NOKIA最新的.ppt_第1頁
NOKIA最新的.ppt_第2頁
NOKIA最新的.ppt_第3頁
NOKIA最新的.ppt_第4頁
NOKIA最新的.ppt_第5頁
已閱讀5頁,還剩49頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

1、Mikko Routti Director, Risk Management Nokia Corporation,Risk Management,Main Themes of Presentation,scope of presentation: business risk (widely) our philosophy about risk management where we are today on the journey of ERM how to do this in our organisation balance between practical, value-based a

2、nd analytical, fact-based thinking what kind of methods and tools we use (e.g) how do we and others communicate about this, It is one thing to set up a mathematical model that appears to explain everything. But when we face the struggle of daily life, of constant trial and error, the abiguity of the

3、 facts as well as the power of the human heartbeat can obliterate the model in short order.,Peter L. Bernstein: Against the Gods- The Remarkable story of Risk,“We are not just adding all of these risks together. We are creating a probabilistic view of how much capital is actually necessary.” -Rick B

4、uy, Chief Risk Officer, Enron,“We review how good it can get, we review how bad it can get, and every place in between.” - Rick Causey, EVP and Chief Accounting Officer, Enron,What does risk appetite mean in practice?,Are we focusing on opportunity? Is there a clear view of the appetite for risk? Is

5、 there balance in risks and rewards? (i.e. high risks vs low rewards) Where should most of managements effort be directed?,A Generic Business Risk Continuum,Opportunity,Uncertainty,Hazard,Compliance And Prevention,Operating Performance,Strategic Initiatives,Key Questions to Consider.,Environment,Hea

6、lth resources used, most often personnel time; cost of development; product requirements, which can include both functional and other quality characteristics; resource utilization; and technical constraints, such as hardware platforms, operating systems and use of particular software tools.,Goal and

7、 Stakeholder Priorities,Priorities for goals and stakeholders are defined Approximate priorities are adequate,Risk Identification,Risk identification requires an open mind Teamwork and effective meeting techniques are critical There are several checklists available but are they good for you?,Identif

8、ication of potential threats Needs to be done frequently Requires a different mental attitude: not problem solving but free association,Techniques: brainstorming, checklists, questionnaires, history data (lessons learned, data), critical path analysis, goal review,RI: Checklists vs. Brainstorming,Ch

9、ecklists Pros Fast and easy to use Standardize results Cover a broad area May prompt thinking new risks Cons Cause fatigue Do not encourage creativity May be biased due to a different domain Do not encourage finding situation specific risks,Brainstorming Pros Fast and easy to use Leverages local exp

10、ertise and insight Keeps participants active Develops commitment Cons Require facilitation or training Meeting dynamics may bias results Dependent on participants experience,Risk Analysis,Understanding (describing) risks Risk tracking tables Risk information forms Visualization of risk dependencies

11、Ranking of risks Risk exposure (I.e., probability * loss) Risk reduction leverage Urgency,Risk Analysis,Risk clustering group and identify appropriate scenarios Risk scenario development fill in risk information forms, or complete Riskit analysis graphs Risk prioritization Rank risks,Understanding R

12、isks:Risk Tracking Tables,Items in tracking tables may include,ID Area Origin Description Owner/responsible Date of most recent review Probability Loss impact,Priority current previous time on the list Risk status Potential controlling actions Selected controlling actions Action Status,Risk Document

13、ation Guidelines,Templates standardize communications Use an approach that matches your needs Develop a path to refine the information you often start with an abstract description and add details later Do not fill in information that you do not know: empty fields act as flags to others Archive past

14、data useful for learning from experience,Risk Prioritization,Key attributes in prioritization: Probability and loss determine how severe (=big) the risk is Urgency indicates whether you still have time to wait Two main approaches for ranking risks: Expected value of loss = prob(event) * loss(event)

15、Ranking through tables ordinal rank multiplication prearranged ranking tables for ordinal probability and loss estimates risk factor ranking tables Ordinal scale ranking is adequate, when using Riskit Pareto ranking technique,Expected Value,Same as Risk Exposure: probability * loss Risks that have t

