Risk Analysis and Management

  • A. Terry Bahill
  • Azad M. Madni


Risk is an expression of the potential harm or loss associated with an activity executed in an uncertain environment. This chapter presents a simple example of a risk analysis of a Pinewood Derby. Then it presents a longer example of assessing the risk of incorporating photovoltaic solar panels into an existing electric power grid. Throughout, it shows common mistakes that are often made while doing risk analyses, such as using unequal ranges for the frequency of occurrence and the severity of consequences.


Risk analysis Risk management Electric power grid Photovoltaic solar 


  1. 1.
    Arnauld A, Nicole P (1996) Logic, or, the art of thinking: containing, besides common rules, several new observations appropriate for forming judgment, the first edition was published in 1662, the fifth edition was published in 1683 and was translated from French in 1996 by Jill Vance Buroker, Cambridge University Press, CambridgeGoogle Scholar
  2. 2.
    Pascal B (1654) Fermat and Pascal on probability. Accessed Jan 2016
  3. 3.
    Witt RC (1973) Pricing and underwriting risk in automobile insurance: a probabilistic view. J Risk Insur 40(4):509CrossRefGoogle Scholar
  4. 4.
    Hussey DE (1978) Portfolio analysis: practical experience with the directional policy matrix. Long Range Plann 11(4):2–8CrossRefGoogle Scholar
  5. 5.
    Simpleman L, McMahon P, Bahnmaier B, Evans K, Lloyd J (1998) Risk management guide for DOD acquisition. DTIC DocumentGoogle Scholar
  6. 6.
    Joksimovic V, Houghton W, Emon D (1977) HTGR risk assessment study. Nuclear Systems Reliability Engineering and Risk Assessment, Society for Industrial and Applied Mathematics, pp 167–190Google Scholar
  7. 7.
    Rasmussen NC (1981) The application of probabilistic risk assessment techniques to energy technologies. Annu Rev Energy 6(1):123–138CrossRefGoogle Scholar
  8. 8.
    Whitman RV (1984) Evaluating calculated risk in geotechnical engineering. J Geotech Eng 110(2):143–188CrossRefGoogle Scholar
  9. 9.
    Schott H (1997) Risk management: concepts and guidance. DIANE, CollingdaleGoogle Scholar
  10. 10.
    Haimes YY (2009) Risk management. In: Sage AP, Rouse WB (eds) Handbook of systems engineering and management, 2nd edn. Wiley, Hoboken, pp 155–204Google Scholar
  11. 11.
    Kirkwood CW (2009) Decision analysis. In: Sage AP, Rouse WB (eds) Handbook of systems engineering and management, 2nd edn. Wiley, Hoboken, pp 1223–1250Google Scholar
  12. 12.
    Buede DM (2009) The engineering design of systems: models and methods, 2nd edn. Wiley, New YorkCrossRefGoogle Scholar
  13. 13.
    Blanchard BS, Fabrycky WJ (2011) Systems engineering and analysis, 5th edn. Prentice-Hall, Upper Saddle RiverGoogle Scholar
  14. 14.
    Bernstein PL (1996) Against the gods: the remarkable story of risk. Wiley, New YorkGoogle Scholar
  15. 15.
    Bahill AT, Karnavas WJ (2000) Risk analysis of a pinewood derby: a case study. Syst Eng 3(3):143–155CrossRefGoogle Scholar
  16. 16.
    Ben-Asher JZ (2006) Development program risk assessment based on utility theory. INCOSE Int Symp 16(1):1634–1646CrossRefGoogle Scholar
  17. 17.
    Kerzner H (2013) Project management: a systems approach to planning, scheduling, and controlling, 11th edn. Wiley, HobokenGoogle Scholar
  18. 18.
    Carbone TA, Tippett DD (2004) Project risk management using the project risk FMEA. Eng Manage J 16(4):28–35CrossRefGoogle Scholar
  19. 19.
    Willis HH, Morral AR, Kelly TK, Medby JJ (2006) Estimating terrorism risk. Rand Corporation, Washington, DCGoogle Scholar
  20. 20.
    Botta R, Bahill AT (2007) A prioritization process. Eng Manage J 19(4):20–27CrossRefGoogle Scholar
  21. 21.
    Chapman WL, Bahill AT, Wymore AW (1992) Engineering modeling and design. CRC, Boca RatonGoogle Scholar
  22. 22.
    British Cabinet Office, National Risk Register (2008) Accessed Dec 2015
  23. 23.
    Bahill AT, Botta R (2008) Fundamental principles of good system design. Eng Manage J 20(4):9–17CrossRefGoogle Scholar
  24. 24.
    Ord T, Hillerbrand R, Sandberg A (2010) Probing the improbable: methodological challenges for risks with low probabilities and high stakes. J Risk Res 13(2):191–205CrossRefGoogle Scholar
  25. 25.
    NASA (2000) Mars program independent assessment team summary reportGoogle Scholar
  26. 26.
