Available online at ScienceDirect. Procedia CIRP 28 (2015 ) rd CIRP Global Web Conference

Similar documents
Project Planning & Management. Lecture 11 Project Risk Management

Diffusion of motor systems energy efficiency measures: an empirical study within Italian manufacturing SMEs

Gleim CIA Review Updates to Part Edition, 1st Printing June 2018

Advantages and Disadvantages of. Independent Tests. Advantages. Disadvantages

Proposal for using AHP method to evaluate the quality of services provided by outsourced companies

Agenda. Enterprise Risk Management Defined. The Intersection of Enterprise-wide Risk Management (ERM) and Business Continuity Management (BCM)

Methodology for risk management in systems development

Mannonen, Petri; Hölttä, Venlakaisa Where the Knowledge Goes? Information Gathering and Managing Practices in a Global Technical Support Center

Getting Started with Risk in ISO 9001:2015

Predictive Project Analytics 2.0 Keep your project on target with Deloitte s data-driven insights. Risk Advisory

Procedia - Social and Behavioral Sciences 147 ( 2014 ) ICININFO

Available online at ScienceDirect. Procedia Engineering 78 (2014 ) 59 63

Managing Project Risks

Project Risk Management

CILECCTA is a large-scale collaborative project co-financed by the European Commission under the 7th Framework Programme Cooperation.

Optimization of the Objective Function in Building and Construction of Project under Risk Management System

BA_Leverage_Model V1.1.xlsx _ Introduction

Managing Volatility. Risk in mining investment decisions. Managing Volatility

A 2-tuple Fuzzy Linguistic RFM Model and Its Implementation

RISK ASSESSMENT OF INTERNAL AUDIT OF PUBLIC ENTITY

Continuous Improvement Toolkit. Risk Analysis. Continuous Improvement Toolkit.

Using Risk Analysis Tools for Early Project Decision Support

Integral Risk Management for DBFM Tenders and Contracts in the Netherlands

Available online at ScienceDirect. Procedia CIRP 40 (2016 )

Project Management Auditing Guide

Procedures for Reviewing EIA Reports

Risk Assessment Consideration for your ISMS. Presented by: John Laffey, Technical Manager

Research on software systems dependability at the OECD Halden Reactor Project

ScienceDirect. Innovative costing system framework in industrial product-service system environment

SAFETY CULTURE IN ITALY: THE LEGISLATION, INSPECTIONS, THE PERSPECTIVE OF AN INSPECTOR

Available online at ScienceDirect. Procedia CIRP 57 (2016 )

Quantifying Uncertainty in Baseline Projections of CO2 Emissions for South Africa

F-PM001 Risk Management Professional Certification

IAEA-TECDOC-1229 Regulatory review of probabilistic safety assessment (PSA) Level 2

Available online at ScienceDirect. Procedia Engineering 192 (2017 )

6 STEPS TO A COMPLETE BUSINESS CASE. Business Case Development Framework

A decision support tool for improving value chain resilience to critical materials in manufacturing

Topic title/heading. Definition

RiskyProject Lite 7. Getting Started Guide. Intaver Institute Inc. Project Risk Management Software.

PROJECT MANAGEMENT. Quality Management (QM) Course 7 Project Management Knowledge Areas (5) Risk Management (RM)

Techniques and Simulation Models in Risk Management

Project risk management

Fatality Prevention/Risk Management

An Agent-Based Approach to the Automation of Risk Management in IT Projects

Available online at ScienceDirect. Information Technology and Quantitative Management (ITQM 2014)

Gleim CPA Review Updates to Business Environment and Concepts 2018 Edition, 1st Printing March 2018

Available online at ScienceDirect. Procedia CIRP 17 (2014 )

