Ask Homework Help/Study Tips Expert

Assignemnt

Part I. True or False: Place a T or an F, whichever you consider correct, in the box before each numbered statement.

1. Subjective risk is the mental state of worry as to the outcome of a given event.

2. Objective risk is the variation between actual and expected losses.

3. Perceived risk is the risk estimated by the public.

4. Threat is the potential cause of system damage; usually exogenous to system of interest.

5. Security is the relative protection from adverse consequences usually associated with life and health.

6. Safety is a measure taken to guard against damage.

7. Utility theory is the mathematical tool that assigns the value, or utility, that a particular decision maker attaches to a particular outcome.

8. Bounded rationality suggests that people make decisions that match situations.

9. Naturalistic decision making is prescriptive rather than descriptive,

10. Extreme events may imply that the events are rare.

11. When analyzing extreme events, we can look at the tails of the probability distributions.

12. In real life situations, tails of the distributions are thinner than what classical distributions predict.

13. Extreme value theory (EVT) deals with the study of the asymptotic behavior of only the largest extreme observations (i.e. maxima) of a random variable and not of the smallest extreme observations.

14. Extremal type theorem identifies the possible classes of distributions of the extremes with respect to the actual underlying distribution.

15. In the analysis of extremes, the tails have smaller variance than the rest of the data.

16. Risk can be measured by the probability and severity of adverse effects.

17. Increased reliability always results to reduced risk.

18. Risk should be identified only at the end of the systems development cycle.

19. Risk management cannot be performed under situations of uncertainty.

20. Reducing consequences is the only way to reduce risk.

21. Decision trees cannot be used in single-objective decision process.

22. Decision trees are not appropriate for sequential (i.e. multi-period) decision process.

23. Bounded rationality suggests that people's cognitive processing capacity can perform the most complex - optimization tasks in their head.

24. Bayesian perspective of probability is that of a formal construct usually represented as a curve.

25. Cumulative distribution function assigns to each real value x the probability of X taking on values less than or equal to x.

26. Evidence is carefully selected information that helps draw conclusions.

27. Mathematician's perspective of probability is that it is the degree of confidence or certainty.

28. Statistical perspective of probability is that it is the frequency of outcome of repetitive experiments.

29. In the process of averaging out or calculating expected values, extreme and catastrophic but rare events are emphasized.

30. Extreme value theory focuses primarily on analyzing the extreme observations rather than the observations in the central region of the distribution.

Part II. Matching

Set 1: Match the concepts by placing the Concept letter (A - KO in the box before the concept's best description

1. Mathematical tool that allows the consideration of how risk-averse the decision makers are

2. Suggests people have limited cognitive processing capacity and simply cannot perform complex optimization tasks in their head

3. Probability as a degree of confidence or certainty

4. Assigns to each real value x the probability of X taking on values less than or equal to x

5. Statistical probability of an event occurring or being exceeded in any given time period

6. Carefully selected information that helps draw conclusions

7. The average of N set of numbers

8. The expected value of a function f(x)

9. Inability to determine true state of system

Concepts:
A. Bayes' Theorem
B. p(T | e)
C. Utility theory
D. Evidence ratio, er
E. Probability of exceedance
F. Statistical mean
G. Bayesian perspective
H. Uncertainty
I. E[x]
J. PRA, QRA
K. Cumulative distribution function
L. Bounded rationality
M. Evidence

Set 2: Choose an asymptotic distribution appropriate for the given information (you can choose an answer multiple times)

1. The asymptotic distribution of extremely low rainfall at a particular location.

2. After performing the G-1 plotting procedure, the plot of the tail of interest shows diagonal and linear trend.

3. After performing the G-I plotting procedure, the plot of the tail of interest shows vertical trend.

4. After performing the G-I plotting procedure, the plot of the tail of interest shows horizontal trend.

5. After performing the G-I plotting procedure for extreme high flood level for the purpose of designing a dam, the plot of the tail of interest shows no obvious asymptote -- but you definitely have to choose an asymptotic distribution for use in designing this dam.

6. After performing the G-I plotting procedures for two datasets, the plots of the tails of interest both show diagonal and linear trend, though the plots diverge from each other at the middle region.

Asymptotic distribution:

A. G-I or Gumble
B. G-II or Frechet
C. G-111 or Weibull

Part III. Problem solving Problem 1

The Chief Information Officer (CIO) is trying to improve the university's information network security. The CIO is trying to evaluate a new intrusion detection technology in the market for possible replacement for the existing system. An intrusion detection system sounds an "alarm" each time possible malicious attack on a network is detected. The following information is provided:

• Probability of an actual malicious attack is 0.01.

