<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Risk-Aware Organizational Design</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>George Koliadis</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Aditya K. Ghose</string-name>
          <email>aditya@uow.edu.au</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Decision Systems Laboratory School of Computer Science and Software Engineering University of Wollongong</institution>
          ,
          <addr-line>NSW 2522</addr-line>
          <country country="AU">Australia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2009</year>
      </pub-date>
      <abstract>
        <p>Operational risk is an important, complex, and di cult, criterion to consider during any form of organizational decision making. In practice (1) complexity typically arises from: the use of a variety of risk related indicators; the use of multiple heterogeneous measurement scales; measurement uncertainty; varying levels of measurement precision; and, the widespread e ect of each measurement; (2) di culties arise due to the: time bound nature of the decision making process; and, the availability and interpretation of risk-related measurements. To help address these issues, we propose a conceptual framework to support and minimize the level of analyst involvement during the management of operational risk speci ed in organizational models. This is achieved by propagating/analyzing risk-related evaluations across descriptions of distributed, inter-dependant and mission critical work activities.</p>
      </abstract>
      <kwd-group>
        <kwd>Operational Risk Management</kwd>
        <kwd>Organizational Design</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Ad-hoc risk analyses are common within operational decision making [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The
bounded nature of choice between alternatives requires time and information to
be rationalized. As such, conceptual tools that help make use of, collect and
disseminate available knowledge are critical. In many cases, precise risk assessment
based on well de ned problem speci cations or statistical data are infeasible (e.g.
in green- elds and time-bound projects). This may lead to increased levels of
uncertainty with respect to the conditions surrounding some decision to be made.
E cient and e ective techniques are required that allow for the combination of
precise and imprecise assessments when evaluating risk.
      </p>
      <p>
        In this paper, we outline a novel framework for propagating measurements
(in a large class of measurement frameworks) across and between descriptions
of inter-dependant work activities speci ed using a language in uenced by the
i* [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] notation and the c-semiring [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] constraint modeling paradigm. This from
of propagation allow us to: determine the e ect of an evaluation across an
organization; determine inferred bounds for improved analysis of organizational
models; and determine when and where evaluations are inconsistent and adjust
the evaluations or model to resolve an inconsistency. The examples we illustrate
in this paper primarily refer to risk-related measurements, although the
techniques we describe can also be deployed to model and analyze many other forms
of measurements (e.g. cost, time, etc.). The theory outlined in this paper is
implemented in the ISORROPIA Service Mapping Software Toolkit available for
download at: http://www.isorropia.org/.
      </p>
      <p>Section 2 provides a background and related work; Section 3 de nes a risk
modeling scheme; Section 4 describes risk propagation; we then describe how
to deal with inconsistencies in Section 5; Section 6 describes some modes of
analysis; and, we conclude in Section 7.</p>
    </sec>
    <sec id="sec-2">
      <title>Background and Related Work</title>
      <p>
        Risk has been studied within many elds including economic theory [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], social
science [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], project management [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], and software engineering [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], risk is
de ned as \...exposure to a proposition of which one is uncertain" [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], whereby
a self aware individual is uncertain of a proposition if they do not know it to
be true or false, or it is unknown to them, and exposure is de ned as the
personal condition of that individual who would care (and has a preference toward)
whether the proposition is either true or false [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
2.1
      </p>
      <sec id="sec-2-1">
        <title>Organizational Risk</title>
        <p>
          In organizations, \...governance and decision making are the cause, risk and
reward - the e ect or outcome of those decisions" [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]; whereby, governance is
de ned as \... nding ways to ensure that decisions are made e ectively" [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]
by specifying \...the distribution of rights and responsibilities among di erent
participants in the corporation, such as the board, managers, shareholders, and
other stakeholders" [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Five core elements of risk include [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]: (1) Context, or
the \...environment in which the risk is being viewed" [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. The context describes
the situation in which the conditions and consequences of a risk have some
bearing, as well as identifying the scope of actions that trigger and can mitigate
a risk. (2) Action, whose rami cations in certain conditions trigger a risk; (3)
Conditions, when in combination with an action trigger a risk; (4) Consequences,
or the potential e ect of the action under certain conditions. These may lead to
losses across many diverse attributes ranging from the stability of tasks through
to the co-operation among work groups [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]; (5) Controls, to prevent, detect and
correct the consequences of risk.