RISK MANAGEMENT STEPS Lecture 2

Decision Making Delays with Regard to IT Investments

Questions a Board may ask to understand how an organisation controls its risks

Integral Architecture for Organizational Systems Arquetipos

Mapping ISO/IEC 27001:2005 -> ISO/IEC 27001:2013

Benefits & Case Studies

ONRSR Guideline. Investigation Reports by Rail Transport Operators

Thomson Reuters Enterprise Risk Manager

Risk and Opportunity Management - Overview

Available online at ScienceDirect. Procedia Economics and Finance 16 ( 2014 )

Modelling Operational Risk for Regulatory Compliance

Combinatorial Optimization Model for Group Decision-Making

Application for Accreditation of Prior Learning

Advancing analytics and automation within internal audit

Use of PSA to Support the Safety Management of Nuclear Power Plants

Methodology for risk analysis of projects

Factors Influencing Total Quality Management

Available online at ScienceDirect. Procedia Computer Science 36 (2014 )

Review: Simple schedule risk modelling with Safran Risk

CORE TOPICS Core topic 3: Identifying human failures. Introduction

Available online at ScienceDirect. Procedia Economics and Finance 24 ( 2015 )

Available online at ScienceDirect. Procedia Engineering 145 (2016 )

CMMI-DEV V1.3 CMMI for Development Version 1.3 Quick Reference Guide

ACCA. Paper P5. Advanced Performance Management. Pocket notes

Project Design and Performance Management Guide A Logic Modeling Approach [WORKING DRAFT]

Software Safety Testing Based on STPA

RiskyProject. Project Risk Management Software

ISO INTERNATIONAL STANDARD. Risk management Principles and guidelines. Management du risque Principes et lignes directrices

More than 2000 organizations use our ERM solution

Master thesis 60 credits

Available online at ScienceDirect. Procedia Engineering 132 (2015 )

Understanding and Managing Uncertainty in Schedules

WHITE PAPER UNDERSTANDING KEY CONTROL INDICATORS & HOW THEY CAN REDUCE RISK

Workforce Planning. IHRC Workshop, June 15, 2011

Identify Risks. 3. Emergent Identification: There should be provision to identify risks at any time during the project.

Selection and Deployment of a Standard COTS Monte Carlo Software Tool November 18, 2009

ScienceDirect. Design and simulation of a logistics distribution network applying the Viable System Model (VSM)

The Pharmaceutical Industry s Supply Chain Planning Reliability and Risk Management

Testing: The critical success factor in the transition to ICD-10

Electronic Checklist of Risk Items on Construction Projects

Innovative method for data collection and risk analysis during the bidding process

Procedia - Social and Behavioral Sciences 147 ( 2014 ) 9 15 ICININFO. Strategic Management Model for Academic Libraries. Khalfan Zahran Al Hijji

Chapter 5 Part Test progress monitoring and control. 4. Configuration management. 5. Risk and testing. 6. Incident management

CMMI V2.0 MODEL AT-A-GLANCE. Including the following views: Development Services Supplier Management. CMMI V2.0 outline BOOKLET FOR print.

Benchmark Exercise on Risk-Informed In-Service Inspection Methodologies

Available online at ScienceDirect. IERI Procedia 10 (2014 ) 57 62

Preservation Decisions: Terms and Conditions Apply

NUREG-1549: Decision Methods for Dose Assessment to Comply With Radiological Criteria for License Termination

Available online at ScienceDirect. Energy Procedia 78 (2015 )

Project team right-sizing for the successful ERP implementation

ISO whitepaper, January Inspiring Business Confidence.

