CPT uses cumu-lative probability to measure the effect on likelihood of occurrence.Therefore, suppose a gamble is composed of n monetary outcomes,x1 6 � � � 6 xk 6 0 6 xkþ1 6 � � � 6 xn which occur with probabilitiesp1; . . . ; pn, respectively. Then the CPT value of the prospectðx1; p1; � � � ; xn; pnÞ can be given by the following formula (Neilsonand Stowe, 2002):

Vðx;pÞ ¼ V�ðx;pÞ þ Vþðx; pÞ ¼Xk

i¼1

p�vðxiÞ þXn

i¼kþ1

pþvðxiÞ ð1Þ

where

p�1 ¼ w�ðp1Þ; p�i ¼ w�Xi

j¼1

pj

!�w�

Xi�1

j¼1

pj

!2 6 i 6 k

pþn ¼ wþðpnÞ; pþi ¼ wþXn

j¼i

pj

!�wþ

Xn

j¼iþ1

pj

!kþ 1 6 i 6 n� 1

The expression Vþ measures the contribution of gains, while V�

measures the contribution of losses by the respective weighted va-lue function v. Therefore, based on this concept, an individual’s risklevel can be assessed by his/her perceived gain and loss of outcomesas expressed by his/her weighted value function, which paves theway to analyze an individual’s risk tolerance

With regard to the risk response stage, studies emphasized themethod of developing the strategies, giving no consideration to theimpact of the response action. To effectively develop a cost-effec-tive strategy, we shall propose a method to first apply an individ-

ual’s risk tolerance to classify the personal tolerance zones asdefined by Piney (2003). Then according to the properties of eachtolerance zone, the respective strategy can be developed.

Regarding Piney (2003)’s tolerance zones of the dead zone, therational zone, the sensitivity zone, and the saturation zone, withrespect to the magnitude of influence, the idea was to link riskmanagement and cognitive psychology to identify four personalrisk zones in consideration of the gains and losses of the outcomes.Since the conceptual description of these zones causes difficulty inimplementation, we shall therefore propose a classification modelto operate it. Then by analyzing the risk magnitude of each zone, adecision model for developing a respective response strategy willbe provided.

Based on these basic concepts, in the following section, we shalldevelop an operation system for individual risk management.

3. The proposed operation system for the Individual RiskManagement Process (IRM)

Based on the basic concepts described above, we shall developin this section each module in details. Section 3.1 illustrates therisk analysis module, while Section 3.2 develops the risk responsemodule. Finally, we summarize the proposed IRM in Section 3.3.

3.1. Risk analysis module

In this section, an operational model for assessing the risk levelsbased on individual preferences is introduced. A measure of risk le-vel is defined, and the risk zones are classified accordingly.

3.1.1. Individuals’ risk levels and risk zonesBased on the concept of utility, let us first define an individual’s

value functions as follows:

vðxÞ ¼ 1� e�x=R for risk aversione�x=R � 1 for risk seeking

(ð2Þ

where x is the outcome of a risk event and R is risk tolerance: whenR > 0, it is risk aversion; when R < 0, it is risk seeking.

The value of R can be derived from a reference game, typicallyusing the lowest and highest monetary values as references forassessing the points in between. Whenever individuals accept acertainty equivalent which is lesser (greater) than the expected va-lue of the game, they are risk averters (risk seekers), and function vis concave downward (upward) with R>0 (R<0); otherwise, func-tion v is a straight line for risk neutrals (Goicoechea et al., 1982;Clemen and Reilly, 2001)

Then based on the cumulative prospect theory (Neilson andStowe, 2002), an individual’s preference towards a risk event canbe described by a value function, which is weighted by probabilityas follows:

Vðx;pÞ ¼ V�ðx;pÞ þ Vþðx;pÞ ¼Xk

i¼1

p�vðxiÞ þXn

i¼kþ1

pþvðxiÞ

¼Xk

i¼1

e� � ln

Pi

j¼1

pj

� �c

� e� � ln

Pi�1

j¼1

pj

� �c2664

3775vðxiÞ

þXn

i¼kþ1

e� � ln

Pn

j¼i

pj

� �c

� e� � ln

Pn

j¼iþ1

pj

� �c2664

3775vðxiÞ ð3Þ

where ðxi;piÞ is the outcome xi of risk event and its correspondingprobabilities, pi; n is a risk event composed of n monetary out-comes; k is the number of negative outcomes; V is the CPT value