        </p>
        <p>
          Operational risk is \...associated with the expected outcome of a process"
[
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], and is \enterprise-wide... endemic across the institution, a ecting every
business activity" [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] states that increased work distributions \...by their
very nature increase risk", indicating a structural relationship. In organizational
settings, risk becomes a key attribute for informing analysis and decision making
that should be analyzed and controlled during organizational design.
2.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Organizational Modeling</title>
        <p>Organizational modeling in notations such as the i* framework provide rich
anthropomorphic abstractions for modeling the social, intentional, and
strategic viewpoints of organizational actors. In i*, dependencies such as goals to be
satis ed, soft-goals to be satis ced, task to be performed, and resources to be
furnished can be represented to help reason about the optimal delegation of
responsibilities among actors in some organizational context. An actors' internal
motivations and capabilities are represented as an AND/OR goal graph. In this
mode, tasks may be decomposed and alternatives means for goals de ned with
means-end relationships. In addition, directed links between actors signify that
a depender (i.e. source) actor depends on a dependee (i.e. target) actor for a
dependum (i.e. the node between dependency links).</p>
        <p>Take for example, Figure 1 - An Organizational Model of a Transport
Organization. This model represents the interdependencies between three actors: a
Bond Department; a Sort Facility; and a Regulatory Agency. Dependencies are
represented as goals (ovals) connected to other types of goals (or tasks) via links
labeled with a directional `D'. For example, the Bond Department depends on a
Sort Facility to achieve the goal of \Forwarded[Bonded Packages]". Within the
scope of an actor, goals (or tasks) are decomposed into sub-tasks and goals or
alternative tasks and goals (as represented in the legend in Figure 1).</p>
        <p>
          In these types of models, risk and uncertainty are left implicit within the
structure of an organization, and can sometimes be catered for within the
underlying analysis framework - i.e. i* incorporates a qualitative argumentation
system for reasoning about levels of satisfaction towards soft-goals that has
been extended [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] to cater for certain types of cancelation (relevant to risk
mitigation).
2.3
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>Risk Modeling as Negative Preferences</title>
        <p>
          Risk is measured by \...the probability of occurrence of loss/gain multiplied by
its respective magnitude" [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. Within the constraint satisfaction literature,
similar issues relating to the uncertainty of a solution (or partial-solution) have
required the use of soft-constraints, ranked according to probabilistic, fuzzy or
weighted scales. In order to unify soft-constraint paradigms, [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] propose a
abstract c-semiring framework that generalizes the classical (i.e. boolean), fuzzy,
probabilistic and weighted approaches.
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>De nition 1 (Constraint-Semiring). A c-semiring (as in [3]) is de ned as a</title>
        <p>5-tuple hA; ; ; 0; 1i with the following properties: A is a set of abstract
(numeric, boolean, or symbolic) preference values and 0; 1 2 A; is a binary
operator used to compare preference values, which is closed (i.e. if a; b 2 A, then a b 2
A), commutative (i.e. a b = b a), associative (i.e. a (b c) = (a b) c),
indempotent (i.e. if a 2 A, then a a = a), has a unit element of 0 (i.e.
a 0 = a = 0 a), and an absorbing element of 1 (i.e. a 1 = 1 = 1 a);
is a binary operator used to combine preference values, which is closed (i.e.
if a; b 2 A, then a b 2 A), commutative (i.e. a b = b a), associative (i.e.
a (b c) = (a b) c), has a unit element of 1 (i.e. a 1 = a = 1 a), and
an absorbing element of 0 (i.e. a 0 = 0 = 0 a); distributes over (i.e.
a (b c) = (a b) (a c)). In addition, the comparison operator induces a
partial ordering s such that forall a; b 2 A a s b i a b = b.</p>
        <p>Risk measurement attempts to quantify the impact and uncertainty of some
meaningful event. Traditionally, probabilistic and/or qualitative scales can be
used. The c-semiring structure allows us to seamlessly describe and analyze
precise and imprecise evaluations under the same unifying scheme. That is,
qualitative evaluations do not need to be massaged into the same totally ordered
numeric scheme.</p>
        <p>
          Take for instance the case where two or more c-semirings have been used
to model the problem at hand. In our instance, we would like to incorporate
multiple risk measures (e.g. one risk measured using a numeric scale R+ and
another measured using a symbolic scale fLow; M ed; Highg). This has been
brie y discussed in [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] and more deeply discussed in [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. The simple approach
for combining two c-semiring instances produces another c-semiring instance
(proved by [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]) that is the cartesian product of the abstract preference values,
comparison operators, combination operators, and inclusion of least and most
preferred values as respective tuples.
