Accendo Reliability

Your Reliability Engineering Professional Development Site

  • Home
  • About
    • Contributors
    • About Us
    • Colophon
    • Survey
  • Reliability.fm
  • Articles
    • CRE Preparation Notes
    • NoMTBF
    • on Leadership & Career
      • Advanced Engineering Culture
      • ASQR&R
      • Engineering Leadership
      • Managing in the 2000s
      • Product Development and Process Improvement
    • on Maintenance Reliability
      • Aasan Asset Management
      • AI & Predictive Maintenance
      • Asset Management in the Mining Industry
      • CMMS and Maintenance Management
      • CMMS and Reliability
      • Conscious Asset
      • EAM & CMMS
      • Everyday RCM
      • History of Maintenance Management
      • Life Cycle Asset Management
      • Maintenance and Reliability
      • Maintenance Management
      • Plant Maintenance
      • Process Plant Reliability Engineering
      • RCM Blitz®
      • ReliabilityXperience
      • Rob’s Reliability Project
      • The Intelligent Transformer Blog
      • The People Side of Maintenance
      • The Reliability Mindset
    • on Product Reliability
      • Accelerated Reliability
      • Achieving the Benefits of Reliability
      • Apex Ridge
      • Field Reliability Data Analysis
      • Metals Engineering and Product Reliability
      • Musings on Reliability and Maintenance Topics
      • Product Validation
      • Reliability by Design
      • Reliability Competence
      • Reliability Engineering Insights
      • Reliability in Emerging Technology
      • Reliability Knowledge
    • on Risk & Safety
      • CERM® Risk Insights
      • Equipment Risk and Reliability in Downhole Applications
      • Operational Risk Process Safety
    • on Systems Thinking
      • Communicating with FINESSE
      • The RCA
    • on Tools & Techniques
      • Big Data & Analytics
      • Experimental Design for NPD
      • Innovative Thinking in Reliability and Durability
      • Inside and Beyond HALT
      • Inside FMEA
      • Institute of Quality & Reliability
      • Integral Concepts
      • Learning from Failures
      • Progress in Field Reliability?
      • R for Engineering
      • Reliability Engineering Using Python
      • Reliability Reflections
      • Statistical Methods for Failure-Time Data
      • Testing 1 2 3
      • The Manufacturing Academy
  • eBooks
  • Resources
    • Accendo Authors
    • FMEA Resources
    • Glossary
    • Feed Forward Publications
    • Openings
    • Books
    • Webinar Sources
    • Podcasts
  • Courses
    • Your Courses
    • Live Courses
      • Introduction to Reliability Engineering & Accelerated Testings Course Landing Page
      • Advanced Accelerated Testing Course Landing Page
    • Integral Concepts Courses
      • Reliability Analysis Methods Course Landing Page
      • Applied Reliability Analysis Course Landing Page
      • Statistics, Hypothesis Testing, & Regression Modeling Course Landing Page
      • Measurement System Assessment Course Landing Page
      • SPC & Process Capability Course Landing Page
      • Design of Experiments Course Landing Page
    • The Manufacturing Academy Courses
      • An Introduction to Reliability Engineering
      • Reliability Engineering Statistics
      • An Introduction to Quality Engineering
      • Quality Engineering Statistics
      • FMEA in Practice
      • Process Capability Analysis course
      • Root Cause Analysis and the 8D Corrective Action Process course
      • Return on Investment online course
    • Industrial Metallurgist Courses
    • FMEA courses Powered by The Luminous Group
    • Foundations of RCM online course
    • Reliability Engineering for Heavy Industry
    • How to be an Online Student
    • Quondam Courses
  • Calendar
    • Call for Papers Listing
    • Upcoming Webinars
    • Webinar Calendar
  • Login
    • Member Home
  • Barringer Process Reliability Introduction Course Landing Page
  • Upcoming Live Events
You are here: Home / Articles / Risk Based Decision Making

by Greg Hutchins Leave a Comment

Risk Based Decision Making

Risk Based Decision Making

Guest Post by Ed Perkins (first posted on CERM ® RISK INSIGHTS – reposted here with permission)

Risk-based decision making is employed to implement risk management.