612 H.-F. Wang, F.-C. Hsu / European Journal of Operational Research 198 (2009) 610–617

of the prospect ðx1;p1; � � � ; xn;pnÞ; v is a value function; c is a controlparameter of the curvature of probability weighting function and pis the probability weighting function with

wðpÞ ¼ e�ð� ln pÞc ðPrelec; 1998Þ ð4Þ

According to the idea of Piney (2003), the slope is the main crite-rion dividing utility functions into four risk zones. Therefore, by dif-ferentiating the function V, we define Risk Level by the slope of V as

V 0ðx;pÞ ¼Xk

i¼1

cPij¼1pj

!� ln

Xi

j¼1

pj

!c�1

e� � ln

Pi

j¼1

pj

� �c0BB@

1CCA

2664

� cPi�1j¼1pj

!� ln

Xi�1

j¼1

pj

!e� � ln

Pi�1

j¼1

pj

� �c0BB@

1CCA3775v 0ðxiÞ

þXn

i¼kþ1

cPnj¼ipj

!� ln

Xn

j¼i

pj

!c�1

e� � ln

Pn

j¼i

pj

� �c0BB@

1CCA

2664

� cPnj¼iþ1pj

!� ln

Xn

j¼iþ1

pj

!c�1

e� � ln

Pn

j¼iþ1

pj

� �c0BB@

1CCA3775v 0ðxiÞ

ð5Þ

where

v 0ðxiÞ ¼e�xi=R

R for risk aversion

� e�xi=R

R for risk seeking:

(

Given the number of clusters (four clusters) and the attribute(slope), we used the c-means clustering method (Kaufman andRousseeuw, 1990) to classify the weighted value function into fourrisk zones based on the slope of V.

To illustrate this procedure, we used MATLAB to execute theclustering procedure. Let us consider the initial data as follows:

1. Each risk event is composed of three possible outcomes, i.e.n ¼ 3.

2. Each clustering process includes 1000 risk events.3. Number of iteration = 30.4. Number of clusters = 4.

Then, by giving the risk tolerance, R with the incremental valueof 100 each time from 500 to 10,000 for R 6 1000 and 1000 for

Table 1Slope interval of each risk zone for negative

Pipixi .

NegativeP

ipixi Zone 1 Zone 2

Risk tolerance Lower bound Upper bound Lower bound Upper b

10000 1.1797E�04 2.0656E�04 2.0656E�04 2.5649E9000 1.1768E�04 2.3938E�04 2.3938E�04 3.0302E8000 1.4545E�04 2.8735E�04 2.8735E�04 3.7055E7000 1.5797E�04 3.4672E�04 3.4672E�04 4.6047E6000 1.9489E�04 4.6661E�04 4.6661E�04 6.4077E5000 2.3074E�04 6.4626E�04 6.4626E�04 9.4183E4000 2.9714E�04 1.0887E�03 1.0887E�03 1.7279E3000 4.2698E�04 2.4795E�03 2.4795E�03 4.4295E2000 7.0315E�04 1.2828E�02 1.2828E�02 2.7267E1000 1.7418E�03 2.3761E+00 2.3761E+00 6.4820E

900 1.4667E�03 7.3436E+00 7.3436E+00 2.0871E800 2.4846E�03 3.3044E+01 3.3044E+01 9.4394E700 2.7630E�03 2.1778E+02 2.1778E+02 6.3563E600 3.5148E�03 2.6080E+03 2.6080E+03 7.8762E500 5.4926E�03 8.1553E+04 8.1553E+04 2.5353E

R > 1000, and c ¼ 0:74 as suggested by Wu and Gonzalez(1996) for model (5), the results are shown in Tables 1 and 2 fornegative

Pipixi and positive

Pipixi, respectively.

From Tables 1 and 2, individuals’ risk zones with respect to theirtolerance levels can be well defined by their boundaries. After theperson’s risk zones have been determined, the risk analysis of a riskevent can be done by first obtaining the slope interval of each riskzone according to his/her risk tolerance. Then the risk level for therisk event can be calculated, and under which risk zone the riskevent falls can be determined. Thus, the severity of the confrontedrisk event can be revealed. Based on this result, a suitable responseaction can then be recommended.

To apply the results from risk analysis, we used regression anal-ysis to determine the relations between risk tolerance and the pos-sibility of each risk zone as well as the slope interval of each riskzone.