        </p>
        <p>
          The c-semiring structure has been referred to as a negative preference
structure in [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ], used to compare and combine the values associated to tuples in the
constraints of constraint satisfaction problems. This structure is a natural
candidate for modeling risk measurements, as the combination operator monotonically
decreases - i.e. the combination of two risks (occurring simultaneously) is worse
than either of them occurring on their own. The structure also permits a partial
ordering among values to allow for indecision among divergent evaluations.
        </p>
        <p>
          Given the endemic nature of risk, the broad range of risk attributes (see [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]),
and the application of risk assessments across many inter-related areas within
an organization (e.g. nancial, resource, project and software management), a
combined, general and more holistic scheme would help to unify these otherwise
independently structured and applied evaluations.
2.4
        </p>
      </sec>
      <sec id="sec-2-5">
        <title>Related Work</title>
        <p>
          It is surprising that little attention has been given to organizational risk
analysis within the organizational modeling literature. For example, [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] discusses
techniques for evaluating and analyzing actor criticality and vulnerability within
organizations that may arguably attribute to both the impact and likelihood of
certain classi cations of failure. In other work, [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] discuss obstacles and [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]
discuss hazards that may both obstruct the satisfaction of organizational goals,
thus requiring analysis and mitigation. In addition, [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] discuss how quantitative
risk evaluation and analysis can be incorporated into business process models to
help evaluate taxonomic risk.
        </p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] and [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ], a goal-oriented and qualitative framework for modeling and
reasoning about the consequences of risk (extending the formal framework of
[
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]) is presented. Speculative, hazardous and mitigating risk events and their
contribution (positive and negative) towards organizational objectives can be
clearly modeled. In [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ], a goal-oriented, quantitative/probabilistic method for
analyzing risks is presented. In their approach, risks are de ned as fault-tree
extensions to the existing NASA Defect Detection and Prevention (DDP) method.
        </p>
        <p>The approach outlined in this paper aims to support mixed-mode and
iterative evaluation of organizational structures with respect to a variety of
heterogeneous endogenous (i.e. structural) and exogenous (i.e. environmental) risk
measurements. As this task is knowledge intensive, we present a scheme to minimize
analyst involvement by propagating evaluations across evolving organizational
models. Our application is also primarily targeted toward risk analysis, although
it could also be used in other settings. This permits improved visibility for risk
related (and other) factors across an entire organizational model, even when the
model is only partially evaluated.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Modeling Risk within Organizational Models</title>
      <p>Risk evaluations are annotated to functional goal or task nodes on an
organizational model. These evaluations choose values from a combined instance of a
c-semiring risk scale. This evaluation provides a course grained measure of the
risk of a deviation to the annotated node.</p>
      <p>De nition 2 (Risk Evaluation). Let R = hM; S; Slow; Suppi be a risk
evaluation such that: M 2 fN ormative; Descriptiveg indicates the mode of an
evaluation. S = hA; ; ; 0; 1i is a combined c-semiring scale we are using to
measure the risk of a functional deviation, and this scale may be a composition
of multiple scales/dimensions for each ner-grained deviation; Slow is a value
from S (possibly an n-tuple) that indicates the lower bound on some evaluation,
and states that the evaluation cannot get any worse than the designated value;
Supp is a value from S (also possibly an n-tuple) that indicates the upper bound
on some evaluation, and states that the evaluation cannot get any better than
the designated value; and, Slow s Supp (under the partial ordering s induced
by comparison operator ).
3.1</p>
      <sec id="sec-3-1">
        <title>Examples</title>
        <p>The approach we have discussed for structuring risk evaluations can be used
to capture and analyze endogenous (i.e. structural) as well as exogenous (i.e.
