Chapter 4
Risk Assessment Techniques
4.1
4.1.1
Techniques for Risk Assessment
An Overview
Various tools and methods are used for the assessment of risk. Some of these tools
and methods are here presented.
As presented in Sect. 3.1.2, risk assessment includes (Fig. 4.1):
• Risk identification
• Risk Analysis
• Risk Evaluation
4.1.2
Risk Assessment Techniques as Per ISO/IEC
31010:2009
“ISO/IEC 31010:2009 Risk management—Risk assessment techniques” is a standard dedicated to risk assessment techniques. It is a supporting standard for “ISO
31000 Risk management—Principles and guidelines” and guides how to select and
apply systematic techniques for risk assessment. It includes 31 different techniques,
although some techniques converge. It is not critical that managers know all of
them but knowing more about these techniques will help managers better align the
risk assessment process with the risk assessment objectives.
The risk assessment techniques can be classified as following (Fig. 4.2)
• risk identification
• risk analysis
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021
K. Tzanakakis, Managing Risks in the Railway System, Springer Tracts
on Transportation and Traffic 18, https://doi.org/10.1007/978-3-030-66266-0_4
113
114
4 Risk Assessment Techniques
Fig. 4.1 Risk assessment
Fig. 4.2 Classification of risk assessment techniques
–
–
–
–
–
–
consequence analysis
qualitative,
semi-quantitative or
quantitative probability estimation
assessing the effectiveness of any existing controls
estimation the level of risk
• risk evaluation
Next Fig. 4.3 presents the various types of risk assessment techniques as per
ISO/IEC 31010:2009.
4.1 Techniques for Risk Assessment
115
Fig. 4.3 Types of risk assessment techniques
The techniques suitable for the various risk assessment types are presented in
Fig. 4.4. Techniques providing quantitative outputs are marked with a bold frame.
Table 4.1 presents the applicability of tools used for risk assessment as per ISO/
IEC 31010:2009 (Annex A, Table A). The techniques described in the next sections
are indicated in Table 4.1 with a reference to the related Section. In Annex A of
ISO, all techniques are described in detail. Column 7 of Table 4.1 is referring to the
related Section of the ISO.
4.1.3
Look-Up Methods
116
4 Risk Assessment Techniques
Fig. 4.4 Techniques suitable for the various risk assessment types
Tools and techniques
Sections
Risk assessment process
Risk analysis
Risk
identification
Consequence
Probability
Risk
evaluation
See Annex A
of ISO
1B
2
3
4
6
7
Brainstorming
Structured or semi-structured
interviews
Delphi simulation technique
Checklist analysis
Preliminary hazard analysis
Hazard and operability studies
(HAZOP)
Hazard Analysis and Critical Control
Points (HACCP)
Environmental risk assessment
Structure « What if? » (SWIFT)
Scenario analysis
Business impact analysis
Root cause analysis
Failure mode effect analysis (FMEA
and FMECA)
Fault tree analysis (FTA)
Event tree analysis
Cause and consequence analysis
Cause-and-effect analysis
4.1.4.2
4.1.4.1
++
++
o
o
o
o
o
o
o
o
B 01
B 02
4.1.4.3
4.1.3.1
4.1.3.2
4.1.6.3
++
++
++
++
o
o
o
++
o
o
o
+
o
o
o
+
o
o
o
+
B
B
B
B
++
++
o
o
++
B 07
++
++
++
+
o
++
++
++
++
++
++
++
++
++
+
+
++
++
++
++
+
+
++
++
++
++
+
+
++
++
B
B
B
B
B
B
08
09
10
11
12
13
+
+
+
++
o
++
++
++
++
+
++
o
+
+
+
o
+
o
+
o
B
B
B
B
14
15
16
17
(continued)
4.1.5.1
4.1.6.1 and
4.1.6.2
4.1.5.2
4.1.5.3
03
04
05
06
117
1A
Level of
risk
5
4.1 Techniques for Risk Assessment
Table 4.1 Applicability of tools used for risk assessment (based on ISO/IEC 31010:2009, Annex A, Table A)
Tools and techniques
1A
Sections
1B
4.1.9.1
4.1.7.1
4.1.8.1
4.1.9.2
Risk assessment process
Risk analysis
Risk
identification
Consequence
Probability
2
3
+
o
++
o
++
+
+
o
o
+
+
++
+
+
++
++
++
+
++
o
++
o
++
++
++
++
++
++
Risk
evaluation
See Annex A
of ISO
4
Level of
risk
5
6
7
+
++
++
++
++
o
o
o
o
++
++
++
+
+
+
+
++
++
++
o
o
o
o
+
+
++
+
++
o
+
+
+
++
o
o
++
++
++
++
+
+
+
B
B
B
B
B
B
B
B
B
B
B
B
B
B
18
19
20
21
22
23
24
25
26
27
28
29
30
31
4 Risk Assessment Techniques
Layer protection analysis (LOPA)
Decision tree
Human reliability analysis
Bow tie analysis
Reliability centred maintenance
Sneak circuit analysis
Markov analysis
Monte Carlo simulation
Bayesian statistics and Bayes Nets
FN curves
Risk indices
Consequence/probability matrix
Cost/benefit analysis
Multi-criteria decision analysis
(MCDA)
++: Strongly applicable
+: Applicable
∘: Not applicable
118
Table 4.1 (continued)
4.1 Techniques for Risk Assessment
4.1.3.1
119
Checklist Analysis
Risk identification checklists are lists of hazards, risks or control failures developed
based on historical information and knowledge that has been accumulated from
previous similar cases and other sources of information, either as a result of a
previous risk assessment or as a result of past failures.
4.1.3.2
Preliminary Hazard Analysis
The Preliminary Hazard Analysis identifies safety-critical areas, provides an initial
assessment of hazards and identifies requisite hazard controls and follow-on
actions. The Preliminary Hazard Analysis is used to obtain an initial risk assessment
of the system hazards.