3.1.2. Regression model for the possibility of each risk zoneAccording to the clustering result, a polynomial regression

model was applied to fit the number of risk events falling into eachrisk zone of which the regressor variable R represents risk toler-ance, and the response y represents the number of each risk zone.Therefore, we can obtain four regression models for each risk zone,as shown below:

yZone i ¼ ðb0 þ b1Rþ b2R2 þ � � � þ bnRn þ eÞi; i ¼ 1 � 4: ð6Þ

Then the possibility of each risk zone can be obtained by its per-centage as

Possibility of Zone i¼ yZone i

yZone 1 þ yZone 2 þ yZone 3 þ yZone 4 ; i¼ 1� 4:

ð7Þ

According to these functions, we can understand the possibility forthe risk zone each person falls into. This helps us comprehend thedistribution of risk events for a specific individual, and the tolerancefor risk in general.

For example, with the same data above, we obtained the regres-sion models for the numbers in each risk zone as listed in Table 3.

Therefore, the possibility of each risk zone is obtained as shownin Table 4. Then once the risk tolerance is known, the possibilitythat the individual might fall in this risk zone can be identifiedwith respect to the outcomes of the risk event faced.

3.1.3. Analysis of the slope interval of each risk zoneTo facilitate the prediction and applications, the possible slope

interval of each risk zone with respect to R is investigated in this

Zone 3 Zone 4

ound Lower bound Upper bound Lower bound Upper bound

�04 2.5649E�04 3.2141E�04 3.2141E�04 5.0666E�04�04 3.0302E�04 3.8154E�04 3.8154E�04 6.1740E�04�04 3.7055E�04 4.7522E�04 4.7522E�04 7.8622E�04�04 4.6047E�04 6.0896E�04 6.0896E�04 1.0796E�03�04 6.4077E�04 8.5671E�04 8.5671E�04 1.5057E�03�04 9.4183E�04 1.2968E�03 1.2968E�03 2.5717E�03�03 1.7279E�03 2.4576E�03 2.4576E�03 5.1738E�03�03 4.4295E�03 6.5526E�03 6.5526E�03 1.4759E�02�02 2.7267E�02 4.3846E�02 4.3846E�02 1.0605E�01+00 6.4820E+00 1.1565E+01 1.1565E+01 2.6799E+01+01 2.0871E+01 3.8122E+01 3.8122E+01 8.4790E+01+01 9.4394E+01 1.7042E+02 1.7042E+02 3.4926E+02+02 6.3563E+02 1.1772E+03 1.1772E+03 2.6626E+03+03 7.8762E+03 1.4537E+04 1.4537E+04 3.1900E+04+05 2.5353E+05 4.7929E+05 4.7929E+05 1.0192E+06

Table 2Slope interval of each risk zone for positive

Pipixi .

PositiveP

ipixi Zone 1 Zone 2 Zone 3 Zone 4

Risk tolerance Upper bound Lower bound Upper bound Lower bound Upper bound Lower bound Upper bound Lower bound

10000 3.5300E�04 2.2337E�04 2.2337E�04 1.6941E�04 1.6941E�04 1.2331E�04 1.2331E�04 5.9293E�059000 4.1491E�04 2.5593E�04 2.5593E�04 1.9069E�04 1.9069E�04 1.3500E�04 1.3500E�04 5.6600E�058000 5.2176E�04 3.1013E�04 3.1013E�04 2.2398E�04 2.2398E�04 1.5198E�04 1.5198E�04 5.9172E�057000 6.5062E�04 3.9951E�04 3.9951E�04 2.7512E�04 2.7512E�04 1.7462E�04 1.7462E�04 5.1763E�056000 9.4892E�04 5.3723E�04 5.3723E�04 3.5280E�04 3.5280E�04 2.0874E�04 2.0874E�04 5.3678E�055000 1.4737E�03 8.3337E�04 8.3337E�04 5.1617E�04 5.1617E�04 2.7734E�04 2.7734E�04 4.5127E�054000 2.8939E�03 1.6415E�03 1.6415E�03 9.5943E�04 9.5943E�04 4.5301E�04 4.5301E�04 3.5789E�053000 8.5551E�03 4.7929E�03 4.7929E�03 2.6413E�03 2.6413E�03 1.0623E�03 1.0623E�03 2.1672E�052000 6.7023E�02 3.6778E�02 3.6778E�02 1.9108E�02 1.9108E�02 6.4563E�03 6.4563E�03 6.8033E�061000 1.9776E+01 1.0800E+01 1.0800E+01 5.3947E+00 5.3947E+00 1.5957E+00 1.5957E+00 1.2834E�07