environmental) risk under the same unifying scheme.</p>
        <p>Exogenous risk exists outside the organizational model and is annotated (by
an analyst) to describe the risk of a functional deviation. For example, a common
scale attempts to measure risk as a real (R+) number. Let the risk indicator for
some undesirable event be hR+; min; max; 1; 0i, where:
{ a value from R+ signi es the risk of a functional deviation measured as a
positive real number;
{ the better value when two risk values are compared (a b) is de ned as the
min of those values;
{ the result of a combination between the two risk values (a b) is the max
risk between them;
{ the least preferred value is 1; and,
{ the most preferred value is 0.</p>
        <p>Such a risk indicator could e ectively be used where statistical information
is available. For example, the risk of an untimely operation, where the
timeliness of a result has been previously monitored. Another instantiation could be
hfLow; M ed; Highg; cpI ; cbI ; High; Lowi, where:
{ a value from fLow, Med, Highg signi es the risk of a functional deviation;
{ a comparison between two values will result in the best value given the
ordering: High &lt;s Med &lt;s Low, where for any two a; b 2 A; a &lt;s b states
that b is strictly `better' than a, and a &lt;s b i a cpI b = b;
{ the result of a combination operation cbI applied to two distinct values is
the least preferred of the two;
{ the least preferred value is High; and,
{ the most preferred value is Low.</p>
        <p>Endogenous risk manifests itself within an organizational model. For
example, we could determine the vulnerability (or dependence) for a speci c node as
the set of agents (a 2 2A) on whom the node depends. Let the vulnerability
measure of a node be h2A; ; [; A; ;i, where:
{ 2A is the powerset of A;
{ the comparison operator ( ) is based on the superset relation, where for any
two a; b 2 2A, a s b i a b (the operator in this case would return the
least upper bound in the lattice produced by this partial ordering);
{ the combination operation ([) results in the union of the sets;
{ the least preferred value is A; and,
{ the most preferred value is ;.</p>
        <p>Another interesting endogenous indicator measures node criticality as the set
of agents (a 2 2A) that depend on a node. That is, if the node were to fail, the
agents in the criticality set would be adversely a ected. As such, criticality uses
the same scheme as set forth for vulnerability. The di erence lies in the local
evaluations that provide a basis for propagation (i.e. we consider depender actors
instead of dependees). The capability to capture and combine measurements
from various risk indicators such as these is important.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Propagating Risk Evaluations Across Organizational</title>
    </sec>
    <sec id="sec-5">
      <title>Models</title>
      <p>The evaluation of an element within an organizational model is situated within
the context of all related nodes. For example, the evaluation of a task partaking
within an AN D decomposition (as a root or leaf node) also says something about
the other related tasks. In order to gain a fuller evaluation of risk across an
entire organizational model we provide some general techniques for propagating
bounded evaluations bi-directionally across links within an organizational model.</p>
      <p>The following constraints can provide a basis for propagation, de ned with
respect to alternative re nement patterns within organizational models:
1. AP
2. OP
3. D
s AC1 : : : ACn (parent AP AND decomposed into AC1 ; : : : ; ACn );
s OC1 : : : OCn (parent OP OR decomposed into OC1 ; : : : ; OCn );
s DE (dependency D related to dependee node DE ).</p>
      <p>Informally, the evaluation of: (1) the parent of an AND re nement can be no
better than the combined value of its children; (2) the parent of an OR re nement
can be no better than the best value among its children; and, (3) a dependency
can be no better than the associated node realizing the dependency. These
constraints, in combination with unary constraints for bounds, can provide a means
to deploy constraint solvers in pre-processing or solving mode. Although, some
types of operators and domains may not be completely catered to in traditional
solvers (e.g. the vulnerability measures). The discussion in the following sections
provide some lightweight heuristic guidance for adjusting bounds and resolving
con icts during change. Please note that organizational models do not typically
include cycles.
4.1</p>
      <sec id="sec-5-1">
        <title>Bottom-Up AN D " Propagation</title>
        <p>Given the bounds Slow, Supp of a risk evaluation for some parent node, and a
set of bounds fSlow1 ; Supp1 ; : : : ; Slown ; Suppn g for its children, we compute an
AN D " propagated update of its upper (Su0pp) and lower (Sl0ow) bounds such
that: Su0pp = Supp1 : : : Suppn ; and, Sl0ow = Slow1 : : : Slown ; where is the
combination operator of the associated c-semiring scale. Note that evaluations
of a dependency node from a dependee task propagate using this scheme.