The preliminary hazard analysis (PHA) technique is a broad, initial study used in
the early stages of system design. It focuses on
1. identifying apparent hazards,
2. assessing the severity of potential accidents that could occur involving the
hazards, and
3. identifying safeguards for reducing the risks associated with the hazards. This
technique focuses on identifying weaknesses early in the life of a system, thus
saving time and money that might be required for major redesign if the hazards
were discovered at a later date.
PHA relies on brainstorming and expert judgment to assess the significance of
hazards and assign a ranking to each situation. This helps in prioritizing recommendations for reducing risks. It is applicable to any activity or system and can be
used as a high-level analysis early in the life of a process. It generates qualitative
descriptions of the hazards related to a process. Provides a qualitative ranking of the
hazardous situations; this ranking can be used to prioritize recommendations for
reducing or eliminating hazards in subsequent phases of the life cycle.
Quality of the evaluation depends on the quality and availability of documentation, the training of the review team leader with respect to the various analysis
techniques employed, and the experience of the review teams.
PHA focuses predominantly on identifying and classifying hazards rather than
evaluating them in detail. It is most often conducted early in the development of an
activity or system, when there is little detailed information, or there are few
operating procedures. Often a precursor to further risk assessment.
Next, an example is provided of a completed PHA table (Fig. 4.5) documenting
the findings of an analysis team.
120
4 Risk Assessment Techniques
Fig. 4.5 Example of a completed PHA table
4.1.4
Supporting Methods
4.1.4.1
Interviewing (Structured or Semi-structured)
In this technique, people with previous experience in similar cases to yours or those
with specialized knowledge or industry expertise are interviewed. For a structured
interview, a set of questions is prepared in advance and individual interviewees are
asked to tell you about any risks that they’ve experienced or that they think might
happen on your case. It encourages the interviewee to view a situation from a
different perspective and thus identify risks from that perspective. A semi-structured
interview is more a conversation, allows more freedom and aims to explore issues
which could arise.
4.1.4.2
Brainstorming
Brainstorming is a way to expand your thinking on a topic. Brainstorming is a
technique for gathering ideas, typically, from a group, to identify potential failure
4.1 Techniques for Risk Assessment
121
modes and associated hazards, risks, criteria for decisions and/or options for
treatment. The group could be subject matter experts, team members, risk management team members, and anyone else who might benefit the process of the risk
identification process. The technique is to ask them to start identifying possible risk
events. The idea behind brainstorming is that one person’s idea might spawn
another idea, and so on so that by the end of the session you’ve identified all the
possible risks.
Brainstorming can be used as a standalone technique or in combination with
other risk assessment methods described briefly next or in detail in the ISO 31010.
It can be used at any stage of the risk management process and any stage of the life
cycle of a system.
4.1.4.3
The Delphi Method
The name “Delphi Method” refers to the Oracle of Delphi, a priestess at a temple of
Apollo in ancient Greece known for her prophecies.
The Delphi method allows experts to work towards a convergent solution, a
mutual agreement to a specific problem, by conducting a circulating series of
questionnaires and releasing related feedback to further the discussion with each
subsequent round. The experts’ responses shift as rounds are completed based on
the information brought forth by other experts participating in the analysis. The first
and very important step is to select a panel of individuals who have experience in
the area at issue, they may be from both inside and outside the Organization. It is
recommended, the panel members should not know each other, and the process
should be conducted with members being at separate locations.
Delphi members are given a questionnaire to identify potential risks. They, in
turn, send their responses back to the facilitator of this process. All the responses
are organized by content and sent back to the experts for further input, additions, or
comments, who then send their comments back one more time, and the facilitator
elaborates a final list of risks. The process is continued until group responses
converge to a specific solution.
The Delphi technique is a lot like brainstorming, only the people participating in
the meeting do not necessarily know each other, and as mentioned, the people
participating in this technique can be located at different places and usually participate anonymously. Emails can be used to facilitate the Delphi technique. The
Delphi technique is a great tool that allows consensus to be reached quickly. One
advantage is that it prevents persons to be unduly influenced by others in the group
and in this way it is preventing bias in the outcome because the Delphi members
usually do not know each other and also they usually do not know how others in the
group responded.
122
4.1.5
4 Risk Assessment Techniques
Scenario Analysis
Techniques providing quantitative outputs, are marked with a bold frame (ISO/IEC
31010:2009).
4.1.5.1
Root Cause Analysis
Root cause analysis (RCA) (Fig. 4.6) is a method of problem-solving used for
identifying the root causes of faults or problems. A factor is considered a root cause
if removal thereof from the problem-fault-sequence prevents the final undesirable
outcome from recurring; whereas a causal factor is one that affects an event’s
outcome but is not a root cause. Though removing a causal factor an outcome can
benefit, but it does not prevent its recurrence with certainty.
Fig. 4.6 Root cause analysis (RCA)
4.1 Techniques for Risk Assessment
123
Essentially it is based on four general principles:
•
•
•
•
Define and describe properly the event or problem (‘five whys’ technique).
Establish a timeline from a normal situation until the final crisis or failure.
Distinguish between root causes and causal factor.
Once implemented (and with constant execution), RCA is transformed into a
method of problem prediction.
The diagrams used with this type of analysis are sometimes known as fishbone
diagrams because they look like the skeleton of a fish. The technique was developed
by Professor Ishikawa in the 1960s.
4.1.5.2
Fault Tree Analysis (FTA)
Fault Tree Analysis (FTA) is a technique for identifying and analysing factors that
can contribute to a specified undesired event (called the “top event”). It can be used
to predict the most likely failure in a system breakdown (Fig. 4.7).
Fault Tree Analysis may be used qualitatively to identify potential causes and
pathways to a failure (the top event) or quantitatively to calculate the probability of
the top event, given knowledge of the probabilities of causal events.
Fig. 4.7 Fault Tree Analysis (FTA)
124
4 Risk Assessment Techniques
This analysis method is mainly used in the field of safety engineering and
reliability engineering to determine the probability of a safety accident or a particular system level (functional) failure.
This technique is presented in EN 61025:2007 (“Fault tree analysis [FTA]”).
4.1.5.3
Even Tree Analysis (ETA)
This analysis technique is used to analyse the effects of functioning or failed systems given that an event has occurred. ETA is a powerful tool that will identify all
consequences of a system that have a probability of occurring after an initiating
event that can be applied to a wide range of systems (Fig. 4.8).