Basic Plan for Monitoring Audit Firms in Fiscal 2016

UKCIP Adaptation Wizard

Transcription:

Available online at www.sciencedirect.com ScienceDirect Procedia CIRP 28 (2015 ) 179 184 3rd CIRP Global Web Conference Quantifying risk mitigation strategies for manufacturing and service delivery J. A. Erkoyuncu a*, M. Apa b, R. Roy a a Materials and Manufacturing Department, School of Applied Sciences, Cranfield University, Cranfield, UK b Industrial Engineering and Management, Politecnico di Milano, Milano, Italy * Corresponding author. E-mail address: j.a.erkoyuncu@cranfield.ac.uk. Abstract Organisations need to develop attitudes and practices to manage risks, which surround any project. Project failure comes from inadequate implementation of risk management. Thus, risk management processes must be accurate, feasible and explain what should be included and not, clarify tasks and responsibilities and the way it should be accomplished. The purpose of this paper is to develop a standard process to compare different risk mitigation strategies and guide users in selecting the suitable actions based on consistent criterion. Based on validation and verification with a UK defence organisation, the paper offers an insight in to quantifying risk mitigation strategies. 2014 The Authors. Published by Elsevier B.V This is an open access article under the CC BY-NC-ND license 2014 The Authors. Published by Elsevier B.V. (http://creativecommons.org/licenses/by-nc-nd/4.0/). Selection Selection and and peer-review peer-review under under responsibility responsibility of the of International the International Scientific Scientific Committee Committee of the 3rd CIRP of the Global 3rd CIRP Web Conference Global Web in Conference in the the person person of the of Conference the Conference Chair Chair Dr. Alessandra Dr. Alessandra Caggiano. Caggiano Keywords: Software obsolescence; Cost of software obsolescence; Software maintenance; Software reliability; Risk mitigation. 1. Introduction Experience and the-state-of-art has revealed that there is a limited number of processes to mitigate risks in a systematic way. This means there is a lack of approaches to choose suitable mitigation strategies within the current risk management practices [1]. These approaches tend to be ad hoc, undocumented and incomplete, causing a lack of comprehensive application of risk mitigation [2, 3]. Their functionalities are not clear to the users and are not intuitive [4] and the implementation tends to be hard to understand. In its attempt to respond to these problems, the purpose of this paper is to develop a standard process to evaluate risks and choose the most suitable mitigation strategy to put each risk under control. Starting with a detailed research about the topic and industrial interactions, a framework has been developed to help academia and industry in quantifying risks for mitigation purposes. With its functionalities, the framework presents a useful guide for risk management. It enables users to identify the most critical risks first and then to select the best strategy not only to reduce risk impact and likelihood but also considering the capability of increasing the confidence in input variables. Section 2 presents the methodology followed. Section 3 differentiates risk and uncertainty. Section 4 covers the current standards existing in risk management. Section 5 presents the proposed framework for risk quantification. Section 6 presents the verification and validation that was followed. Section 7 reflects the discussion and conclusions. 2. Methodology The purpose has been accomplished by gathering and collecting data and information through literature review. Several journals, papers, books and websites have been analysed. Basing the first stages of the process on this groundwork, it has been possible to develop an initial idea of how to create a systematic framework to help companies in dealing with risk. This paper has been realized together with one of the largest defence companies in the UK. This has meant developing concrete and consistent results for an industrial partner for guidance on a real life challenge. In total ten semi-structured interviews were initiated, whilst 2212-8271 2014 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Selection and peer-review under responsibility of the International Scientific Committee of the 3rd CIRP Global Web Conference in the person of the Conference Chair Dr. Alessandra Caggiano. doi:10.1016/j.procir.2015.04.031