Given the bounds Slow, Supp of a risk evaluation for some child node, and the
bounds of its parent SlowP ; SuppP , we compute an AN D # propagated update of
its lower (Sl0ow) bound such that: Sl0ow = SlowP if Slow s SlowP . Note that
evaluations of a dependency node to a dependee task propagate using this scheme.</p>
      </sec>
      <sec id="sec-5-2">
        <title>Bottom-Up OR " Propagation</title>
        <p>Given the bounds Slow, Supp of a risk evaluation for some parent node, and a
set of bounds fSlow1 ; Supp1 ; : : : ; Slown ; Suppn g for its children, we compute an
OR " propagated update of its upper (Su0pp) and lower (Sl0ow) bounds such
that: Su0pp = Supp1 : : : Suppn ; and, Sl0ow = Slow1 : : : Slown ; where is
the comparison operator, and is the combination operator of the associated
c-semiring scale.</p>
        <p>In this setting we treat the re nement as an inclusive evaluation of the parent
node. We apply the comparison operation to the upper bound of all the children
in order to determine the best possible value for the parent node. We then apply
the combination operation to all the lower bounds of each child to determine the
worst possible value for the parent node.</p>
        <p>Alternatively, we could treat the re nement as exclusive and apply a
pessimistic evaluation of each alternative. In this case, we apply a function to
determine the worst case lower bound of each re nement. The parent node then
inherits an evaluation of its upper and lower bounds from the child[ren] with
this property. That is, Su0pp = Suppi and Sl0ow = Slowi such that i 2 f1; : : : ; ng
and Slowi = min(fSlow1 ; : : : ; Slown g).</p>
        <p>Finally, we could have treated the re nement as exclusive and applied an
optimistic evaluation of each alternative. In this strategy, we apply the
comparison operator to the upper bounds of all child nodes and allow the parent
to inherit the upper and lower bounds of the child[ren] with the best upper
bound. Formally, Su0pp = Suppi and Sl0ow = Slowi such that i 2 f1; : : : ; ng and
Suppi = Supp1 : : : Slown .
4.4</p>
      </sec>
      <sec id="sec-5-3">
        <title>Top-Down OR # Propagation</title>
        <p>Given the bounds Slow, Supp of a risk evaluation for some child node, and the
bounds of its parent SlowP ; SuppP , we compute an OR # propagated update of its
upper (Su0pp) and lower (Sl0ow) bounds such that: Su0pp = SuppP if Supp s SuppP ;
and, Sl0ow = SlowP if Slow s SlowP .
4.5</p>
        <sec id="sec-5-3-1">
          <title>Dependee and Dependency Propagation</title>
          <p>Given the bounds SlowD ; SuppD of an evaluation for a dependency node, and
the bounds Slow, Supp of its dependee node, we compute a propagated update
of its upper (Su0ppD ) and lower (Sl0owD ) bounds such that: Su0ppD = Supp; and,
Sl0owD = Slow. Propagation (or matching) of this kind may also occur in the
opposite direction.
5</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Dealing with Inconsistency During Propagation</title>
      <p>Inconsistencies can be detected during value propagation. Given the current
bounds of a risk evaluation Slow, Supp, a propagation step (Sl0ow, Su0pp) can
result in three types of outcomes:
1. Bound Consistency. The updated bounds are consistent with the current
evaluation (i.e. Su0pp s Supp and Sl0ow s Slow). That is, a propagation
should respect the current lower and upper bounds of a node, i.e. the result
of a propagation should tighten an evaluation.
2. Bound Inconsistency. The updated bounds are inconsistent with the
current evaluation (i.e. Su0pp &gt;s Supp or Sl0ow &lt;s Slow). A relaxation is one type
of update that will inevitably be highlighted as an inconsistency. The
problem here lies in accommodating the relaxation by resolving inconsistencies.
3. Bound Incomparability. One of the updated bounds is incomparable to a
current bound (i.e. Su0pp Supp 2= fSu0pp; Suppg or Sl0ow Slow 2= fSl0ow; Slowg).
The result of the operator on incomparable values is their least upper
bound (lub) in the c-semiring lattice.</p>
      <p>Bound consistency does not necessarily mean that we can accept the update
in a straightforward manner. This is due to situations where the updated bound
is incomparable to the current bound. Dealing with these types of situations is
discussed below.
5.1</p>
      <sec id="sec-6-1">
        <title>Resolving Inconsistency</title>
        <p>Inconsistency may be due to: mixed perspectives of multiple stakeholders /
analysts; the timeliness of each evaluation where the newer evaluation should
succeed an older evaluation; or even, identi ed when two incomparable values are
provided. In any case, strategies are required to deal with such inconsistencies
during propagation. Below we provide a short-list of possible strategies that may
be applied, combined and/or integrated within the framework for risk analysis.