This technique may be applied to a system early in the design process to identify
potential issues that may arise, rather than correcting the issues after they occur.
With this forward logic process, use of ETA as a tool in risk assessment can help to
prevent negative outcomes from occurring, by providing a risk assessor with the
probability of occurrence. ETA uses a type of modelling technique called event
tree, which branches events from one single event using Boolean logic.
This technique is presented in EN 62502:2011 (“Analysis techniques for
dependability. Event tree analysis (ETA)”).
4.1.6
Function Analysis
Techniques providing quantitative outputs are marked with a bold frame (ISO/
IEC 31010:2009).
4.1.6.1
Failure Mode and Effects Analysis (FMEA)
FMEA is a structured process to identify the potential failure modes of the elements
of a system, the causes of these failures, and their effects. Failure modes are
identified for each component, and the effects of each failure mode on larger
assemblies and the whole system are identified. Some of these effects may include
hazards.
Potential failure modes can be identified based on past experience with similar
products or processes, enabling the team to design those failures out of the system
4.1 Techniques for Risk Assessment
125
Fig. 4.8 Event Tree analysis of a fire—a simple example
with the minimum of effort and resource expenditure, thereby reducing development time and costs.
Every product or process is subject to different types or modes of failure and the
potential failures all have consequences or effects.
• Identify the potential failures and the associated relative risks designed into a
product or process
• Prioritize action plans to reduce those potential failures with the highest relative
risk
• Track and evaluate the results of the action plans
An example is provided in the next Fig. 4.9.
Column 1:
Column 2:
Column 3:
What is the component or process?
What is the intended function(s)?
A potential failure mode represents any manner in which the
component or process step could fail to perform its intended
function or functions (i.e. rail may crack/break)
Column 4:
What are the potential causes of failure?
Column 5:
What is the effect(s) if the component or the process fails?
Column 6:
on a scale 1–10 rate the likelihood of each failure (10 = max)
Column 7:
on a scale 1–10 rate the severity of each failure (10 = max)
Column 8:
on a scale 1–10 rate the detectability of each failure (10 = least
detectable (Very rare likelihood of detecting failure mode)/
1 = Almost certain detection of failure mode)
Column 9:
RiskRisk Priority Number (RPN) is the combined weight of
Likelihood, Severity and Detectability
Column 10:
Recommended Corrective Action to mitigate the risks
Columns 11–14: new likelihood, severity and detectability, after recommended
actions
Cause(s)
Of
Failure
Effect(s) Of
Failure
1
2
3
4
5
6
7
8
(L)*(S)*(D)
Failure Mode(s)
(Risk Priority Number)
Component
Funcon
Detecon Index
(D)
RPN
Component /
Process
Severity (S)
4 Risk Assessment Techniques
Likelihood (L)
126
9
Recommended Acon
new Likelihood
(L)
new Severity
(S)
new Detecon
Index (D)
new RPN
(L)*(S)*(D)
Aer Acons Taken
10
11
12
13
14
Fig. 4.9 A template for the “Failure Mode and Effects Analysis (FMEA)”
For further guidance see “EN 60812:2006—Analysis techniques for system
reliability. Procedure for failure mode and effects analysis (FMEA)”.
4.1.6.2
Failure Mode, Effects and Criticality Analysis (FMECA)
Failure Mode, Effects and Criticality Analysis (FMECA) is an extension of FMEA
by including a criticality analysis, which is used to chart the probability of failure
modes against the severity of their consequences. The result highlights failure
modes with relatively high probability and severity of consequences, allowing
remedial effort to be directed where it will produce the greatest value.
4.1.6.3
A Hazard and Operability Study (HAZOP)
A structured and systematic examination of a planned or existing process or
operation in order to identify and evaluate problems that may represent risks to
personnel or equipment or prevent efficient operation. A HAZOP is a qualitative
technique based on guide-words and is carried out by a multi-disciplinary team
(HAZOP team) during a set of meetings, to assess the hazard potential that arises
from deviation in design specifications and the consequential effects on the facilities
as a whole.
4.1 Techniques for Risk Assessment
127
This technique is usually performed using a set of guide words: NO/NOT,
MORE/LESS OF, AS WELL AS, PART OF REVERSE, AND OTHER THAN.
From these guidewords, scenarios that may result in a hazard or an operational
problem are identified. Consider the possible flow problems in a process line, the
guide word MORE OF will correspond to high flow rate, while that for
LESS THAN, low flow rate. The consequences of the hazard and measures to
reduce the frequency with which the hazard will occur are then discussed.
This technique had gained wide acceptance in process industries as an effective
tool for plant safety and operability improvements.
For further guidance, see EN 61882:2016—Hazard and operability studies
(HAZOP studies). Application guide
4.1.7
Controls Assessment
Techniques providing quantitative outputs are marked with a bold frame (ISO/IEC
31010:2009).
4.1.7.1
Bow Tie Analysis
The method takes its name from the shape of the diagram that you create, which
looks like a men’s bowtie (Fig. 4.10).
Bow tie is using a graphical representation and is describing and analysing the
pathways of a risk from causes to consequences. It combines the fault tree analysing
(cause of an event represented by the knot of a bow tie) and the event tree analysis
(analysing the consequences).
A Bowtie diagram is also identifying control measures an Organization has to
take to treat the risks.
Once the control measures are identified, the Bowtie method takes it one step
further and identifies the ways in which control measures fail.
Besides the basic Bowtie diagram, management systems should also be considered and integrated with the Bowtie. Integrating the management system in a
Bowtie demonstrates how An Organization manages hazards. The Bowtie can also
be used effectively to assure that Hazards are managed to an acceptable level
(ALARP).
128
4 Risk Assessment Techniques
Fig. 4.10 Bowtie diagram
4.1.8
Statistical Methods
Techniques providing quantitative outputs are marked with a bold frame (ISO/
IEC 31010:2009).