900 6.6938E+01 3.5507E+01 3.5507E+01 1.7810E+01 1.7810E+01 5.1735E+00 5.1735E+00 5.5793E�08800 3.0398E+02 1.6605E+02 1.6605E+02 8.2407E+01 8.2407E+01 2.3848E+01 2.3848E+01 1.5209E�08700 2.0103E+03 1.2550E+03 1.2550E+03 6.7126E+02 6.7126E+02 1.9852E+02 1.9852E+02 1.8627E�09600 2.5149E+04 1.3909E+04 1.3909E+04 7.1882E+03 7.1882E+03 2.1692E+03 2.1692E+03 5.5264E�10500 8.6187E+05 4.7395E+05 4.7395E+05 2.3650E+05 2.3650E+05 6.8192E+04 6.8192E+04 2.5839E�11

Table 3Regression models for the number of each risk zone.

Zone Regression model of number for each zone (negativeP

ipixiÞ R2 value Regression model of number for each zone (positiveP

ipixiÞ R2 value

1 4608:73� 1:70383Rþ 0:0002218R2 95.9% 1:89277þ 0:130237R� 0:0000048R2 100%2 224:885þ 0:727092R� 0:0000925R2 94.4% �4:15135þ 0:212562Rþ 0:0000073R2 100%3 74:8246þ 0:598495R� 0:0000638R2 99.3% �13:6073þ 0:411139Rþ 0:0000195R2 100%4 �34:7599þ 0:737643R� 0:0002523R2 95.6% 5019:99� 0:752437Rþ 0:0000313R2 100%

Table 4Regression models of possibility for each zone.

Zone Regression model of possibility for each zone (negativeP

ipixi) Regression model of possibility for each zone (positiveP

ipixi)

1 4608:73� 1:70383Rþ 0:0002218R2

4873:6797þ 0:3594R� 0:0001876R2

1:89277þ 0:130237R� 0:0000048R2

5004:12412þ 0:001501R� 0:0000758R2

2224:885þ 0:727092R� 0:0000925R2

4873:6797þ 0:3594R� 0:0001876R2

�4:15135þ 0:212562Rþ 0:0000073R2

5004:12412þ 0:001501R� 0:0000758R2

374:8246þ 0:598495R� 0:0000638R2

4873:6797þ 0:3594R� 0:0001876R2

�13:6073þ 0:411139Rþ 0:0000195R2

5004:12412þ 0:001501R� 0:0000758R2

4�34:7599þ 0:737643R� 0:0002523R2

4873:6797þ 0:3594R� 0:0001876R2

5019:99� 0:752437Rþ 0:0000313R2

5004:12412þ 0:001501R� 0:0000758R2

H.-F. Wang, F.-C. Hsu / European Journal of Operational Research 198 (2009) 610–617 613

section. Since interval regression analysis can serve this purpose(Lee and Tanaka, 1999; Hojati et al., 2005)), the model formulatedin (5) is used to estimate the boundaries of each zone.

Assuming that the interval regression function for each zone isy ¼ A0 þ A1Rþ e, then four interval regression models for each riskzone are shown below:

yZone i ¼ ðA0 þ A1Rþ eÞi ¼ ðða0; c0Þ þ ða1; c1ÞRþ eÞi; i ¼ 1 � 4:

ð8Þ

Then, using this result we can predict and analyze the risk level of arisk event.

Using this result, we can predict and analyze the risk level of arisk event.

Table 5Regression models of slope interval for each zone ðR > 1000Þ.

Zone Regression model of slope interval for each zone (negativeP

ipixi)

1 y ¼ ð3:3075E� 04; 0Þ þ ð0;2:264333E� 08ÞR2 y ¼ ð5:53688E� 04;0Þ þ ð0;1:45145E� 08ÞR3 y ¼ ð7:4874E� 04; 0Þ þ ð0;1:79955E� 08ÞR4 y ¼ ð1:18121E� 03;0Þ þ ð0;5:40825E� 08ÞR

Taking the same data for illustration, the regression models forthe slope interval of each risk zone are shown in Table 5 when therisk tolerance is larger than 1000, and in Table 6 when the risk tol-erance is smaller than or equal to 1000.

3.2. Risk response module

Based on the results of Section 3.1, we consider the secondphase of IRM – assessment of risk response.