• For the currently installed system, the probability of an alarm given that there is an actual malicious attack is 0.9, while the probability of an alarm given there is not a malicious attack is 0.25.

• For the new technology, the probability of an alarm given that there is an actual malicious attack is 0.8, while the probability of an alarm given there is not a malicious attack is 0.1.

• The CIO assumes that there are only two types of events: either there is or there is no malicious attack.

• The CIO is using "evidence ratio," described as P(B IA) P(B IA') as a way to compare the technologies. Please help the CIO compare the new technology with the currently installed system by answering the following questions:

1. Based on the definition of evidence ratio in the previous paragraph, what is the evidence ratio for the currently installed system?

2. What is the evidence ratio for the new technology?

3. Which technology is better? Existing technology or new technology?

Problem 2

Frodo, a junior engineer at Baggins Metal Works is considering the introduction of a new line of products. In order to produce the new line, the company needs either a major or minor renovation of the current plant. The market for the new line of products could be either favorable or unfavorable, each with equal chance of occurrence. The company has the option of not developing the new product line at all.

With major renovation, the company's payoff from a favorable market is $100,000, from an unfavorable market, $ -90,000. Minor renovation and favorable market has a payoff of $40,000 and an unfavorable market, $-20,000. Not developing the new product line effectively has $0 payoff.

Frodo realizes that he should get more information before making his final decision. He contracted with Gandaif Market Research to conduct a market analysis to determine for certain if the market will be favorable or unfavorable. How much is the maximum amount Frodo should be willing to pay for this accurate information? (Please indicate your answer to the nearest whole number)

Problem 3

John Doe is a rational person whose satisfaction or preference for various amounts of money can be expressed as a function U(x} = (x/100)A2, where x is in $.

1. How much satisfaction does $20 bring to John?

If we limit the range of U(x) between 0 and 1.0, then we can use this function to represent John's utility (i.e. U(x) becomes his utility function).

2. What is the shape of his utility function?

- Concave
- Convex
- Straight line
- None of these

3. What does this graph show about John's incremental satisfaction?

• Increases with increasing x
• Decreases with increasing x
• Does not change with x
• None of these

4. "The shape of John's utility function shows that he is willing to accept more risk than a risk-neutral person."

• True
• False

5. John is considering a lottery which payoff $80 forty percent of the time, and $10 sixty percent of the time. If John plays this lottery repeatedly, how much will be his long-term average satisfaction?

6. For John, what certain amount would give him satisfaction equal to this lottery? Express your answer to nearest whole $.

Part I. True or False: Place a T or an F, whichever you consider correct, in the box before each numbered statement

1. "Security by obscurity" refers to relying on the attacker's ignorance of the design of a system.

2. Theory of asymmetric information can be used to explain how bad products tend to drive out the good products in a market.

3. Enterprise risk management differs from "traditional" systems engineering risk management in the expanse of the consequence space within which risks affect enterprise goals, mission outcomes, or capabilities.

4. Emergence can be described as the appearance of new and unforeseen system properties which cannot be know before the system operates.

5. Emergence can be totally and completely prevented by thorough system design.

6. The process of system identification followed by risk estimation is what is truly occurring in risk assessments.

7. Systems theory supports the modern view that risk itself is an observer-dependent phenomenon; a relational property between the situation and the observer.

8. Reliance can be described as consistency in performance over time.

9. In Liontief 1-0 model for inoperability, resulting % inoperability can be caused by perturbation h and also by dependence among sub-systems.

10. Tightly coupled systems imply that what occurs in one system directly affects what happens in another.

11. The two descriptors of Complexity for the purpose of Risk Management are (1) Interactions among subsystems and (2) Reliability among subsystems.

12. Partially observable events can be recorded only at a particular threshold of magnitude, time, etc.

13. Privacy and ethical issues can be factors in the observability of events.

14. Readiness and effectiveness for asset protection is one of the cost factors in a DRP.

15. Maximax is a method of decision making using probabilities.

16. Maximin tries to minimize regret of decision makers.

17. Rational decision maker should be willing to pay for perfect information at a price equal to or more than the EVPI.

18. Decision making under uncertainty is when probabilities can be assigned to the occurrence of states of nature in the future.

19. In Hurwicz method, the coefficient of optimism is a measure of a decision maker's optimism from 0 (completely optimistic) to 1 (completely pessimistic).

20. In the pebble-in-the-pond metaphor, the ripples represent the consequences and the number of ripples decreases as time passes.

21. Bounded rationality states that people have limited cognitive processing capacity and simply cannot perform complex optimization tasks in their head.

22. When risks are being identified, it is not essential that subject matter experts from all the engineering disciplines participate.