    Madni AM, Sievers MA (2015) Flexible contract-based design framework for exaluating system resilience approaches and mechanisms. IIE annual conference and exposition May 30–June 2, NashvilleGoogle Scholar
  27. 27.
    Bahill AT, Chaves A (2013) 9.4.1 Risk analysis of solar photovoltaic systems. INCOSE Int Symp 23(1):785–802CrossRefGoogle Scholar
  28. 28.
    Chaves A, Terry Bahill AT (2014) Comparison of risk analysis approaches and a case study of the risk of incorporating solar photovoltaic systems into a commercial electric power grid. Syst Eng 17(1):89–111CrossRefGoogle Scholar
  29. 29.
    DSMC (2001) Risk management guide for DoD acquisition Fort Belvoir, VA [cited 2015 December].
  30. 30.
    Institute of Risk Management (2002) A risk management standard, LondonGoogle Scholar
  31. 31.
    CMMI for Development (2015) ver 1.3 [cited 2015 December].
  32. 32.
    INCOSE (2011) Systems Engineering HandbookGoogle Scholar
  33. 33.
    Bahill AT, Smith ED (2009) An industry standard risk analysis technique. Eng Manage J 21(4):16–29CrossRefGoogle Scholar
  34. 34.
    Department of Defense Instruction (2008) Number 5000.02: operation of the defence acquisition system. Department of Defense, Washington, DCGoogle Scholar
  35. 35.
    INCOSE (2015) INCOSE systems engineering handbook: a guide for system life cycle processes and activities. Wiley, New YorkGoogle Scholar
  36. 36.
    Henry MH, Haimes YY (2009) A comprehensive network security risk model for process control networks. Risk Anal 29(2):223–248CrossRefGoogle Scholar
  37. 37.
    Chaves A, Bahill AT (2010) Locating sites for photovoltaic solar panels 2010 [cited 2015 December].
  38. 38.
    Bahill AT, Szidarovszky F, Botta R, Smith ED (2008) Valid models require defined levels. Int J Gen Syst 37(5):553–571CrossRefGoogle Scholar
  39. 39.
    Moore L, Post H, Mysak T (2005) Photovoltaic power plant experience at Tucson electric power. Energy Conversion and Resources. ASME International, OrlandoGoogle Scholar
  40. 40.
    Richerson-Smith D (2010) Energy efficiency and renewable programs, TucsonGoogle Scholar
  41. 41.
    INCOSE (2006) Systems engineering handbook: a guide for system life cycle processes and activities, INCOSE-TP-2003-002-03, version 3.2.2. In: Haskins C (ed) International council on systems engineering, San DiegoGoogle Scholar
  42. 42.
    Fairley P (2004) The unruly power grid. IEEE Spectr 41(8):22–27CrossRefGoogle Scholar
  43. 43.
    Hsu FK, Bahill AT, Stark L (1976) Parametric sensitivity analysis of a homeomorphic model for saccadic and vergence eye movements. Comput Programs Biomed 6(2):108–116CrossRefGoogle Scholar
  44. 44.
    Karnavas WJ, Sanchez PJ, Bahill AT (1993) Sensitivity analyses of continuous and discrete systems in the time and frequency domains. IEEE Trans Syst Man Cybern 23(2):488–501CrossRefGoogle Scholar
  45. 45.
    Smith ED, Szidarovszky F, Karnavas WJ, Bahill AT (2008) Sensitivity analysis, a powerful system validation technique. Open Cybernet Syst J 2:39–56CrossRefGoogle Scholar
  46. 46.
    Bureau of Land Management US (2012) DoE. Final programmatic environmental impact statement (PEIS) for solar energy development in six Southwestern States, vol 1. Accessed Dec 2015
  47. 47.
    Mason J (2004) Life cycle analysis of a field, grid-connected, multi-crystalline PV plant: a case study of Tucson electric power’s Springerville PV plant. Final report prepared for Tucson electric powerGoogle Scholar
  48. 48.
    Parliamentary Office of Science and Technology (2006) Carbon footprint of electricity generation. Postnote 1–4 OctoberGoogle Scholar
  49. 49.
    Bahill AT (2012) Diogenes, a process for identifying unintended consequences. Syst Eng 15(3):287–306CrossRefGoogle Scholar
  50. 50.
    Bahill AT (2010) Design and testing of an illuminance management system. ITEA J 31(1):63–89Google Scholar
  51. 51.
    Haimes YY, Chittester CG (2005) A roadmap for quantifying the efficacy of risk management of information security and interdependent SCADA systems. J Homeland Secur Emerg Manag 2(2):1–21Google Scholar

Copyright information

© Springer International Publishing Switzerland 2017

Authors and Affiliations

  • A. Terry Bahill
    • 1
  • Azad M. Madni
    • 2
  1. 1.Systems and Industrial EngineeringUniversity of ArizonaTucsonUSA
  2. 2.Astronautical Engineering DepartmentUniversity of Southern CaliforniaLos AngelesUSA

Personalised recommendations