適用於 NFC 應用環境之風險管理架構暨評估模式
description
Transcript of 適用於 NFC 應用環境之風險管理架構暨評估模式
1
NFCDate of Meeting : nov1,2010199/8/2~99/8/16(99/10/15)99/8/2~99/9/15(99/10/15)99/8/2~99/9/30(99/10/31)99/10/1~99/10/29(99/11/15)99/11/1~99/11/30(99/11/30)99/10/1~99/11/1599/12/1~100/3/3199/11/16~100/3/31 Feedback 100/4/1~100/5/2100/5/3~100/5/31100/4/1~100/7/29231.2.
3.
4.
1.
2.3.
1.
2.4
5Process of Risk Assessment Risk Identification Risk Measurement Decision under Risk and Uncertainty Risk Management Implementation Evaluation and Feedback6Risk IdentificationSWOTPESTLE7Risk MeasurementQualitative (Risk matrix) (Delphi) (Factor Analysis) (Fault Tree Analysis) HazOp (Hazard Operable Process) (FMECA) (ETA) (Markov Analysis) CRAMM (CCTA Risk Analysis Management Method)
8Risk MeasurementQuantitative ALE Analytic Hierarchy Process(AHP) (decision tree analysis) (Monte Carlo simulation) Risk density curve PRA() DPRA() VERT()
9-Risk Treatment Risk Retention Risk Reduction Risk Avoidance Risk Sharing Risk Transfer10Referencehttp://www.jiscinfonet.ac.uk/InfoKits/risk-management/delphi(web)(pdf)(ppt)ISRAM: information security risk analysis method, Bilge Karabacaka, Ibrahim Sogukpinarb. Received 24 December 2003; revised 27 July 2004; accepted 27 July 2004A risk evaluation method for the high-tech project investment based on uncertain linguistic variables, Peide Liu , Xin Zhang, Weilong Liu,2010CNS_27005_2008()(word)A risk evaluation method for the high-tech project investment based on uncertain linguistic variables, Peide Liu , Xin Zhang, Weilong Liu ,2010(pdf)Process Risk Evaluation--What Method to Use? David F. Montague,199011End
Next Meeting: 16:30,nov 26,201012