4.1.8.1
Monte Carlo Simulation
Scientists working on the atom bomb first used the technique; it was named for
Monte Carlo, the Monaco resort town made famous by its casinos. With games of
chance, all the possible outcomes and probabilities are known, but the set of future
outcomes is unknown. It is up to the analyst to determine the set of outcomes and
the probability that they will occur. In Monte Carlo simulation, the analyst runs
multiple trials (often thousands) to determine all the possible outcomes and the
probability that they will take place. It lets you see all the possible outcomes of your
decisions and assess the impact of risk, allowing for better decision making under
uncertainty. The essential idea is using randomness to solve problems that might be
deterministic in principle. In principle, Monte Carlo methods can be used to solve
any problem having a probabilistic interpretation.
Monte Carlo model approximates solutions to quantitative problems through
statistical sampling.
It is a decision-making tool that integrates the concept that every decision will
have some impact on overall risk. The probability distributions produced by a
Monte Carlo model create a picture of risk. Because of advances in software, very
complex Monte Carlo models can be designed and executed by anyone with access
to a personal computer.
4.1 Techniques for Risk Assessment
129
Since its introduction in World War II, Monte Carlo simulation has been used to
model a variety of physical and conceptual systems.
4.1.9
Other Techniques
4.1.9.1
Decision Tree Analysis
A Decision Tree Analysis is a graphic representation of various alternative solutions
that are available to solve a problem. It is a diagram that shows the implications of
choosing one or other alternatives. The manner of illustrating often proves to be
decisive when making a choice. Because each decision or event node has at least two
alternatives, the structure of the decision looks like a tree, typically placed on its side
with the root on the left and the branches on the right, with potentially many branches.
4.1.9.2
Cost-Benefit Analysis
Introduction
Cost-benefit analysis (CBA) is a useful tool for organizing, assessing and finally
presenting the cost and benefits, and pros and cons of interventions [1]. A CBA
allows comparisons between all the possible alternatives to assist the
decision-makers in examining the most profitable safety measure to invest.
Risk is commonly defined as the probability of potential impacts affecting
people, assets or the environment. Natural disasters may cause a variety of effects
which are usually classified into social, economic, and environmental impacts as
well as according to whether they are triggered directly by the event or occur over
time as indirect or macroeconomic effects (Fig. 4.11).
Two important issues deserve special attention when conducting a CBA [1].
1. Assessment of risk: The analysis should be done by analyses that should take
account of the probability of future disaster events occurring (stochastic manner), in order to account for the specific nature of natural hazards and associated
disaster impacts.
Fig. 4.11 Disaster, risk and categories of potential disaster impacts (as per [1])
130
4 Risk Assessment Techniques
2. Assessment of avoided risks: As disaster risk is a downside risk, benefits are the
risks avoided. The core benefit generated by investments in disaster risk management is the reduction in future impacts and losses.
Estimating the economic efficiency of an intervention, benefits and costs need to
be compared. Costs and benefits arising over time need to be discounted to render
current and future effects comparable. From an economic point of view, $1 today
has more value than $1 in 10 years; thus future values need to be discounted by a
discount rate representing the preference for the present over the future.
Furthermore, costs and benefits are compared under a common economic efficiency
decision criterion to assess whether benefits exceed costs.
Cost-benefit analysis (CBA) provides an objective means of comparing the costs
and benefits of the risk without treatment and the comparable costs and benefits of
the treated risk (Fig. 4.12).
There should be a consistent approach to comparing the costs and benefits of
different options. All the benefits should be considered: both direct benefits and
indirect benefits as also both direct and indirect costs. Costs and benefits may be
quantitative or qualitative.
Benefits can arise:
a. Directly from the reduction in risk.
b. Increased opportunities.
c. Indirectly such as from greater management confidence, savings such as
insurance premium reductions, or improvements in intangibles like reputation or
credit rating.
Fig. 4.12 Relation between the level of safety and related cost
4.1 Techniques for Risk Assessment
131
Costs can be:
a. Direct costs related with treatment options and their implementation.
b. Increased risk of negative outcomes or reduced opportunities.
c. Indirect costs such as loss of productivity, disruption from core business
activities, management time, etc.
Three decision criteria are of significant importance in CBA [2]:
• See section Net Present Value (NPV).
• See section Cost Benefit Ratio.
• Internal Rate of Return (IRR): Whereas the above two criteria use a fixed discount rate, this criterion calculates the interest rate internally, which represents the
return on investments in the given project. A project is rated desirable if this IRR
surpasses the average return of public capital determined beforehand (i.e. 12%).
The Net Present Value (NPV)
The NPV is the most useful and one of the most commonly used criteria for
determining whether an intervention should be accepted. The net present value
formula is:
NPV ¼
n
X
ðBt
t¼0
Ct Þ
ð1 þ rÞt
where,
Bt are benefits in period t
Ct are costs in period t
r is the appropriate financial or economic discount rate
n is the number of years for which the project will operate
For input to our calculation, future costs are converted to their current equivalent
by using a suitable discount rate: in the analysis of the interventions, any costs and
benefits of an intervention that are received in future periods are discounted, or
deflated by some factor, r. The factor used to discount future costs and benefits is
called the discount rate and is usually expressed as a percentage.
Example:
100 USD receivable today is more than 100 USD receivable a year later, as 1000 USD
received today will earn interest or profits and shall accumulate to more than 100 USD in a
year. Alternatively, 100 USD received today can be used to reduce borrowing thereby
avoiding interest payments as well as reducing debts by 100 USD. Assuming that the
Railways’ cost of finance is its current dividend rate (say 6% per year), USD 106 received a
year hence should be worth 100 USD today and 100 0USD which may be received in a year
is worth about 94 USD today (actually it is worth 94.34 USD). Likewise, the present value
of 100 USD receivable 2 years hence is about 89 USD, and so on. In this way, the cash
flow for the intervention in any future year can be discounted to obtain the present value.
132
4 Risk Assessment Techniques
For example, suppose an intervention is expected to yield a stream of benefits
equal to B0, B1, B2, …, Bn and to incur a stream of costs equal to C0, C1, C2, …, Cn
in years 0, 1, 2, …, n. Then in each period, the net benefits (benefits minus costs) of
the project will be:
(B0–C0), (B1–C1), (B2–C2), …, (Bn–Cn)
This is simply the intervention’s net benefit flow.
If the discount rate, r, is constant, then the discounted cash flow of the project
can be represented as:
Year
Year 0
Year 1
Benefit flow
B0–C0
Year 2
ðB1 C1 Þ
ð1 þ rÞ2
Year 3
ðB1 C1 Þ
ð1 þ rÞ3
Year n
ðB1 C1 Þ
ð1 þ rÞn
ðB1 C1 Þ
ð1 þ rÞ
Once future net income streams have been discounted in this way, expenditures
and revenues from all the different time periods will be valued in units of similar
value—present day units of currency. They will then be directly comparable with
each other and can be added together. Adding the discounted net benefits from each
year of the intervention, life, its discounted net benefit flow, gives a single monetary
value called the intervention’s net present value, NPV. For, the previous example,
the intervention’s NPV is:
The net present value criterion of an intervention is the single most important
measure of the intervention’s worth.
In the above Table 4.2, an r = 6% discount rate is used to discount the net
benefits of a railway intervention. The intervention’s NPV can then be estimated by
just adding up these discounted net benefits. Columns (1), (2) and (3) show the
non-discounted costs, benefits and net benefits (benefits-costs) of the railway
intervention.
Column (4) gives the discount factor, 1/(1 + r)t, by which the non-discounted net
benefits in column (3) are multiplied, to obtain the discounted value of these net
benefits in each year, t, shown in column (5). These discounted net benefits can then
be added together to obtain the total discounted net benefits, or net present value, of
the intervention.
The bottom line of the table shows that the NPV comes to 57.06 million USD if
a 6% discount rate is used. An NPV higher than zero indicates that the discounted
benefits of the intervention are expected to be higher than its discounted costs and
the intervention will, therefore, be worth undertaking.
4.1 Techniques for Risk Assessment
133
Table 4.2 Example: Cash flow of an intervention—discounted at 6% discount rate (million USD)
(3)=(2)-(1)
Discount
Factor
1/(1+r)t
(4)
(5)=(3)*(4)
0
-100
1
-100,00
400
50
-350
0,943
-330,19
2
200
150
-50
0,890
-44,50
3
100
200
100
0,840
83,96
4
100
200
100
0,792
79,21
5
100
200
100
0,747
74,73
6
100
200
100
0,705
70,50
7
100
200
100
0,665
66,51
8
100
350
250
0,627
156,85
Total
1.300
1.550
250
Costs
Benefits
(B)
Net
Benefits
(1)
(2)
0
100
1
Year
(t)
NPV =
Net
Benefits
57,06
This example illustrates how crucially the estimation of an intervention’s NPV
depends on the discount rate employed.1 A lower discount rate would have deflated
future income by less and increased NPV of the intervention. A higher discount rate
would have deflated future income more heavily and decreased the NPV of the
intervention, possibly changing it from positive to negative. The selection of the
appropriate discount rate is, therefore, a critical issue in intervention appraisal.
In the above example, a discount rate of r = 7% gives an NPV of 32.85
Million USD, and a discount rate of r = 8% gives an NPV of 10.44 Million USD.
A discount rate of r = 8.5% gives a negative NPV (−0.15 Million USD).
The NPV of an intervention is –as presented- the sum of the present values of the
net cash flows for all the years of the intervention’s economic life (present value of
incomes minus present value of expenses). Interventions and processes with the
1
The discount rate is roughly the opportunity cost of capital: it is the cost of using the capital in one
project renouncing to earn a return in another project. Its value is defined mostly empirically for a
given project, in a given country or region, for a given firm and at a given time. The value of the
discount rate can have a very serious impact on the decision making process of a cost benefit or life
cycle cost analysis.
134
4 Risk Assessment Techniques
highest NPV are usually the winners. Often incremental changes on an intervention
can lead to a positive NPV. Thus many improvement interventions must be selected
on the least negative NPV values from many alternatives.
NPV in decision making:
If …
NPV > 0
NPV < 0
NPV = 0
It means …
the investment on the planned
intervention would add value to the
Infrastructure Manager
the investment on the planned
intervention would subtract value from
the Infrastructure Manager’s or
government’s available budget
the investment on the planned
intervention would neither gain nor
lose value for the Infrastructure
Manager’s or government’s available
budget
Then …
the intervention may be accepted
the intervention should be rejected
We should be indifferent in the
decision whether to accept or reject the
intervention. This intervention adds no
monetary value
A decision should be based on other
criteria, i.e. strategic positioning or
other factors not explicitly included in
the calculation
The Cost-Benefit Ratio
The Cost-Benefit Ratio is a variant of the NPV. The benefits are divided by the
costs. If the ratio is higher than 1, i.e. benefits exceed costs, a project is considered
to add value to society.
Costs and benefits should be calculated over an appropriate time span, on the
basis of discounted cash flow.
Cost Benefit Ratio ¼
Net Present Value of Benefits
[1
Net Present Value of Costs
Benefits =
• value of avoided injuries+
• damage avoided+
• other benefits.
Costs should be shared by those who benefit from the reduction of the risk.
Qualitative Analysis of Costs and Benefits
Cost-benefit analysis (CBA) presented in Sects. 4.1.9, and 4.1.9.2, is comparing
estimated costs and benefits. In many cases, it will not be possible to quantify all
4.1 Techniques for Risk Assessment
135
costs and all benefits and sometimes benefits cannot be quantified at all. For
example, preventing the damage to reputation caused by a major incident cannot be
easily quantified.
Cost-Benefit of Risk Reduction
Costs and benefits should be calculated over an appropriate time span, on the basis
of discounted cash flow.
Cost Benefit Ratio ¼
Net Present Value of Benefits
Net Present Value of Costs
Benefits =
• value of avoided injuries+
• damage avoided+
• other benefits.
Costs should be shared by those who benefit from the reduction of the risk.
Value of Avoided Deaths and Injuries
The cash valuations of preventing health and safety effects on people are presented
for UK (2003) and New Zealand (2017)
United Kingdom (http://www.hse.gov.uk/risk/theory/alarpcheck.htm)
Values in £
Fatality
Injury
Permanently
incapacitating
injury
Serious
£1,336,800
(times 2 for
cancer)
Moderate to severe pain for 1–
4 weeks. Thereafter some pain
gradually reducing but may recur
when taking part in some activities.
Some permanent restrictions to
leisure and possibly some work
activities
Slight to moderate pain for 2–7 days.
Thereafter some pain/discomfort for
Values in
USD2
$ 1,690,000
£207,200
$ 262,000
£20,500
$ 25,900
(continued)
2
Approximately, as per June 2019.
136
4 Risk Assessment Techniques
(continued)
several weeks. Some restrictions to
work and/or leisure activities for
several weeks/months. After 3–
4 months, return to normal health
with no permanent disability
Injury involving minor cuts and
bruises with a quick and complete
recovery
Slight
Illness
Permanently
incapacitating
illness
Other cases of
ill health
Minor
£300
$ 380
Same as for injury
£193,100
$ 244,000
Over one-week absence. No
permanent health consequences
£2300 + £180
per day of
absence
£53
$2900 + $230
per day of
absence
$ 67
Up to one-week absence. No
permanent health consequences
New Zealand
As a guide the value of avoided deaths and injuries can be taken as [3]:
Injury (2017)
Value (2017) (New Zealand Dollars)
Fatality
Serious injury
Minor injury
$ 4,915,000
$ 513,000
$ 29,000
Value (USD) (Approximately,
as per June 2019)
$ 3,212,000
$ 335,000
$ 19,000
Example of CBA Calculation
Case of serious train/car accident because passing level crossing
barriers Example of the case examined “Serious train/car accident because of
passing level crossing barriers.” (Figure 4.13)
1. We estimate the probability of the accident to happen 40.2%
2. Let us for this example assume that if an accident happens,
•
•
•
•
1 person will die,
persons will be seriously injured and
persons minor injured
3 cars will be damaged
3. The value will be estimated:
• 1 person died X 1,000,000 USD = 1,000,000 USD
• 2 persons will be seriously injured = 2 100,000 = 200,000 USD
4.1 Techniques for Risk Assessment
137
Fig. 4.13 Level crossing
• 3 persons minor injured = 3 X 5,000 = 15,000 USD
• Car damage = 25,000 USD
TOTAL = 1,240,000 USD
4. We plan to improve the safety of the road crossing, with a cost estimated on
80,000 USD.
5. We calculate that the probability of an accident will decrease from 40.2 to 25%.
6. What will be the Cost-Benefit of Risk Reduction?
Present Value of Benefits
7. As we discussed: Cost Benefit Ratio ¼ Net
Net Present Value ofCosts
8. We calculate:
• The benefit will be a decrease of the accident probability from 40.2% to
25% = 15.2%
• The Value of Benefits will be 15.2% X1, 240,000 USD 190,000 USD
• The Value of Costs will be 80,000 USD
• So, the Cost Benefit Ratio ¼ 190;000
80;000 2:4 1
So, the investment in improving the safety of the road crossing is extremely
beneficial.
Explosion in a rolling stock maintenance depot
A simple method for coarse screening of measures is presented below. This puts the
costs and benefits into a common format of ‘USDs per year’ for the lifetime of a
plant.
Consider a rolling stock maintenance depot with a process that if it were to
explode could lead to:
•
•
•
•
20 fatalities
40 permanently injured
100 seriously injured
200 slightly injured
138
4 Risk Assessment Techniques
The rate of this explosion happening has been analysed to be about 1 10−5 per
year, which is 1 in 100,000 per year. The plant has an estimated lifetime of
25 years.
How much could the Organization reasonably spend to eliminate (reduce to
zero) the risk from the explosion?
If the risk of explosion were to be eliminated the benefits can be assessed to be:
•
•
•
•
•
Fatalities: 20 1,336,800 1 10−5 25 years = 6684
Permanent injuries: 40 207,200 1 10−5 25 years = 2072
Serious injuries: 100 20,500 1 10−5 25 years = 512
Slight Injuries: 200 300 1 10−5 25 years = 15
Total benefits: USD 9.283
The sum of USD 9.283 is the estimated benefit of eliminating the major accident
explosion at the plant on the basis of avoidance of casualties. (This method does not
include discounting or take account of inflation.)
For a measure to be deemed not reasonably practicable, the cost has to be grossly
disproportionate to the benefits. This is taken into account by the disproportion
factor (DF). In this case, the DF will reflect that the consequences of such explosions are high. A DF of more than 10 is unlikely.
Therefore it might be reasonably practicable to spend up to somewhere in the
region of USD 93,000 (USD 9300 10) to eliminate the risk of an explosion. The
duty holder would have to justify the use of a smaller DF.
This type of simple analysis can be used to eliminate or include some measures
by costing various alternative methods of eliminating or reducing risks.
4.1.9.3
Other Techniques not Mentioned in the ISO/IEC 31010:2009
Next, other techniques not mentioned in the ISO/IEC 31010:2009 are briefly
presented.
Three-Point Estimate
Three-Points estimation is a technique that involves people that are professional in
the task we are estimating by this technique.
It is called three-point estimation because the team members provide their
pessimistic, optimistic and best guess estimates for their risk estimation, based on
prior experience or best-guesses.
Three-point estimation is a:
• Triangular distribution (Simple Average)
• Beta distribution (Weighted Average).
4.1 Techniques for Risk Assessment
139
The process for the Tree Point Estimation technique
Team members involved in the process are requested to make three estimates: the
pessimistic (P), the most likely (M) and the optimistic (O) estimation. Then you do
some simple mathematics with the three estimates:
Three-point Estimation3: P þ 46M þ 0
Standard deviation: P 0
6
The calculation reflects the amount of risk in the task and the severity of the
impact of optimistic and pessimistic risks.
Standard deviation is the possible range for the estimate. You can assess and
compare the risk of various cases by looking at the ranges of the cases and the
standard deviations.
Expected Monetary Value (EMV)
Expected Monetary Value (EMV) is a method used to establish the contingency
reserves for a project budget and schedule.
As we discussed, once you have identified your risks, you need to calculate out
both the likelihood of the threats being realized, and their possible impact. One way
of doing this is to make your best estimate of the probability of the event occurring,
and then to multiply this by the amount it will cost you to set things right if it
happens. This gives you a value for the risk:
Risk Value = Probability of Event Cost of Event
Or
If we express the risk value as the Expected Monetary Value (EMV):
EMV = P * I
(P =Probability, I = Impact)
Example
Imagine you have a business and you have identified a risk that your rent
might rise substantially.
You think that within the next year there is a 70% chance that this will
happen because your landlord has recently increased rents for other
businesses.
If this happens, over the next year it will cost your business an additional
$350,000.
So the rent increase risk value is: 70% (Probability of Event)
$500,000 (Cost of Event) = $245,000 (Risk Value)
3
Or “Beta distribution”.
140
4 Risk Assessment Techniques
Expert Judgment
Risk identification experts can include anyone with experience in working on
similar projects, experience working in the business area for which the project was
conducted, or industry-specific experience. When using this technique, you should
consider any bias that your experts may have with regard to the project or potential
risk events.
SWOT Analysis
SWOT Analysis is a useful technique for understanding your Strengths and
Weaknesses, and for identifying both the Opportunities open to you and the Threats
you face (Fig. 4.14).
In general, strengths and weaknesses are related to issues within the
Organization. Strengths examine what’s going well with your Organization and
what your customers or the marketplace see as your strengths. Weaknesses are areas
that may be improved by the Organization. Negative risks are typically associated
with the weaknesses of the Organization and its strengths are associated with
positive risks. The Organization usually has external opportunities and threats.
SWOT analysis is sometimes referred to as internal-external analysis and can be
used to help discover and document potential risks in combination with brainstorming techniques.
Fig. 4.14 SWOT analysis structure
4.1 Techniques for Risk Assessment
141
Sensitivity Analysis
Sensitivity Analysis is a technique used to determine which risks affect a project the
most. It is a quantitative method of analysing the potential impact on the project of
risk events and determining which risk event (or events) has the highest impact
potential by examining all the uncertain elements at their baseline values. A tornado
diagram is one way to display sensitivity analysis data.
A Functional Hazard Analysis (FHA)
A systematic, comprehensive examination of functions to identify and classify
failure conditions of those functions according to their severity. For the analysis of a
change to the railway, it may be appropriate to apply the FHA at the system level.
This would involve a high-level, qualitative assessment of the defined functions of
the system (as specified in the system definition).
The system-level FHA is undertaken to identify and classify the failure conditions associated with the system-level functions.
FHA involves less work than FMEA/FMECA and can be started earlier, because
a specification, and not a design, is all that is required. However, FHA is not good
at finding hazards that are not easily characterised as the failure of a function (such
as electromagnetic interference or fuel leakage).
Failure Block Diagram Analysis
The analysis of a system based on the component reliabilities.
It is a method of modelling how components and subsystem failures combine to
cause system failure. Reliability block diagrams may be analysed to predict the
availability of a system and determined the critical components from a reliability
viewpoint.
4.1.10 Accident Rates
Fatality rates can be expressed in the following terms [4], see also Sect. 3.5.4.3:
Fatality Accident Rate (FAR)
The FAR or Fatal Accident Rate is a measure of how many people would die per 100
million exposure hours. This is approximately the same as saying how many deaths
are likely in 1000 people, over their working lives. It assumes an average of working
2000 h a year, and a working life of 50 years (Note, that standard hours worked per
annum is 1886 h). By their very nature, FARs vary significantly throughout a passenger trip or working day. An average rate of exposure is therefore used.
142
4 Risk Assessment Techniques
FAR ¼
100; 000; 000 DPA ðDeath per annumÞ
ðNumber of people exposedÞ ðHouse exposed per annumÞ
Equivalent Fatal Accident Rate (EFAR)
Injuries will be considered as if 10 serious injuries are equivalent to death, and 200
minor injuries are equivalent to death.
Therefore, Equivalent Deaths per annum (EDPA)
EDPA ¼ DPA þ
serious injuries p:a:
minor injuries p:a:
þ
10
200
where
DPA = deaths per annum
p.a. = per annum
Then Equivalent Fatal Accident Rate (EFAR):
EFAR ¼
100; 000; 000 EDPA
ðNumber of people exposed Þ ðHours exposed p:a:Þ
ð4:5Þ
where
EDPA = Equivalent Death per annum
Often the DPA or EDPA will have to be assessed statistically, i.e. one death may
be expected every 20 years giving a likelihood of 0.05 deaths p.a. Where no
detailed information such as accident history is available, consideration of any
industry-wide information may assist.
Example of Accident Rate calculation
• Say 500 rail personnel in a workgroup, each working 1886 h per annum
• In this workgroup say there have been 3 fatalities in the last 15 years
• From the personal accident database, there have been 6 serious injuries and 113
minor injuries since in the last 12 months
So, DPA = 3/15 = 0.2
which = 0.2 in 500, which = 1 in 2500, which is less than 1 in 1000 so it is
0:2
below the Upper Bound (see Sects. 3.5.4.2 and 3.5.4.3). FAR ¼ 100;000;000
¼
500 1886
21:2 which is less than 50 (see Sect. 3.5.4.3)
6
EDPA ¼ 0:2 þ 10
þ 113
200 ¼ 1:365 in 500
Which is 1 in 366, which is greater than 1 in 400, so it is above the Upper Bound
(see Sects. 3.5.4.2 and 3.5.4.3).
1:365
EFAR ¼ 100;000;000
¼ 145, which is greater than 125 (see Sect. 3.5.4.3).
500 1886
Therefore, the FAR is ALARP (or tolerable), using the table of upper and lower
bounds in Sect. 3.5.4. The EFAR is intolerable (risk cannot be justified) and
therefore, action is required to reduce the risk to ALARP.
4.2 The Risk Management Plan
4.2
4.2.1
143
The Risk Management Plan
Introduction
The Risk Management Plan presents at a high level how an Organization manages
its risks and how the entire process is integrated into the activities of the
Organization.