3.2.1. Response strategyAfter the risk analysis, we know by giving each individual’s value

function with its specified risk level, which risk zone the risk event

Regression model of slope interval for each zone (positiveP

ipixi)

y ¼ ð7:4308E� 04; 0Þ þ ð0;3:43075E� 08ÞRy ¼ ð4:4502E� 04; 0Þ þ ð0;1:536917E� 08ÞRy ¼ ð2:8077E� 04; 0Þ þ ð0;1:2005E� 08ÞRy ¼ ð1:31209E� 04;2:609225E� 05Þ þ ð0;8:573126E� 09ÞR

Table 6Regression models of slope interval for each zone ðR 6 1000Þ.

Zone Regression model of slope interval for each zone (negativeP

ipixi) Regression model of slope interval for each zone (positiveP

ipixi)

1 y ¼ ð1:652324Eþ 01;0Þ þ ð0;2:065095E� 02ÞR y ¼ ð2:35015Eþ 02; 0Þ þ ð0;8:620625E� 02ÞR2 y ¼ ð6:371875Eþ 01;0Þ þ ð0;3:834375E� 02ÞR y ¼ ð1:242285Eþ 02;0Þ þ ð0;5:227688E� 02ÞR3 y ¼ ð1:324042Eþ 02;0Þ þ ð0;4:751344E� 02ÞR y ¼ ð5:312725Eþ 01;0Þ þ ð0;3:659969E� 02ÞR4 y ¼ ð2:598375Eþ 02;0Þ þ ð0;1:117781E� 01ÞR y ¼ ð1:192375Eþ 01;0Þ þ ð0;1:490469E� 02ÞR

Table 7Meaning and applications of four response strategies w.r.t. four risk zones.

Strategy Avoidance Transfer Mitigation Acceptance

Meaning Taking action, so the risk eventno longer impacts. Seeking toeliminate the uncertainty.

To transferownership and/orliability to a thirdparty.

To reduce the ‘‘size” of the risk event to below athreshold of ‘‘risk acceptance”. The size meansreducing probability or/and outcomes of risk event.

Passively accept it. To deal with the riskevent if it occurs, rather than attemptingto influence its probability or outcomes.

Applicationzone

Sensitive zone Rational zone Adjunct to the other strategies Dead zone

Saturation zone

614 H.-F. Wang, F.-C. Hsu / European Journal of Operational Research 198 (2009) 610–617

belongs to and what the boundaries of each risk zone are. Thenbased on the risk zone levels, appropriate strategies of avoidance,transfer, mitigation, and acceptance as considered by Piney (2003)can be proposed with their interpretation as shown in Table 7.

3.2.2. Response evaluation modelTo check the adequacy of the suggested strategy, a response

evaluation model is needed and developed in this subsection. Thisis done by considering the embedded costs as listed below:

1. Investment cost: The resources used to gain the ownership of therisk event.

2. Impact of primary risk: The influence produced from the riskevent.

3. Response cost: The resources used to implement the responsestrategy.

4. Impact of second risk: The influence of other risks arising fromthe implementation of a response.

5. Impact of responded primary risk: The influence of a risk arisingas a direct result of implementing a response (remaining risk).

The relations between the response strategies and these costsare analyzed in Table 8.

Therefore, from the analysis in Table 8, it can be realized that bycompletely avoiding the risk, the implementation cost would bevery high, but if one is able to shoulder the risk by him/herself,the cost of implementation would be zero. Besides, if the responseaction of avoidance is taken, there is no remaining risk. On theother hand, acceptance does not completely remove the risk be-cause the responded risk is the same as the original risk. Therefore,there is a tradeoff between the response cost and the impact of theresponded primary cost.

Table 8Costs vs. response strategies.

Acceptance Mitigation Transfer Avoidance

Investment cost No No No NoNone None None None

Impact of primary risk Yes Yes Yes YesLow Medium High Higher

Response cost No Yes Yes YesNone Low Medium High

Impact of second risk No Yes/No Yes/No Yes/NoNone Depend Depend Depend

Impact of responded primaryrisk

Yes Yes Yes No

High Medium Low None

Therefore, to minimize total costs, the following model was pro-posed to evaluate the suitability of the response strategy. In thismodel, function (b) checks the impact of the risk response which in-cludes the primary risk, and the impact of other risks should besmaller than that of the original one. The response action is worthimplementing when the condition conforms to the model. Function(c) measures the value of response cost relative to the reduced risk.This gives the ratio of improvement in risk exposure to the cost ofobtaining such improvement. The larger the ratio, the more cost-effective the response is. As a guideline, effective response ratiosshould have values above 20 (Hillson, 1999). If the correspondingstrategy conforms to the model constraints, the strategy isrecommended.