But how is this implemented? In this article, we will look at the process of making “risk-based” decisions.

Risk management is a process that involves several activities:

  • Risk Assessment, to identify and assess risks and Risk Events;
  • Ranking or prioritizing the most significant or critical risks;
  • Risk-based Decision Making, to determine mitigations or defensive actions for the critical risks;
  • Monitoring the risk environment for changes in the risk rankings or for new risks; and
  • Periodically updating the risk assessments, priorities, and mitigations.

 

The elements of Risk-based decision making are:

  • A Risk Assessment Process,
  • Determination of risk event Likelihood/Probability (qualitative/quantitative) and Consequence,
  • Risk Characteristics and Factors such as Onset and Duration,
  • A Risk Representation mechanism (Risk Matrix or Heat Map),
  • Risk Decisions (Prioritization, mitigation/treatment).

 

Risk assessment process

This process is customarily associated with a Risk Management Framework.

Depending on your country, industry and other factors there are several options: ISO 31000[1] (the international standard), COSO[2] (developed for finance and now operations), NIST RMF[3](Federal IT).

Each Risk Framework defines what a risk is and describes a process flow for defining, assessing and managing risks. While there are differences in terminology and variations in details in how the various steps are performed, they all are basically describing the same process.

COSO defines risk as an event that adversely affects the ability of the organization to achieve objectives. ISO defines risk as the effect of uncertainty on objectives. The IIA (Institute of Internal Auditors) defines risk as “the possibility of an event occurring that will have an impact on the achievement of objectives”.

Risk is generally described in terms of the likelihood (or possibility) and the consequence of its occurrence on some objective. Objectives are described in terms of the organization’s business strategy and goals.

 

Risk Assessment

Risk assessment involves Risk Identification and Determination of the importance of the resulting risks.

Risk Identification is the process of identifying risks and the events that could occur related to the risks. This can be accomplished by generating a list of risk events by brainstorming the answers to the general question “what could happen”.

Or for each business objective, analyzing and asking “what could affect its achievement”, creating a focused list of risk events.

 

Determination of likelihood/probability and consequence

Each risk and risk event is assessed and assigned a probability (aka likelihood) for its occurrence and an evaluation of the resulting consequences.

The likelihood and consequences of the risk can be determined in a quantitative or qualitative manner. In many cases assigning a quantitative value is difficult and using a qualitative scale, such as 1-5 (with 1 being ‘low’ and 5 ‘high’) is the most reasonable approach.

People are notoriously bad when assessing probabilities (e.g. what is 25% vs 33%), so discrete steps are easier to use. If there is data available from past history, or metrics associated with the risk consequences, then that can be used to provide a more accurate quantitative estimate than a qualitative measure.

For example, if a consequence is that some process which produces $X worth of value per hour will be out of order, and the severity can be expressed in hours, then a numerical cost can be assigned to each degree of severity for the consequence (e.g., negligible, $X, $2X, $5X $10X etc.).

 

Risk characteristics

Risk events may have characteristic factors or attributes that modify aspects of the event likelihood or its consequences.

The factors can be defined in terms of the subject area of the risk, e.g. IT vs finance vs marketing. For example, Deloitte has a white paper, ‘Risk Assessment in Practice’[4], and the OWASP publishes a ‘Risk Rating Methodology’[5] guide on IT web application risks.

 

Risk representation

Once the risks and risk events have been determined, they need to be represented and presented.

This can be accomplished in either a textual or pictorial manner.

The text form is commonly called a Risk register. The pictorial form is called a risk heat map or risk matrix.

After determining the likelihood and consequences, the risks are prioritized (ranked). The likelihood and consequence values are multiplied to create a scoring value. The score is then plotted on the heat map or recorded in the risk register.

The risk appetite and /or risk tolerance of the organization is used to select which risks exceed the tolerance and thus need to be addressed and mitigated (reduced in likelihood and/or consequence).