The Risk Management Plan may contains [2]:
a. A statement of the Organization’s risk management policy.
b. A description of the external and internal context, arrangements for corporate
governance and supervision, and the environment in which the Organization
operates.
c. Details of the scope and objectives of the risk management activities in the
Organization, including organizational criteria for assessing whether risks are
tolerable.
d. Risk management responsibilities and functions in the Organization.
e. The list of risks identified and an analysis of them, usually in the form of a risk
register included as an appendix.
f. Summaries of the risk treatment plans for major risks, incorporated as an
Appendix or by reference to a treatment plan.
The risk treatment plan is produced after the Organization has conducted its risk
assessment and is a detailed document describing roles and responsibilities for
specific actions to bring the identified risks down to an acceptable level. The risk
treatment plan needs to provide a summary of (Table 4.3):
Table 4.3 Risk Treatment Plan template
Area/Department
Risk Register
ID
Date Treatment
Developed
Risk Category
Risk Owner
Treatment
Owner
144
4 Risk Assessment Techniques
Risk Treatment
Control
Risk DeEffectivescription
ness
Treatment
Action
Responsibility
Implementation Date
Monitor &
Review
Implementation
Status
Selecting the most appro-
Assign a person to authorise
Agreed timeframes must be Consideration must be
Provide a status with re-
scription of what known control ef-
priate treatment option
the time and resources
establishing to outline
gard to implementation
the risk is.
fectiveness rating
involves balancing the
required for risk treatment.
when risk treatment will be will be monitored to assess
progress (i.e. not
(i.e. high, medium
costs and efforts of
achieved and completed.
whether the treatment is
started, in progress or
or low).
implementation against
effective.
completed).
Provide a de-
Provide the last
the benefits derived.
Assign person must im-
Factors such as legal,
plement the risk treatment.
regulatory, the natural
environment and social
corporate responsibility
must also be considering
when deciding on treatment options.
Some examples of
treatment options
are:
Avoiding the risk
by deciding not
to start or continue the activity
that gives rise to
the risk
Taking or increasing the risk
in order to
pursue an opportunity
Removing the
risk source
Changing the
likelihood
Changing the
consequence
Sharing the risk
with another
party
Retaining the risk
by informed decision
a.
b.
c.
d.
Identified risks
Responses that have been designed for each risk
Parties responsible for those risks and
The date to apply the risk treatment.
given to how risk treatment
The frequency and
method of how progress against treatment plans is reported must be defined.
4.2 The Risk Management Plan
4.2.2
145
The Risk Register
ISO 73:2009 Risk management—Vocabulary [5] defines a risk register to be a
“record of information about identified risks”. A Risk Register (also referred to as a
Risk Log), is a master document which is created during the early stages of the
process. It is a tool helping you to track issues and address problems as they arise.
The Risk Register records details of all the risks identified at the beginning and
during the life of projects, their grading in terms of likelihood of occurring and
seriousness of impacts, initial plans for mitigating each high-level risk, the costs and
responsibilities of the prescribed mitigation strategies and subsequent results.
It usually includes [6]:
• a unique identifier for each risk
• a description of each risk and how it will affect the project
• an assessment of the likelihood it will occur and the possible seriousness/impact
if it does occur (low, medium, high)
• a classification of each risk according to a risk assessment table
• who is responsible for managing the risk
• an outline of proposed mitigation actions (preventative and contingency) and
• in larger projects, costings for each mitigation strategy.
This Register should be maintained throughout the project and will change
regularly as existing risks are re-graded in the light of the effectiveness of the
mitigation strategy, and new risks are identified. In smaller projects, the Risk
Register is often used as the Risk Management Plan.
A Risk Register is developed to:
• provide a useful tool for managing and reducing the risks identified before and
during the project
• document risk mitigation strategies being pursued in response to the identified
risks and their grading in terms of likelihood and seriousness
• provide the Project Sponsor, Steering Committee/senior management with a
documented framework from which risk status can be reported
• ensure the communication of risk management issues to key Stakeholders
• provide a mechanism for seeking and acting on feedback to encourage the
involvement of the key Stakeholders and
• identify the mitigation actions required for the implementation of the risk
management plan and associated costings.
Initial risks must be identified and classified according to the likelihood and
seriousness very early in the Project. This initial risk assessment will form part of
the Project Proposal/Brief or Project Business Case for the project. Once the project
is approved the Risk Management Plan and Risk Register should be fully developed. In the case of smaller projects, the Risk Register may serve both purposes.
The completed Risk Register should be brief and to the point, so it quickly
conveys the essential information. It should be updated regularly, at least monthly.
146
4 Risk Assessment Techniques
The description of the risk should include the associated consequences or impact
where these are not obvious. These consequences can be useful in identifying
appropriate mitigation actions. In larger more complex projects, a separate column
may be required.
Mitigation actions should include such things as:
• Preventative actions—planned actions to reduce the likelihood a risk will occur
and/or reduce the seriousness should it occur. (What should you do now?).
• Contingency actions—planned actions to reduce the immediate seriousness of
the risk when it does occur. (What should you do when?)
• Recovery actions—planned actions taken once a risk has occurred to allow you
to move on. (What should you do after?).
References
1. Mechler R, The Risk to Resilience Study Team (2008) The cost-benefit analysis methodology,
from risk to resilience working paper No. 1. In: Moench M, Caspari E, Pokhrel A (eds), ISET,
ISET-Nepal and ProVention, Kathmandu, Nepal, 32 pp
2. Standards Australia/Standards New Zealand (2005) Risk Management Guidelines—Companion
to AS/NZS 4360:2004
3. New Zealand, Ministry of Transport (2017) Social Cost of Road Crashes and Injuries June
2017 update
4. Australian/New Zealand Standard (2004) AS/NZS 4360 SET Risk Management
5. ISO/IEC Guide 73, Risk Management—Vocabulary—Guideline for use in standards [3] ISO/
IEC 31010/ 2009, Risk Management—Risk Assessment Techniques
6. Department of Premier and Cabinet (2008) Project Risk Register Template & Guide, Version
1.3, April 2008, Tasmania