Min (Investment cost) + (Impact of primary risk) x1 + [(Responsecost) + (Impact of other risk) + (Impact of responded primaryrisk)]x2

s.t. (a) x1 þ x2 ¼ 1

(b) (Impact of responded primary risk) + (Impact of otherrisk) < (Impact of primary risk)

(c) ðImpact of primary riskÞ�ðImpact of responded primary riskÞResponse cost

P 20

xi ¼01

�i ¼ 1;2: ð9Þ

This is a typical binary integer programming model, and only twoalternatives exist in the feasible solution set fðx1;x2Þ j ðx1; x2Þ ¼ð0;1Þ; ð1;0Þg. This is a minimization problem, so it is easy to findthe optimal solution from these two alternatives. Therefore, if x1 is1, the response strategy is not suitable and requires another strat-egy. If x2 is 1, this response strategy is implemented.

3.3. Summary

So far, we have proposed a complete risk management processas an operational system, which is summarized in Fig. 1. The issuesin focus are addressed by the questions in diamond blocks, whilethose in hexagon blocks are the models for proposing the optimalsolutions.

With the risk analysis module, we are able to derive the risk le-vel of a risk event and the risk zone it belongs to before deciding onthe corresponding response strategy. With the risk response mod-ule, we have assessed the impact of the response strategies via theresponse evaluation model to determine the most suitable re-sponse action.

An example is presented below to explain how this risk man-agement process works.

Identify mission, aims, andobjective

Risk identification,Risk measurement, and

Risk assessment

Assess risk tolerance, R,by CE method

Personal risk zones

Which tolerance level(riskzone)?

Dead zone Sensitivezone

Saturationzone

Rationalzone

Which response strategy?

Riskacceptance

Risktransfer

Riskavoidance

Riskmitigation

Suitable?

Implementation

Other risk exists?

End

Yes

No

NoYes

Risk analysis

Risk response

Personal risk level

Response evaluation model

Fig. 1. Framework of the proposed individual risk management system.

H.-F. Wang, F.-C. Hsu / European Journal of Operational Research 198 (2009) 610–617 615

4. Illustrative example

We adopted the court case of A–C to illustrate the proposed pro-cedure and compare the result with EMV as formally suggested(Clemen and Reilly, 2001).

4.1. Problem description and analysis

This case involved two persons, A and B, who agreed to theterms of a merger. However, person C offered B a substantially bet-ter price, and B reneged on the deal with A and sold to C. Naturally,A felt if it had been dealt with unfairly and immediately filed a law-suit against C, alleging that C had legally interfered in the A–Bnegotiations. A won the case and it was awarded $10,300. C hadsaid that it would file for bankruptcy if A obtained court permis-

sion to secure the judgment by filing liens against C’s assets. Fur-thermore, C was determined to fight the case all the way to theUS Supreme Court, if necessary, arguing in part that A had not fol-lowed the security and exchange commission regulations in itsnegotiations with B. In April 1987, just before A began to file theliens, C offered to pay $2000 to A, to settle the entire case. A indi-cated that he had been advised that a settlement between $3000and $5000 would be fair.

What do you think A should do? Should he accept the offer of$2000, or should he refuse and make a counter-offer? If he refusesthe certainty of $2000, he faced with a risky situation. C may, indeed,agree to pay $5000, a reasonable amount in A’s mind. On the otherhand, if he places a counter-offer of $5000 as a settlement amount,C may perhaps counter with $3000 or simply pursue a further appeal.In Fig. 2, a decision tree shows a simplified version of A’s problem.

Counteroffer 5000

Accept 2000

C Accepts 5000

C refusescounteroffer

C counteroffers 3000

Final court decision

Final courtdecision

Refuse

Accept 3000

2000

5000

10300

5000

0

10300

5000

0

3000

Settlement Amount

(0.17)

(0.50)

(0.33)

(0.2)

(0.2)

(0.5)

(0.5)

(0.3)

(0.3)

Fig. 2. Decision tree for A–C court (Clemen and Reilly, 2001).

Settlement Amount0.2

0.5

0.3-3000

2000

7300

Fig. 3. Decision tree for Decision 1.

-2000

1000

8300

3000

Settlement Amount

30000.5

0.17

0.33

0.5

0.2

0.3

Fig. 4. Decision tree for Decision 2.

616 H.-F. Wang, F.-C. Hsu / European Journal of Operational Research 198 (2009) 610–617

This risk problem can be separated into two stages for risk anal-ysis. The first is that if C counters with $3000, what should A do?The other is, should A refuse the offer and make a counter-offer?A’s risk tolerance is 1000 and is thus regarded as a risk averter.We can evaluate this risk problem using our proposed RMP, whichis as follows.