180 J.A. Erkoyuncu et al. / Procedia CIRP 28 ( 2015 ) 179 184 each lasted two hours. With semi-structured interviews, it has been possible to design and improve the framework and to make it usable for the case company. 3. Uncertainty vs Risk In literature and industry a number of definitions have been offered to differentiate risk and uncertainty. Definitions considered for this paper have been provided below: Knight [5] defines uncertainty as the lack of complete certainty that is the existence of more than one possibility. The true outcome/state/result/value is not known. Hubbard [6] defines risk as a state of uncertainty where some of the possibilities involve a loss, injury, catastrophe, or other undesirable outcome (i.e. something bad could happen). The paper focuses on risks that are experienced. 4. Risk mitigation Risk is considered to serve as a threat to a project, system or the specified context and requires adequate measures to reduce its impact. This requires choosing and adopting the most appropriate risk management process in order to identify potential risks and mitigate their effects [7]. The risk analysis methods can be classified into deterministic, qualitative, and quantitative techniques. The deterministic approach refers to numerical computation of risk or uncertainty. Qualitative approaches use subjective scoring techniques and the quantitative technique covers statistical and probabilistic approaches to quantification. Qualitative approach is the most commonly applied, where the magnitude of the risk is expressed in qualitative terms and the approach helps to get a general indication of the level of risk in a project. As a result of this analysis areas that need detailed analysis (e.g. quantitatively) can be identified. There are a wide range of well-developed quantitative techniques (e.g. Monte Carlo simulation) which have existed for some time, however their application are not widespread in practice. Furthermore, it is generally accepted that quantitative approaches can provide more information and can further facilitate decisions. In common across the approaches risk is defined with respect to the likelihood of a threat, and the impact of the threat. Across industries various approaches have been offered based on individual areas of interest. For example, in the supply chain domain Van Mieghem [8] offers an insight in to defining how resource allocation can mitigate risk exposure. Tomlin [9] explores ways in which to become flexible with supply chain sourcing, whilst they examine contingent rerouting as a means. Across the proposed risk mitigation approaches there is a lack of emphasis on the reliability of the input values and many assumptions are built with respect to defining the impact and likelihood of risk. This paper aims to extend the research by building a new dimension around the confidence of the input values. This aims to represent the uncertainty experienced in the risk evaluations. The following points can be considered as the main elements of risk mitigation planning [12]: Risk evaluation: Analysis of each risk, identification of interactions and causes Mitigation strategies: Identification of mitigation strategies for key risks Strategy prioritization: Identification of the feasible and appropriate alternatives Founding identification: Evaluation of costs for the chosen mitigation approach Communication: Sharing plan and initiatives with the project participants 5. Framework for risk quantification This framework has been developed to help organisations in evaluating risks and identifying the most suitable strategy to control each threat. This system reproduces the process to select an option among multiple choices, justifying the reason why a specific mitigation strategy has been selected. Fig. 1. Risk mitigation framework Figure 1 presents the overview of the proposed framework for risk mitigation. Looking at the literature, and at industrial current practices, it has been possible to define some guidelines to set the framework. The framework is focusing on the manufacturing and service delivery in particular due to high risks that are faced and the collaboration with the case company, which is in defence. The applicability is not limited to this sector, however, further tests will need to be applied. The framework is composed of two parts: risk evaluation and mitigation strategy selection.

J.A. Erkoyuncu et al. / Procedia CIRP 28 ( 2015 ) 179 184 181 5.1. Risk evaluation Risk evaluation can be described as a method of evaluating risks and classifying them based on their likelihood and on the severity of their impact. This evaluation enables to identify the most severe risks and give them the highest priority. This process takes place in Step 2a and Step2b. Risks will be therefore classified using a matrix, shown in Figure 3, that has ranges of impacts (i.e. consequences) and likelihood as the axis. This approach is simple to apply and it does not require any extensive knowledge. Moreover this mechanism enables companies to increase the visibility of risks and assist management decisions. In the matrix, there are five scenarios for each of likelihood and consequences that therefore provide 25 different options and offer a comprehensive spectrum of potential scenarios. 5.2. Risk mitigation strategy selection There is no one single method commonly used among companies for risk mitigation strategy selection. Strategies are evaluated based on their cost implementation, capability to decrease the impact of risks, decrease their likelihood and increase the confidence in input values for likelihood and impact by narrowing the range of possible outcomes (as demonstrated in Figure 2). New range with MS Previous Range 5.3. Detailed steps in the framework The framework has been designed to provide a process to identify the most suitable mitigation strategy for a given risk. The logic behind the framework is simple to understand and follow. Risk is evaluated following the likelihood and impact and then classified under four main different groups based on the severity in order to identify the most critical ones (coloured in red in Figure 3). The link between risks and mitigation strategies has been taken into account. In this way strategies are not simply evaluated for the improvements that they can create when implemented but the risks that they control is also taken into account. This leads to different results even when applying the same strategy for different risks. Step 1 Project details Users are required to provide a list of cost drivers and their descriptions and a list of relevant risks with a brief explanation. Step 2a - Risk Overview Looking at the literature the easiest way to classify risks is using their likelihood and the severity of their impact. In this way it is possible to prioritize them following the matrix presented in Figure 3. Insignificant Minor Moderate Major Catastrophic 1 2 3 4 5 Very High 5 M H H E E High 4 M M H H E Medium 3 L M M H E Low 2 L M M H H Very Low 1 L L M M H Fig. 3. Risk matrix Step 2b-Risk Evaluation Fig. 2. Uncertainty range reduction This choice has been taken because it allows the users to conduct a deeper analysis of mitigation strategies. This process takes part in Step 6 and Step 7. Users can therefore consider a new capability of the mitigation strategy that increases the likelihood of the occurrence of one precise outcome rather than let it vary in between a widespread range. The proposed approach supports with assigning a confidence level in your estimates. Figure 2 takes into account both the likelihood and impact of risk. In this step the framework is able to evaluate risks and prioritize them. The calculations will be based on the value of likelihood and the value of the impact (its severity). Values are directly linked with each category based on percentages and figures reported in Step 2a- Risk Overview. Step 3 Risk mitigation evaluation The step comprises of four sub-tasks: Step 3a-Mitigation Strategies (MS): requires providing a default mitigation strategy list. Step 3b-Risk-MS Links: involves strategies that can mitigate any risk. Step 3c - MS List: strategies will be identified both with an ID

182 J.A. Erkoyuncu et al. / Procedia CIRP 28 ( 2015 ) 179 184 Step 3d - MS Implementation Cost: involves the cost of implementing a mitigation strategy (e.g. personnel cost, service and operating supplies, total maintenance, overhead costs). the impact range will be recorded, identifying the final benefit provided by each implementation. Step 7- Mitigation Strategy Selection Step 4 - Risk and cost driver links In this step, users are required to identify the link between risks and cost drivers in order to settle a basic connection that will remain unchanged in the whole framework. The importance of these links lays in the differences among the impact of risks that influence different cost drivers. In fact, in evaluating the severity of each risk, this link cannot be left out of consideration. Step 5 - Risk impact and links Here, each cost driver will automatically appear together with five (set as a limit to make the compilation of the tool interfaces feasible in a short amount of time, but effective at the same time) risks, whose impact will have a consequence on the cost. The selection of these five risks will be based on the combination of likelihood and impact values, provided in Step 2b-Risk Evaluation. Moreover, based on links provided in Step 3b-Risk-MS Links, each risk will appear with five mitigation strategies. Users are here required to provide a more specific impact and likelihood value (compare to that one provided in Step 2b-Risk Evaluation ) taking into account the cost driver risk link. Step 6-Mitigation Strategy Inputs Each strategy will be linked to a specific risk that in turn will be linked to a cost driver. Cells of Cost driver, risk, strategies, likelihood and impact will be automatically filled out by the framework (input will be taken from Step 5 -Risk Impact & Links). However users can be required to identify and evaluate some aspects linked with each strategy. In particular they need to be able to evaluate: range of impact (maximum and minimum values) impact reduction, likelihood reduction, confidence increasing that each strategy can provide. The last three items represent the main factors under which the framework can enable comparison of different mitigation strategies in order to identify the most suitable one. Subsequent to providing these inputs the framework can calculate the final impact and likelihood of the risk, after implementing each mitigation strategy. Moreover new value for the upper and lower bounds of Users can simply find a table in which all the strategies, linked to a specific risk, are reported together with the results derived from the previous inputs and calculations. Each strategy is placed side by side to the impact reduction, likelihood reduction and confidence increasing that it can promise together with its implementation cost. Furthermore, each mitigation strategy may impact more than one specific type of risk. Combining these values it will be possible to create two main indexes for each strategy and therefore compare them easily. In this step the framework is able to compare each mitigation strategy with the others. This comparison is based on two indexes: Cost benefit = ratio Impact x Likelihood Reduction Reduction Implementation cost Index 2. Confidence increase (1) The first index combines implementation cost, impact and likelihood reduction. Based on the value of this index the framework is able to identify the mitigation strategy with the highest value. The second index is the confidence increasing itself. With this, it is possible to identify the mitigation strategy that guarantees the highest result. Based on the result obtained, further considerations are needed by users. It is important to analyse the options chosen by the framework and to make a choice regarding the mitigation strategy. Either one single strategy can be selected or it can be used together for improved results. The proposed cost-benefit approach is aimed to support early decision making where there is a limited amount of data. Furthermore, the approach relies on expert opinion when defining the likely impact of a selected mitigation strategy. Although, the accuracy is hard to measure from this approach, it offers the opportunity for an expert to make comprehensive and robust decisions. This is enabled by considering the wider implications of selected risk mitigation strategies. Compared to other approaches, the proposed steps are innovative by adding a new measure to evaluate the confidence in the input data for risk likelihood and impact. Literature commonly proposes deterministic values for such variables and builds assumptions that may be unrealistic.

J.A. Erkoyuncu et al. / Procedia CIRP 28 ( 2015 ) 179 184 183 6. Validation and verification Three business roles took part in the validation phase: the principal reliability specialist, the cost engineer manager and the risk manager. Each of them provided important and decisive contribution for validation and verification. The framework has been shown to each of them and each of them has been asked to respond in a semi-structured interview. The result of these analyses has been reported below. Principal Reliability Specialist 18 years of experience First of all, the framework revealed to be easy to use and to understand, which confirmed usability of the framework. Moreover no major weaknesses were found; on the contrary a strong point was mentioned, including: evaluating strategies on their capabilities in reducing risk likelihood and impact, and in increasing the confidence of occurrence and their implementation cost goes beyond what people normally do. However, at this level of detail the ability to specify a numerical quantity for a risk becomes a key requirement. Furthermore, it offers an enhancement to the current practice by building a direct link between mitigation strategy and multiple risks. That was highlighted to be not easy to achieve, though it would improve effectiveness in risk analysis and to reduce resources that are put into handling risks. Cost Engineering Manager 32 years of experience The framework was suggested to be complicated then, the user testified that it is clear and not hard to use and a good documentation of mitigation strategies is provided. Moreover, it was highlighted that the framework might not make the process any quicker, instead the traceability offered will be better. It would be an initial framework that would capture the development of risks with the final position held in the existing risk repository. Risk Manager 8 years of experience With the third validation, a different point of view was captured. The respondent highlighted that the framework offers a unique consideration with evaluating the confidence in the data provided for the risk occurrence and impact. Also, it was suggested that the tool represents a useful support in assessing individual risks and can be used at any point in contracts and is transferrable to any industry. If a set of standard mitigation strategies is available to the company, the use of this tool can guarantee consistency across the project and improved effectiveness. Moreover some potential improvements have been suggested. Attention must be paid when other frameworks are used because there may be issues in transferring data. 7. Discussion 7.1. Academic contributions Papers, journals and documents analysed have clearly shown a lack of a simple and systematic approach to select a mitigation strategy that puts each specific threat under control. In fact, the diagramming technique and Monte Carlo simulation together with alternative risk management strategies such as risk avoidance, risk transfer, risk retention, loss reduction, and risk prevention and insurance represent traditional intuitive but unsystematic approaches [11]. In fact, by analysing the literature it is possible to find only few contributions exploring how risk management processes work in practice, while most of the research deals with the role of risk management in the corporate governance debate [10]. Therefore this paper proposes an approach with new features to measure, monitor and then mitigate risks. The new feature is in particular associated to measuring the confidence in the input variables including risk likelihood and impact. 7.2. Industrial contributions Mitigation actions for risks are addressed one risk at a time in a systematic manner. Moreover, including increased confidence as a measurement of the impact of mitigation is a useful addition to the standard way of considering this topic, i.e. reducing impact and/or probability. These words from the Principal Reliability Specialist confirm that a fresh and innovative point of view has been taken into account in developing and design this new framework. After analysing and understanding company current practices and procedures, a new aspect has been taken into account to reach a holistic view about mitigation strategies. Confidence increasing represents a new way of looking at mitigation strategies capabilities. It refers to their capability in reducing the range of variability around a specific value of risk impact. The approach has been tested through expert opinion in the defence sector. In particular it offers benefits compared to other approaches in literature by combining qualitative and quantitative practice. Additionally, it offers the opportunity to build confidence around the risk analysis process by considering the quality of input. 8. Conclusions The developed framework has revealed to be a consistent approach that concretely helps in

184 J.A. Erkoyuncu et al. / Procedia CIRP 28 ( 2015 ) 179 184 implementing risk management processes. It enables the industry and academia in selecting the most suitable risk mitigation strategy. Validations and verifications have come from a major UK defense company. Therefore it is possible to consider the main aim and objectives as achieved. The framework has been designed to support risk management processes together with the identification of a specific risk management process. Moreover, a process to evaluate (qualitatively and quantitatively) mitigation strategies has been developed. For future work, the authors intend to further explore ways to turn subjective expert input into objective. This will be explored through a quantitative case study. Acknowledgements The authors would like to acknowledge the contribution of the collaborating UK defence organization. Additionally, the feedback received from the reviewers is recognized. References [1] Fadun, O. S. 2013. Risk Management and Risk Management Failure: Lessons for Business Enterprises. International Journal of Academic Research in Business and Social Sciences 3(2), p. 225. [2] Silvestri, A., Arena, M., Cagno, E., Trucco, P., and Azzone, G, 2011. Enterprise Risk Management from Theory to Practice: The Role of Dynamic Capabilities Approach the Spring Model, Quantitative Financial Risk Management. Computational Risk Management 1, p. 281. [3] Olsson, R. 2007. In search of opportunity management: Is the risk management. International Journal of Project Management 25(8), p. 745. [4] May, R., 2001. Risk and uncertainty, NATURE, 21 June 2001, 411, doi:10.1038/35082158. [5] Knight, F. 1921. Risk Uncertainty and Profit. Boston, MA: Hart, Schaffner & Marx; Houghton Mifflin Co. p. 14. [6] Hubbard, D. W. 2009. The failure of the risk management, John Wiley and Sons, Inc. p. 72. [7] Power, M. 2004. The risk management of everything. The Journal of Risk Finance 5(3), p. 58 [8] Mieghem, J. A. V. 2007. Risk Mitigation in Newsvendor Networks: Resource Diversification, Flexibility, Sharing, and Hedging, Management Science 53 (8), p. 1269. [9] Tomlin, B. 2006. On the Value of Mitigation and Contingency Strategies for Managing Supply Chain Disruption Risks, Management Science 52(5), p. 639. [10] Lee, A. 2007. Acqwikidemo. Retrieved May, 2013, from Acqwikidemo: http://www.acqwikidemo.wikispace.com/space/content [11] Wideman, R. M. 1992. Project and Program Risk Management: A Guide to Managing Project Risks and Opportunities, p. 15. [12] Scapens, B., Bromwich M. 2009. Editorial: Risk management, corporate governance and management accounting. Manage Account Research 20(1), p. 1.