16、he highest expected loss are highest risks, e.g., two risks that have potential delays: Risk A: 20% * 5 months = 1 month Risk B: 50% * 3 months = 1.5 months Risk B is a bigger risk A commonly used formula for prioritizing risks,Effect of Non-linear Utility Function,Risk A: 2 month delay with probabi

17、lity of 10% Risk B: 8 month delay with probability of 5% Expected delay: A: 0.2 months B: 0.4 months = control risk B Expected utility loss: A: 5 U B: 3 U = control risk A,Summary,Different risks require different attention Focus on most important or on areas of uncertainty Prioritization is prone t

18、o estimation biases Some prioritization methods have in-built biases Transparency and understandability of prioritization is important: make sure you can explain the results to everybody,Controlling Actions vs. Reactions,Risk controlling actions are actions taken before the risk has occurred, I.e.,

19、it is proactive risk management Reactions are actions that are performed after the risk has occurred Risk management is primarily concerned with risk controlling actions,Defining Risk Controlling Actions,Brainstorming Open or focused Strategies Checklists Risk element review analyze risk elements to

20、 identify what actions could be taken Experience Personal experience and insights,Acceptance Avoidance Protection Reduction Research Reserves Transfer,Risk Control alternatives,No risk reducing action No immediate action is taken, but some may be taken at a later time Contingency planning Recovery p

21、lans are made, but no further action taken Reduce loss Refers to risk controlling actions that are used to mitigate the damage caused by risk Risk avoidance Refers to actions that are aimed at avoiding risks occurring Reduce event probability Influencing risk factors and observing risk monitoring me

22、trics to reduce the event probability,Selecting Risk Controlling Actions,Control high-risk scenarios Effectiveness of risk controlling action Project constraints Stakeholder priority Urgency of risk controlling action,Risk Monitoring in Practice,Define and collect risk metrics when applicable Monito

23、r additionally changes in the situation impact of risk controlling actions potential new threats changes in risk analysis input data Initiate risk identification, risk analysis or risk control planning when necessary,Building up a Risk Management System,People and competencies,Process,Methods,Tools,

24、People and competencies form the foundation of risk management,Process helps ensure their skills are applied consistently,Methods assure that risk management is done well,Tools increase productivity and can sometimes direct people and processes,People and Competence,Motivation Explain why risk manag

25、ement pays off Authorization Give people power to perform risk management Skills + knowledge + practice = competence Support in-house learning,Process,Make sure that the product development process has explicit points where risk management is addressed Provide templates for reports Define the risk m

26、anagement process and its outputs identify analyze control Clarify responsibilities,Methods,Select a portfolio of sound and easy-to-use methods Start simple and improve as you become more experienced Beware of the biases and problems with the methods you are using Use common sense - a method cannot

27、replicate it,Requirements for a Risk Mgmt Method,Consistency of application: there is a defined, repeatable process. Consistency of results: results from independent analyses do not differ. Usability: the method is easy to learn, operate, prepare input for, and the output is understandable. Adaptabi

28、lity: the system can be applied to different projects and situations. Completeness: consideration of all relevant relationships and elements of risk is given. Validity: methods results represents well the real risks and situation. Confidence: methods output is believable and method users believe in

29、it. Traceability: the method documents the assumptions and rationale used to derive conclusions. Communications: the method supports communication about risks between people and organizations. Feasibility: the required data and time for applying the method are available. Efficiency: the method produ

30、ces results with relatively low effort and time. Effectiveness: The methods results influence the project. Experience capture: the method allows capture and analysis of experience.,Tools,Tools can be best leveraged when the organization truly understands risks and is fluent in risk management Tool c

31、annot compensate for lack of analysis or understanding They may hide the real issues They may create false confidence Introduce tools gradually Key issues: Usability Teamwork,Conclusions on Risk Management Infrastructure,Deploy a portfolio of techniques Be aware of assumptions and problems with various

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論