Using the interval regression results of Table 6, we can predictthe interval of slope for risk tolerance = 1000 as follows:

See Table 9

� Risk analysis:1. Decision 1

The stage 1 arrangement can be viewed in Fig. 3.Based on Eq. (5), the value of risk level V 0 ¼ 1:42E� 02 fallsin the saturation zone (zone 4); thus, the correspondingstrategy is avoidance.

2. Decision 2The stage 2 arrangement can be viewed in Fig. 4.Based on Eq. (5), the value of risk level V 0 ¼ 6:06E� 03 againfalls within the saturation zone (zone 4) so the correspond-ing strategy is avoidance. This means that A should not makea counter-offer to C and should accept the alternative of$2000.

� Risk response:

Min ðinvest cost¼0Þþðimpact of primary risk¼2120Þx1

þ½ðresponse cost¼0Þþðimpact of other risk¼0Þþðimpact of responded primary risk¼0Þ�x2

s:t: ð1Þx1þx2¼1ð2Þðimpact of responded primary risk¼0Þþðimpact of other risk¼0Þ< ðimpact of primary risk¼2120Þ

xi ¼01

�i¼1;2

The response evaluation model solution is x1 ¼ 0; x2 ¼ 1, whichsuggests that the avoidance strategy is appropriate. Therefore,

Table 9The interval of slope for risk tolerance = 1000.

PositiveP

ipixi

Zone 1 Zone 2

Upper bound Lower bound Upper bound Lower bound

3.2122E+02 1.4881E+02 1.7651E+02 7.1952E+01

according to our risk management process (IRM), we suggest thatA accept C’s offer of $2000 and forgets about making a counter-offerto C.

Zone 3 Zone 4

Upper bound Lower bound Upper bound Lower bound

8.9727E+01 1.6528E+01 2.6828E+01 �2.9809E+00

Table 10Tolerance analysis.

Zone 1 Zone 2 Zone 3 Zone 4

Range of risk tolerance �2376 2376 � 1451 1451 � 799 799 � 0Belonging zone Dead zone Rational

zoneSensitivezone

Saturationzone

Corresponding strategy Acceptance Transfer Avoidance Avoidance

H.-F. Wang, F.-C. Hsu / European Journal of Operational Research 198 (2009) 610–617 617

4.2. Discussion and conclusion

For comparison, let us use the EMV method to make the deci-sion, we obtain the result shown below:

1. Decision 1

EMV ¼ ð0:2� 10300Þ þ ð0:5� 5000Þ þ ð0:3� 0Þ ¼ 4560) 4560 > 3000* reject the alternative of Accept $300000:

2. Decision 2

EMV ¼ ð0:17� 5000Þ þ ð0:5� 4560Þ þ ð0:33� 4560Þ ¼ 4630) 4630 > 2000* reject the alternative of Accept $200000:

Therefore, A should turn down C’s offer but place a counter-of-fer for a settlement of $5000. If C turns down the $5000 and makesanother counter-offer of $3000, A should refuse the $3000 and takehis chance in court.

To compare these two risky decision methods, we offer the fol-lowing conclusions:

1. IRM is analyzed according to an individual’s risk attitude,whereas EMV is applied for types of individuals and thus therecommended action will be the same for each one.

2. In this case, A is a risk averter. According to our analysis, thisrisk event was at a high level of risk (sensitive zone) for A.Therefore, we recommended A to implement the responsestrategy of ‘‘Avoidance” and accept the offer from C becausethe response cost is the minimum. This result matches our com-mon knowledge, yet different from that suggested by EMV.Now,using the regression model, we further analyzed the toleranceranges for this case as shown in Table 10.

5. Conclusion

An operational risk management system is an essential tool indecision making, which helps evaluate the influence of a risk in astep by step manner. The more precise the analysis process, themore appropriate is the response action recommended.

Since different people may evaluate the same event as havingdifferent levels of risk, in this study, we explored risk tolerancebased on individual preferences. To develop a complete analysisof risk management, we studied and proposed a risk managementmodule called individual risk management by adopting the cumu-lative prospect theory to describe individual preferences, and usedthe slope as a measure to separate individual risk levels when thec-means clustering method was used. To perform tolerance analy-sis, we examined the clustering results to discover the relation be-tween risk tolerance and risk level. After these analyses, riskresponse strategies based on the properties of the four risk zones

were considered. Acceptance of the recommended strategy wasbased on the proposed evaluation model, which assessed the re-sponse strategies based on the overall costs of both operationand impact embedded in the implemented results.