Cautious and Credulous. The cautious strategy selects the worst case for
propagation among the set of alternatives. We can intuitively determine the
worst case within our framework by applying the combination operator when
evaluating the alternative to select.</p>
        <p>Given two sets of bounds Slow, Supp (current) and Sl0ow, Su0pp (updated)
that are inconsistent, we de ne Sl0o0w, Su00pp as the cautious revision of these
inconsistent bounds such that: if Sl0ow s Slow, then Sl0o0w = Sl0ow Slow,
otherwise Sl0o0w = Sl0ow; and if Su0pp s Supp, then Su00pp = Su0pp Supp, otherwise
Su00pp = Su0pp; where is the combination operator of the associated c-semiring.</p>
        <p>The credulous approach is the inverse of the cautious approach. In this
strategy, the analyst will choose to take the best case alternative with the hope that
it will su ce. It is also just as simple to implement the credulous approach via
the use of the comparison operator for each risk evaluation.</p>
        <p>Given two sets of bounds Slow, Supp (current) and Sl0ow, Su0pp (updated)
that are inconsistent, we de ne a Sl0o0w, Su00pp as the credulous revision of these
inconsistent bounds such that: if Sl0ow s Slow, then Sl0o0w = Sl0ow Slow,
otherwise Sl0o0w = Sl0ow; and if Su0pp s Supp, then Su00pp = Su0pp Supp, otherwise
Su00pp = Su0pp; where is the comparison operator of the associated c-semiring.
Model Re-Evaluation. Inconsistencies may reveal a need to re-evaluate an
organizational model. For example, a normative evaluation on a dependency
(e.g. any dependency in Figure 1) may become inconsistent with the descriptive
evaluation on that node. If the measurements provided are valid, either: an
evaluation may need to be relaxed; a goal, or goals, may need to be re-implemented (to
achieve an acceptable evaluation); or, the model may need to be re-con gured.
6</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Analysing Organizational Risk</title>
      <p>Under this framework the organizational model becomes a persistent source
of knowledge that is required to bring together and combine distributed risk
analyses during organizational decision making.
6.1</p>
      <sec id="sec-7-1">
        <title>Modes of Analysis</title>
        <p>The scheme we have discussed allows us to conduct the two broad types of
analysis outlined below.
Analyzing Modal Evaluations. A local risk evaluation for a node on an
organizational model may be either: normative - indicating the acceptable threshold
for an evaluation (that may be propagated from another node); or, descriptive
indicating a current or future risk state within the organization. Distinguishing
between normative and descriptive evaluations provides us with three important
levels of analysis: at the level of normative measurement expectations; between
descriptive and normative evaluations; and, between perceived descriptive
evaluations. This is especially desirable when evaluating organizational models with
multi-modal elements (e.g. the normative nature of dependencies).
Ordering Model Elements. Propagation also provides us with a basis for
ordering elements on an organizational model, based on their bounded evaluations.
Given two sets of bounds Slowi , Suppi and Slowj , Suppj for a speci c risk, the
status of their ordering may be either: strictly better (Slowi &gt;s Suppj );
conceivably better (Suppi &gt;s Suppj , Slowi s Slowj ); incomparable, (Suppi s Suppj and
Slowi s Slowj ). Ordering model elements in this way can help to identify areas
of the model that are more prone to risk (i.e. a risk portfolio), and therefore
requiring speci c attention.
6.2</p>
      </sec>
      <sec id="sec-7-2">
        <title>Evaluation and Propagation</title>
        <p>Below, we illustrate two examples of evaluation and propagation. In Tables 1
and 2, we will use \ujl" to signify the upper and lower bounds of an evaluation.
Propagating Precise Risk Measures in Figure 1. Table 2 summarizes the
local (L) and contextual (C) evaluations for one normative (i.e. L(N) and C(N))
and one descriptive (i.e. L(D) and C(D)) evaluation. The local evaluations
describe the immediate evaluation of a node, prior to propagating the evaluation in
order to contextualize the evaluation of other nodes in a model. Contextualized
evaluations are inferred from the local evaluations, structure of the model and
propagation procedure used. In this example, an initial N ormative evaluation
at the M anage[P ackageRouting] node was provided, indicating that the
aforementioned risk should only ever have a risk value within the range [0; 0:01]. The
prominence of the node resulted in the evaluation being propagated to every
node in the model (i.e. for brevity we have only included interesting evaluations
in Table 1). Next, the Recieve[P ackage] node was evaluated with a descriptive
evaluation of 0:05, resulting in propagation to the Released[ClearedP ackages]
and Release[P ackages] nodes. As a result, the descriptive evaluations at these
nodes have been determined to be inconsistent with the normative evaluation,
requiring resolution.</p>
      </sec>
      <sec id="sec-7-3">
        <title>Propagating Vulnerability Measures in Figure 1. The vulnerability of a</title>
        <p>node is de ned as the set of actors it depends on, including the owner of the
node. In the setting we have described, local evaluation, propagation, and
inconsistency resolution can be completely automated. Although the contextual
evaluation of a node (as in the previous example) can be determined using other
mechanisms (e.g. simple graph traversal), we would like to illustrate how these
evaluations can be determined using the simple and general scheme for
propagating evaluations that we have described. We start by approximating bounds.
Naturally, the upper bound of each dependency (and related depender node)
receive a value consisting of the depender and dependee actors. This indicates
that these nodes are vulnerable to at least this degree. All other nodes receive an
upper bound value consisting of the actor who owns the node. The lower bound
on the other hand, may either: receive the entire domain of actors in the model
- limiting the possibility for further propagation; or, receive the value of the
upper bound as an strong approximation that is resolved using an inconsistency
resolution strategy (e.g. the cautious strategy). Table 2 summarizes the results
of the local evaluation and propagation of vulnerability across Figure 1 in the
case of a strong approximation. For brevity we have only included a subset of
the nodes and their evaluations.</p>
        <p>In this example, each node was assigned a crisp local evaluation indicating
the immediate vulnerability of that node with respect to outgoing dependencies.
For example, the Sort[P ackage] task was given an evaluation of \SF,RAjSF,RA"
since it is owned by the Sort Facility (SF) and depends on the Regulatory
Authority (RA). The result of the propagation nally indicated that the Sort[P ackage]
and Handled[P ackageClearance] nodes are the most vulnerable in our
Transport Organization.
7</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>Conclusion</title>
      <p>Risk is an important consideration during organizational decision making,
however there is little discussion of techniques to further support operational risk
analysis in this setting. We outline a general framework for supporting risk
assessment using rich organizational models. We provide an extensible means to
de ne and incorporate highly con gurable risk metrics for evaluation. The
propagation schemes we have proposed, reduce analyst involvement over previous
approaches, and allow for iterative and distributed evaluation driven by the
detection of inconsistency. Furthermore, model elements can be ordered across
speci c risk-related dimensions to help in focusing attention to speci c problem
prone areas.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Knight</surname>
            ,
            <given-names>F.H.</given-names>
          </string-name>
          :
          <article-title>Risk, uncertainty and pro t</article-title>
          . Hart, Scha ner, and Marx Prize Essays, no.
          <fpage>31</fpage>
          . Boston and New York: Houghton Mi in, Boston and New York (
          <year>1921</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>Modelling Strategic Relationships for Process Reengineering</article-title>
          .
          <source>PhD thesis</source>
          , Graduate Department of Computer Science, University of Toronto, Toronto (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bistarelli</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montanari</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rossi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schiex</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Verfaillie</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fargier</surname>
          </string-name>
          , H.:
          <article-title>Semiring-based csps and valued csps: Frameworks, properties, and comparison</article-title>
          .
          <source>Constraints</source>
          <volume>4</volume>
          (
          <issue>3</issue>
          ) (
          <year>1999</year>
          )
          <volume>199</volume>
          {
          <fpage>240</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Anderson</surname>
          </string-name>
          , E.L., ed.:
          <source>Risk Analysis - An International Journal. Blackwell Publishing</source>
          <volume>(</volume>
          <fpage>1981</fpage>
          -)
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Jaafari</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Management of risks, uncertainties and opportunities on projects: time for a fundamental shift</article-title>
          .
          <source>International Journal of Project Management</source>
          <volume>19</volume>
          (
          <issue>2</issue>
          ) (
          <year>2001</year>
          )
          <volume>89</volume>
          {
          <fpage>101</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Boehm</surname>
            ,
            <given-names>B.W.</given-names>
          </string-name>
          <string-name>
            <surname>DeMarco</surname>
          </string-name>
          , T.:
          <article-title>Software risk management</article-title>
          .
          <source>IEEE Software 14(3)</source>
          (
          <year>1997</year>
          )
          <volume>17</volume>
          {
          <fpage>19</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Holton</surname>
            ,
            <given-names>G.A.</given-names>
          </string-name>
          :
          <article-title>De ning risk</article-title>
          .
