Skip to main content

Part of the book series: Studies in Computational Intelligence ((SCI,volume 412))

  • 1609 Accesses

Introduction

In the previous chapter, we discussed the various steps in the process of transactional risk analysis in business activities. In this chapter, we define the main steps that need to be carried out during the process of risk identification. As defined earlier, risk identification deals in formalizing the purpose and scope for which the business activity is being carried out and then identifies those events that will lead to the occurrence of a negative outcome in the business activity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chang, E., Dillon, T., Hussain, F.K.: Trust and Reputation for Service-Oriented Environments. John Wiley & Sons, Ltd., West Sussex (2006)

    Book  Google Scholar 

  2. Hussain, O., Sangka, K.B., Hussain, F.K.: Determining the Significance of Assessment Criteria for Risk Analysis in Business Associations. In: Lu, J., Jain, L.C., Zhang, G. (eds.) Handbook on Decision Making, vol. 33, pp. 403–416. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  3. Wang, Y., Wong, D.S., Lin, K.-J., Varadharajan, V.: Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments. Information Systems and E-Business Management 6, 25–48 (2008)

    Article  Google Scholar 

  4. Hussain, O., Dillon, T.: Cost-Benefit Analysis to Hedge with Third-Party Producers in Demand-Driven Production. In: Xhafa, F., Barolli, L., Papajorgji, P.J. (eds.) Complex Intelligent Systems and Their Applications, vol. 41, pp. 69–81. Springer, New York (2010)

    Chapter  Google Scholar 

  5. Hussain, O.K., Chang, E., Hussain, F.K., Dillon, T.S.: A methodology to quantify failure for risk-based decision support system in digital business ecosystems. Data & Knowledge Engineering 63, 597–621 (2007)

    Article  Google Scholar 

  6. Hussain, O.K., Dillon, T., Hussain, F., Chang, E.: Probabilistic Assessment of Loss in Revenue Generation in Demand-Driven Production. Journal of Intelligent Manufacturing (2011), doi:10.1007/s10845-011-0518-4

    Google Scholar 

  7. Saaty, T.L.: The Analytic Network Process (2008)

    Google Scholar 

  8. Searcy, D.L.: Aligning the Balanced Scorecard and a Firm’s Strategy Using the Analytic Hierarchy Process. Management Accounting Quarterly 5, 1–10 (2004)

    Google Scholar 

  9. Jovanovic, J., Krivokapic, Z.: AHP In Implementation Of Balanced Scorecard. International Journal for Quality Research 2, 59–67 (2008)

    Google Scholar 

  10. Wu, H.-H., Shieh, J.I., Li, Y., Chen, H.-K.: A Combination of AHP and DEMATEL in Evaluating the Criteria of Employment Service Outreach Program Personnel. Information Technology Journal 9, 569–575 (2010)

    Article  Google Scholar 

  11. Duc, T.T.: Using GIS and AHP Technique for Land-use Suitability Analysis. In: International Symposium on Geoinformatics for Spatial Infrastructure Development in Earth and Allied Sciences, pp. 1–6 (2006)

    Google Scholar 

  12. Lina, M.-C., Wanga, C.-C., Chena, M.-S., Chang, C.A.: Using AHP and TOPSIS approaches in customer-driven product design process. Computers in Industry 59, 17–31 (2008)

    Article  Google Scholar 

  13. Yu, C.-S.: A GP-AHP method for solving group decision-making fuzzy AHP problems. Computers & Operations Research 29, 1969–2001 (2002)

    Article  MATH  Google Scholar 

  14. Yuksel, I., Dagdeviren, M.: Using the fuzzy analytic network process (ANP) for Balanced Scorecard (BSC): A case study for a manufacturing firm. Expert Systems with Applications 37, 1270–1278 (2010)

    Article  Google Scholar 

  15. Saaty, T.L., Takizawa, M.: Dependence and independence: From linear hierarchies to nonlinear networks. European Journal of Operational Research 26, 229–237 (1986)

    Article  MathSciNet  MATH  Google Scholar 

  16. Saaty, T.L.: Multi-decisions decision-making: In addition to wheeling and dealing, our national political bodies need a formal approach for prioritization. Mathematical and Computer Modelling 46, 1001–1016 (2007)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omar K. Hussain .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Hussain, O.K., Dillon, T.S., Hussain, F.K., Chang, E.J. (2013). Risk Identification in Business Activities. In: Risk Assessment and Management in the Networked Economy. Studies in Computational Intelligence, vol 412. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28690-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28690-2_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28689-6

  • Online ISBN: 978-3-642-28690-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics