| Foreword |
|
xiii | |
| Preface |
|
xv | |
| Introduction |
|
xvii | |
| Notes on Contributors |
|
xxv | |
|
|
|
xxxv | |
|
PART I INTRODUCTION TO OPERATIONAL RISK MANAGEMENT |
|
|
1 | (38) |
|
1 Risk management: a general view |
|
|
3 | (16) |
|
|
|
|
|
|
|
|
|
3 | (5) |
|
|
|
8 | (1) |
|
|
|
9 | (1) |
|
|
|
9 | (1) |
|
1.5 Enterprise risk management |
|
|
10 | (1) |
|
1.6 State of the art in enterprise risk management |
|
|
11 | (4) |
|
1.6.1 The negative impact of risk silos |
|
|
11 | (2) |
|
1.6.2 Technology's critical role |
|
|
13 | (1) |
|
1.6.3 Bringing business into the fold |
|
|
14 | (1) |
|
|
|
15 | (2) |
|
|
|
17 | (2) |
|
2 Operational risk management: an overview |
|
|
19 | (20) |
|
|
|
|
|
|
|
|
|
19 | (1) |
|
2.2 Definitions of operational risk management |
|
|
20 | (2) |
|
2.3 Operational risk management techniques |
|
|
22 | (8) |
|
2.3.1 Risk identification |
|
|
22 | (2) |
|
|
|
24 | (1) |
|
|
|
25 | (1) |
|
2.3.4 Risk and control assessments |
|
|
25 | (2) |
|
2.3.5 Key risk indicators |
|
|
27 | (1) |
|
2.3.6 Issues and action management |
|
|
28 | (1) |
|
|
|
29 | (1) |
|
2.4 Operational risk statistical models |
|
|
30 | (2) |
|
2.5 Operational risk measurement techniques |
|
|
32 | (3) |
|
2.5.1 The loss distribution approach |
|
|
32 | (1) |
|
|
|
33 | (1) |
|
2.5.3 Balanced scorecards |
|
|
34 | (1) |
|
|
|
35 | (2) |
|
|
|
37 | (2) |
|
PART II DATA FOR OPERATIONAL RISK MANAGEMENT AND ITS HANDLING |
|
|
39 | (86) |
|
3 Ontology-based modelling and reasoning in operational risks |
|
|
41 | (20) |
|
|
|
|
|
|
|
|
|
41 | (6) |
|
|
|
43 | (1) |
|
|
|
43 | (4) |
|
3.2 Generic and axiomatic ontologies |
|
|
47 | (3) |
|
|
|
47 | (1) |
|
3.2.2 Temporal ontologies |
|
|
48 | (2) |
|
3.3 Domain-independent ontologies |
|
|
50 | (4) |
|
|
|
50 | (4) |
|
3.4 Standard reference ontologies |
|
|
54 | (2) |
|
|
|
54 | (1) |
|
|
|
55 | (1) |
|
|
|
55 | (1) |
|
3.5 Operational risk management |
|
|
56 | (2) |
|
3.5.1 IT operational risks |
|
|
56 | (2) |
|
|
|
58 | (1) |
|
|
|
58 | (3) |
|
4 Semantic analysis of textual input |
|
|
61 | (18) |
|
|
|
|
|
|
|
|
|
61 | (1) |
|
4.2 Information extraction |
|
|
62 | (3) |
|
4.2.1 Named entity recognition |
|
|
64 | (1) |
|
4.3 The general architecture for text engineering |
|
|
65 | (1) |
|
4.4 Text analysis components |
|
|
66 | (4) |
|
4.4.1 Document structure identification |
|
|
66 | (1) |
|
|
|
67 | (1) |
|
4.4.3 Sentence identification |
|
|
67 | (1) |
|
4.4.4 Part of speech tagging |
|
|
67 | (1) |
|
4.4.5 Morphological analysis |
|
|
68 | (1) |
|
|
|
68 | (1) |
|
|
|
68 | (1) |
|
|
|
68 | (1) |
|
4.4.9 Orthographic co-reference |
|
|
69 | (1) |
|
|
|
70 | (1) |
|
|
|
70 | (3) |
|
4.6 Ontology-based information extraction |
|
|
73 | (2) |
|
4.6.1 An example application: market scan |
|
|
74 | (1) |
|
|
|
75 | (1) |
|
|
|
76 | (1) |
|
|
|
77 | (2) |
|
5 A case study of ETL for operational risks |
|
|
79 | (20) |
|
|
|
|
|
|
|
79 | (2) |
|
5.2 ETL (Extract, Transform and Load) |
|
|
81 | (3) |
|
|
|
82 | (1) |
|
5.2.2 Modeling the conceptual ETL work |
|
|
82 | (1) |
|
5.2.3 Modeling the execution of ETL |
|
|
83 | (1) |
|
5.2.4 Pentaho data integration |
|
|
83 | (1) |
|
5.3 Case study specification |
|
|
84 | (7) |
|
5.3.1 Application scenario |
|
|
84 | (1) |
|
|
|
85 | (2) |
|
5.3.3 Data merging for risk assessment |
|
|
87 | (2) |
|
5.3.4 The issues of data merging in Musing |
|
|
89 | (2) |
|
5.4 The ETL-based solution |
|
|
91 | (4) |
|
5.4.1 Implementing the `map merger' activity |
|
|
92 | (1) |
|
5.4.2 Implementing the `alarms merger' activity |
|
|
93 | (1) |
|
5.4.3 Implementing the `financial merger' activity |
|
|
94 | (1) |
|
|
|
95 | (1) |
|
|
|
95 | (4) |
|
6 Risk-based testing of web services |
|
|
99 | (26) |
|
|
|
|
|
|
|
99 | (4) |
|
|
|
103 | (3) |
|
|
|
103 | (1) |
|
6.2.2 Web services progressive group testing |
|
|
104 | (1) |
|
6.2.3 Semantic web services |
|
|
105 | (1) |
|
|
|
106 | (1) |
|
|
|
107 | (7) |
|
6.4.1 Semantic web services analysis |
|
|
107 | (3) |
|
6.4.2 Failure probability estimation |
|
|
110 | (2) |
|
6.4.3 Importance estimation |
|
|
112 | (2) |
|
6.5 Risk-based adaptive group testing |
|
|
114 | (3) |
|
6.5.1 Adaptive measurement |
|
|
115 | (2) |
|
|
|
117 | (1) |
|
|
|
117 | (1) |
|
|
|
118 | (3) |
|
|
|
121 | (4) |
|
PART III OPERATIONAL RISK ANALYTICS |
|
|
125 | (44) |
|
7 Scoring models for operational risks |
|
|
127 | (10) |
|
|
|
|
|
127 | (1) |
|
|
|
128 | (2) |
|
|
|
130 | (3) |
|
7.4 Integrated scorecard models |
|
|
133 | (1) |
|
|
|
134 | (1) |
|
|
|
134 | (3) |
|
8 Bayesian merging and calibration for operational risks |
|
|
137 | (12) |
|
|
|
|
|
137 | (1) |
|
8.2 Methodological proposal |
|
|
138 | (3) |
|
|
|
141 | (7) |
|
|
|
148 | (1) |
|
|
|
148 | (1) |
|
9 Measures of association applied to operational risks |
|
|
149 | (20) |
|
|
|
|
|
|
|
149 | (4) |
|
9.2 The arules R script library |
|
|
153 | (1) |
|
|
|
154 | (9) |
|
9.3.1 Market basket analysis |
|
|
154 | (1) |
|
9.3.2 PBX system risk analysis |
|
|
155 | (5) |
|
9.3.3 A bank's operational risk analysis |
|
|
160 | (3) |
|
|
|
163 | (3) |
|
|
|
166 | (3) |
|
PART IV OPERATIONAL RISK APPLICATIONS AND INTEGRATION WITH OTHER DISCIPLINES |
|
|
169 | (112) |
|
10 Operational risk management beyond AMA: new ways to quantify non-recorded losses |
|
|
171 | (28) |
|
|
|
|
|
|
|
|
|
171 | (3) |
|
10.1.1 The near miss and opportunity loss project |
|
|
171 | (1) |
|
10.1.2 The `near miss/opportunity loss' service |
|
|
172 | (1) |
|
10.1.3 Advantage to the user |
|
|
173 | (1) |
|
10.1.4 Outline of the chapter |
|
|
173 | (1) |
|
10.2 Non-recorded losses in a banking context |
|
|
174 | (3) |
|
10.2.1 Opportunity losses |
|
|
174 | (1) |
|
|
|
175 | (2) |
|
|
|
177 | (1) |
|
|
|
177 | (7) |
|
10.3.1 Measure the non-measured |
|
|
177 | (1) |
|
10.3.2 IT events vs. operational loss classes |
|
|
178 | (2) |
|
10.3.3 Quantification of opportunity losses: likelihood estimates |
|
|
180 | (1) |
|
10.3.4 Quantification of near misses: loss approach level |
|
|
181 | (3) |
|
10.3.5 Reconnection of multiple losses |
|
|
184 | (1) |
|
10.4 Performing the analysis: a case study |
|
|
184 | (11) |
|
10.4.1 Data availability: source databases |
|
|
184 | (2) |
|
|
|
186 | (1) |
|
10.4.3 Critical path of IT events: Bayesian networks |
|
|
187 | (2) |
|
10.4.4 Steps of the analysis |
|
|
189 | (5) |
|
10.4.5 Outputs of the service |
|
|
194 | (1) |
|
|
|
195 | (1) |
|
|
|
196 | (3) |
|
11 Combining operational risks in financial risk assessment scores |
|
|
199 | (16) |
|
|
|
|
|
|
|
11.1 Interrelations between financial risk management and operational risk management |
|
|
199 | (1) |
|
11.2 Financial rating systems and scoring systems |
|
|
200 | (2) |
|
11.3 Data management for rating and scoring |
|
|
202 | (2) |
|
11.4 Use case: business retail ratings for assessment of probabilities of default |
|
|
204 | (4) |
|
11.5 Use case: quantitative financial ratings and prediction of fraud |
|
|
208 | (2) |
|
11.6 Use case: money laundering and identification of the beneficial owner |
|
|
210 | (3) |
|
|
|
213 | (1) |
|
|
|
214 | (1) |
|
12 Intelligent regulatory compliance |
|
|
215 | (24) |
|
|
|
|
|
|
|
12.1 Introduction to standards and specifications for business governance |
|
|
215 | (2) |
|
12.2 Specifications for implementing a framework for business governance |
|
|
217 | (5) |
|
12.2.1 Business motivation model |
|
|
218 | (1) |
|
12.2.2 Semantics of business vocabulary and business rules |
|
|
219 | (3) |
|
12.3 Operational risk from a BMM/SBVR perspective |
|
|
222 | (3) |
|
12.4 Intelligent regulatory compliance based on BMM and SBVR |
|
|
225 | (7) |
|
12.4.1 Assessing influencers |
|
|
227 | (1) |
|
12.4.2 Identify risks and potential rewards |
|
|
227 | (2) |
|
12.4.3 Develop risk strategies |
|
|
229 | (1) |
|
12.4.4 Implement risk strategy |
|
|
229 | (1) |
|
12.4.5 Outlook: build adaptive IT systems |
|
|
229 | (3) |
|
12.5 Generalization: capturing essential concepts of operational risk in UML and BMM |
|
|
232 | (4) |
|
|
|
236 | (1) |
|
|
|
237 | (2) |
|
13 Democratisation of enterprise risk management |
|
|
239 | (14) |
|
|
|
|
|
|
|
|
|
|
|
13.1 Democratisation of advanced risk management services |
|
|
239 | (1) |
|
13.2 Semantic-based technologies and enterprise-wide risk management |
|
|
240 | (3) |
|
13.3 An enterprise-wide risk management vision |
|
|
243 | (2) |
|
13.4 Integrated risk self-assessment: a service to attract customers |
|
|
245 | (4) |
|
13.5 A real-life example in the telecommunications industry |
|
|
249 | (1) |
|
|
|
250 | (1) |
|
|
|
251 | (2) |
|
14 Operational risks, quality, accidents and incidents |
|
|
253 | (28) |
|
|
|
|
|
14.1 The convergence of risk and quality management |
|
|
253 | (3) |
|
14.2 Risks and the Taleb quadrants |
|
|
256 | (2) |
|
|
|
258 | (4) |
|
14.4 Risks, accidents and incidents |
|
|
262 | (2) |
|
14.5 Operational risks in the oil and gas industry |
|
|
264 | (8) |
|
14.6 Operational risks: data management, modelling and decision making |
|
|
272 | (1) |
|
|
|
273 | (1) |
|
|
|
274 | (7) |
| Index |
|
281 | |