          <source>Financial Analysts Journal</source>
          <volume>60</volume>
          (
          <issue>6</issue>
          ) (
          <year>2004</year>
          )
          <volume>19</volume>
          {
          <fpage>25</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Shaw</surname>
            ,
            <given-names>J.C.</given-names>
          </string-name>
          :
          <article-title>Corporate Governance and Risk - A Systems Approach</article-title>
          . John Wiley and Sons Inc, Hoboken, New Jersey (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Pound</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>The promise of the governed corporation</article-title>
          .
          <source>Harvard Business Review</source>
          <volume>73</volume>
          (
          <issue>2</issue>
          ) (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Mathiesen</surname>
          </string-name>
          , H.:
          <article-title>The encyclopedia about corporate governance</article-title>
          . http://www.encycogov.com (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Alberts</surname>
            ,
            <given-names>C.J.:</given-names>
          </string-name>
          <article-title>Common elements of risk</article-title>
          .
          <source>Technical report</source>
          , Carnegie Mellon University, Software Engineering Institute, TN-
          <volume>014</volume>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Gallagher</surname>
            ,
            <given-names>B.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Case</surname>
            ,
            <given-names>P.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Creel</surname>
            ,
            <given-names>R.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kushner</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Williams</surname>
            ,
            <given-names>R.C.</given-names>
          </string-name>
          :
          <article-title>A taxonomy of operational risks</article-title>
          .
          <source>Technical report</source>
          , Carnegie Mellon University, Software Engineering Institute, TR-
          <volume>036</volume>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Alvarez</surname>
          </string-name>
          , G.:
          <article-title>Operational Risk</article-title>
          . Risk
          <string-name>
            <surname>Books</surname>
          </string-name>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Asnar</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giorgini</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Modelling and analysing risk at organizational level</article-title>
          .
          <source>Technical report</source>
          , University of Trento, DIT-
          <volume>06</volume>
          -
          <fpage>063</fpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Bistarelli</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Soft Constraint Solving and Programming: a General Framework</article-title>
          .
          <source>PhD thesis</source>
          , Computer Science Department, University of Pisa (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Harvey</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghose</surname>
            ,
            <given-names>A.K.</given-names>
          </string-name>
          :
          <article-title>Relaxation of soft constraints via a uni ed semiring</article-title>
          .
          <source>In: Proceedings of the 2006 Canadian National Conference on Arti cial Intelligence</source>
          .
          <article-title>(</article-title>
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Bistarelli</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pini</surname>
            ,
            <given-names>M.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rossi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Venable</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Positive and negative preferences</article-title>
          .
          <source>In: Proceedings of the 7th International Workshop on Preferences and Soft Constraints</source>
          . (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>van Lamsweerde</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Letier</surname>
          </string-name>
          , E.:
          <article-title>Handling obstacles in goal-oriented requirements engineering</article-title>
          .
          <source>IEEE Transactions on Software Engineering</source>
          <volume>26</volume>
          (
          <issue>10</issue>
          ) (
          <year>2000</year>
          )
          <volume>978</volume>
          {
          <fpage>1005</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Supakkul</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chung</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Applying a goal-oriented method for hazard analysis: A case study</article-title>
          .
          <source>In: Proceedings of the Fourth International Conference on Software Engineering Research, Management and Applications</source>
          , Los Alamitos, CA, USA, IEEE Computer Society (
          <year>2006</year>
          )
          <volume>22</volume>
          {
          <fpage>30</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20. zur Muehlen,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Rosemann</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <article-title>Integrating risks in business process models</article-title>
          .
          <source>In: Proc.eedings of the 16th Australasian Conference on Information Systems</source>
          , Sydney (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Asnar</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giorgini</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Risk analysis as part of the requirements engineering process</article-title>
          .
          <source>Technical report</source>
          , University of Trento, DIT-
          <volume>07</volume>
          -
          <fpage>014</fpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Giorgini</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mylopoulos</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nicchiarelli</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sebastiani</surname>
          </string-name>
          , J.:
          <article-title>Formal reasoning techniques for goal models</article-title>
          .
          <source>In: Journal on Data Semantics</source>
          . Springer Berlin / Heidelberg (
          <year>2003</year>
          )
          <volume>1</volume>
          {
          <fpage>20</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Feather</surname>
            ,
            <given-names>M.S.</given-names>
          </string-name>
          :
          <article-title>Towards a uni ed approach to the representation of, and reasoning with, probabilistic risk information about software and its system interface</article-title>
          .
          <source>In: Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE'04)</source>
          . (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>