An example risk heat map is shown below. There are three map areas indicating how ‘hot’ each risk is:

Green Low risk.   This is in the lower left-hand corner of the chart.
Yellow Medium risk.   This is in the middle of the chart.
Red High risk.   This is in the upper right-hand corner of the chart.

risk matrix risk based decision making ed perkins
The highest ranked risks are analyzed to determine what actions can or should be taken to reduce their score below the risk tolerance. Once the risks have been prioritized, they can be recorded in a workbook or spreadsheet listing (aka “risk register”)

 

Risk-based decisions

The process of identifying and ranking risks, to determine which are critical and above the organization’s risk tolerance or threshold and thus require attention, and then to select the risk management action(s) to take in response.

Making risk-based decision(s) on which risk management actions to implement for each of the prioritized risks are:

  • Avoid the risk – stop the risky activity or do not undertake the risky activity,
  • Accept the risk – do not implement any mitigation(s),
  • Share the risk – also referred to as transferring the risk – outsource the risky activity, obtain insurance to cover costs of risk event consequence(s),
  • Mitigate the risk – also referred to as treating or reducing the risk – determine actions to take that reduce either the likelihood of the occurrence of the risk or the magnitude of the consequences of the occurrence.

The goal of mitigating the risk is to move its likelihood or consequence “down” the scale from the ‘red zone’ into the yellow or green zones. E.g . lower the likelihood or reduce the consequence.

There might be multiple options for mitigation and they each need to be assessed to determine their effectiveness. While the risk likelihood may be reduced, the consequence may still be above the organizational risk tolerance or appetite.

Once a decision on mitigation or sharing a risk is made, the new likelihood and consequence need to be reevaluated to determine if the modified risk in within the risk tolerance.

 

References

[1] ISO 31000, http://www.iso.org/iso/home/standards/iso31000.htm
[2] COSO, www.coso.org
[3] NIST RMF is specified in NIST special publications SP800-30 and SP800-39.
http://csrc.nist.gov/publications/PubsSPs.html
[4] ERM Risk Assessment in Practice (2012)
http://www.coso.org/documents/COSOAnncsOnlineSurvy2GainInpt4Updt2IntrnlCntrlIntgratdFrmwrk%20-%20for%20merge_files/COSO-ERM%20Risk%20Assessment%20inPractice%20Thought%20Paper%20OCtober%202012.pdf
[5] Open Web Application Security Project (OWASP) Risk Rating Methodology,  https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology


Bio:

Ed Perkins CERM CIA is a risk management expert.

He is the leader of CERM Cyber Initiative as well as other national cyber security activities.  He led the launch of the IEEE-USA risk management webinar series. Ed has a number of counter-intuitive ideas that we believe all engineers should hear. Ed believes that risk management is the fundamental career skill that all engineers must have.

He goes a step further and believes that all engineers will evolve to be risk managers in today’s disruptive and uncertain times.

He can be reached at EdP@QualityPlusEngineering.com

Filed Under: Articles, CERM® Risk Insights, on Risk & Safety Tagged With: Risk based thinking

About Greg Hutchins

Greg Hutchins PE CERM is the evangelist of Future of Quality: Risk®. He has been involved in quality since 1985 when he set up the first quality program in North America based on Mil Q 9858 for the natural gas industry. Mil Q became ISO 9001 in 1987

He is the author of more than 30 books. ISO 31000: ERM is the best-selling and highest-rated ISO risk book on Amazon (4.8 stars). Value Added Auditing (4th edition) is the first ISO risk-based auditing book.

« Today You Have CRE Preparation Options
Tyre and Trunnion Wear »

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

CERM® Risk Insights series Article by Greg Hutchins, Editor and noted guest authors

Join Accendo

Receive information and updates about articles and many other resources offered by Accendo Reliability by becoming a member.

It’s free and only takes a minute.

Join Today

Recent Articles

  • Gremlins today
  • The Power of Vision in Leadership and Organizational Success
  • 3 Types of MTBF Stories
  • ALT: An in Depth Description
  • Project Email Economics

© 2025 FMS Reliability · Privacy Policy · Terms of Service · Cookies Policy