23. An ordinal scale is a measurement scale in which attributes are assigned a number that represents order.

24. Risk Cubes can not involve human's numerical judgment on risk.

25. Wear-and-tear indicates a scenario where the effects of an adverse condition readily propagate to other systems or subsystems.

26. Because the distance between values in an ordinal scale is arbitrary, arithmetic operations on ordinal data are permissible.

27. Borda algorithm transforms an interval scale into ordinal scale, permitting the summing of scores.

28. The conscious decision to accept the associated level of risk without engaging in special efforts to control it is one method to handle risk.

Part ll. Matching

Match each of the following terms with their most appropriate description.

A. Target risk
B. Countervailing risk
C. Synergistic effect

1. The risk scenario which prompts the whole decision process, often reflected by the main objective
2. The risk that arises from the action of managing the target risk
3. Desirable consequence of managing risk other than reducing the target risk

Part III. Problem solving

Problem 1

There are two sub-systems (1 and 2). Failure of sub-systeml will make sub-system2 35% inoperable, while failure of sub-system2 will make sub-systeml 50% inoperable

A=

 

X1

X2

X1

 

 

X2

 

 

Suppose that sub-system2 is attacked with intensity h = 90%. Using matrix equation x = Ax + c, where x is the inoperability of the sub-systems, A is the dependency matrix, and c is the intensity of attack, please match the values to the following questions

2. What is the resulting value of xl?
3. What is the resulting value of x2?

Problem 2

Apply Borda algorithm to score and rank the risk events shown.

Criteria

1.1 Telephone

1.2 Cellular

2. Cable

Undetectability

High

Low

High

Uncontrollability

High

Med

High

Multiple Paths to Failure

High

Med

High

Irreversibility

High

High

Low

Duration of Effects

High

High

High

Cascading Effects

Low

High

High

Operating Environment

High

Med

High

Wear and Tear

High

Med

High

Hardware/Software/Human/Organizational

High

High

High

Complexity and Emergent Behaviors

High

High

High

Design Immaturity

High

High

Med

1. What is the score of "Telephone"?
2. What is the score of "Cellular"?
3. What is the score of "Cable"?

Homework Help/Study Tips, Others

  • Category:- Homework Help/Study Tips
  • Reference No.:- M92235228

Have any Question?


Related Questions in Homework Help/Study Tips

Review the website airmail service from the smithsonian

Review the website Airmail Service from the Smithsonian National Postal Museum that is dedicated to the history of the U.S. Air Mail Service. Go to the Airmail in America link and explore the additional tabs along the le ...

Read the article frank whittle and the race for the jet

Read the article Frank Whittle and the Race for the Jet from "Historynet" describing the historical influences of Sir Frank Whittle and his early work contributions to jet engine technologies. Prepare a presentation high ...

Overviewnow that we have had an introduction to the context

Overview Now that we have had an introduction to the context of Jesus' life and an overview of the Biblical gospels, we are now ready to take a look at the earliest gospel written about Jesus - the Gospel of Mark. In thi ...

Fitness projectstudents will design and implement a six

Fitness Project Students will design and implement a six week long fitness program for a family member, friend or co-worker. The fitness program will be based on concepts discussed in class. Students will provide justifi ...

Read grand canyon collision - the greatest commercial air

Read Grand Canyon Collision - The greatest commercial air tragedy of its day! from doney, which details the circumstances surrounding one of the most prolific aircraft accidents of all time-the June 1956 mid-air collisio ...

Qestion anti-trustprior to completing the assignment

Question: Anti-Trust Prior to completing the assignment, review Chapter 4 of your course text. You are a manager with 5 years of experience and need to write a report for senior management on how your firm can avoid the ...

Question how has the patient and affordable care act of

Question: How has the Patient and Affordable Care Act of 2010 (the "Health Care Reform Act") reshaped financial arrangements between hospitals, physicians, and other providers with Medicare making a single payment for al ...

Plate tectonicsthe learning objectives for chapter 2 and

Plate Tectonics The Learning Objectives for Chapter 2 and this web quest is to learn about and become familiar with: Plate Boundary Types Plate Boundary Interactions Plate Tectonic Map of the World Past Plate Movement an ...

Question critical case for billing amp codingcomplete the

Question: Critical Case for Billing & Coding Complete the Critical Case for Billing & Coding simulation within the LearnScape platform. You will need to create a single Microsoft Word file and save it to your computer. A ...

Review the cba provided in the resources section between

Review the CBA provided in the resources section between the Trustees of Columbia University and Local 2110 International Union of Technical, Office, and Professional Workers. Describe how this is similar to a "contract" ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As