IRM has shown to provide more precise assessment at the riskanalysis stage, and consider more thorough evaluation factors atthe risk response stage. This is a systematic process which includesfollow-up consideration in assessing risks and response and pro-vides more useful information for coping with the risks one faces.In addition, we solved the division problem of Piney’s four riskzones using the clustering method. Therefore, the guidelines out-lined in this paper offer a framework for developing effective riskanalysis and response, and for minimizing the influence resultingfrom such risk.

Acknowledgement

The authors acknowledge the financial support from the Na-tional Science Council with Project Number NSC 93-2213-E007-016.

References

Alexander, C., Sheedy, E., 2004. The Professional Risk managers’ Handbook: AComprehensive Guide to Current Theory and Best Practices, first ed. PRMIAPublications, Wilmington, DE.

Bleichrodt, H., Pinto, J.L., 2000. A parameter-free elicitation of the probabilityweighting function in medical decision analysis. Management Science 46 (11),1485–1496.

Borodzicz, Edward P., 2005. Risk, Crisis and Security Management. John Wiley andSons Ltd., West Sussex, England.

Chateauneuf, A., Wakker, P., 1999. An axiomatization of cumulative prospect theoryfor decision under risk. Journal of Risk and Uncertainty 18 (2), 137–145.

Clemen, R.T., Reilly, T., 2001. Making Hard Decisions with Decision Tools. Duxbury,Belmont, California.

Crockford, Neil, 1986. An Introduction to Risk Management, second ed. Woodhead-Faulkner. 0-85941-332-2.

Fennema, H., Wakker, P., 1997. Original and cumulative prospect theory: A discussionof empirical differences. Journal of Behavioral Decision Making 10, 53–64.

Fishburn, P.C., 1982. The Foundations of Expected Utility. Reidel, Dordrecht Holland.Goicoechea, A., Hansen, D.R., Duckstein, L., 1982. Multiobjective Decision Analysis

with Engineering and Business Applications. John Wiley, New York.Hillson, D. 1999. Developing effective risk responses. In: Proceedings of the 30th

Annual Project Management Institute 1999 Seminar and SymposiumPhiladelphia, Pennsylvania, USA, Papers presented October 10–16.

Hojati, M., Bector, C.R., Smimou, K., 2005. A simple method for computation of fuzzylinear regression. European Journal of Operational Research 166, 172–184.

Kahneman, D., Tversky, A., 1979. Prospect theory: An analysis of decision under risk.Econometrica 47 (2), 263–292.

Kaufman, L., Rousseeuw, P.J., 1990. Finding Groups in Data: An Introduction toCluster Analysis. John Wily & Sons, New York.

Lee, H., Tanaka, H., 1999. Upper and lower approximation models in intervalregression using regression quantile techniques. European Journal ofOperational Research 116, 653–666.

Levy, H., 2006. Stochastic Dominance, second ed.. Investment Decision Makingunder Uncertainty Springer, USA.

Neilson, W., Stowe, J., 2002. A further examination of cumulative prospect theoryparameterizations. The Journal of Risk and Uncertainty 24 (1), 31–46.

Piney, C., 2003. Applying utility theory to risk management. Project ManagementJournal 34 (3), 26–31.

Prelec, D., 1998. The probability weighting function. Econometrica 66 (3), 497–527.Tummala, V.M.R., Burchett, J.F., 1999. Applying a risk management process (RMP) to

manage cost risk for an EHV transmission line project. International Journal ofProject Management 17 (4), 223–235.

Tummala, V.M. R., Leung, Y.H., 1996. A risk management model to assess safety andreliability risks. International Journal of Quality and Reliability Management 13(8), 53–62.

Tversky, A., Kahneman, D., 1992. Advanced in prospect theory: Cumulativerepresentation of uncertainty. Journal of Risk and Uncertainty 5 (4), 297–323.

Von Neumann, J., Morgenstern, O., 2004. Theory of Games and Economic Behavior.Princeton University Press, New Work.

Ward, D., Quaid, C., 2007. The pursuit of courage, judgment and luck. Special issue ofRogue Risk Rant, Mar/Apr, Journal of Defense Acquisition, Technology andLogistics (AT&L), Defense Acquisition University.

Wu, G., Gonzalez, R., 1996. Curvature of the probability weighting function.Management Science 42, 1676–1690.