Risk Assessment Phase: Transactional Risk Assessment in Business Activities

  • Omar K. Hussain
  • Tharam S. Dillon
  • Farookh K. Hussain
  • Elizabeth J. Chang
Part of the Studies in Computational Intelligence book series (SCI, volume 412)


In the previous two chapters, we proposed an approach by which each subcategory of perceived transactional risk (transactional risk), namely performance risk and financial risk in a business activity, can be determined by considering its context, assessment criteria and dynamic specific characteristics. The next step in the process of transactional risk assessment is to assimilate the determined analysis of the subcategories and ascertain the degree of risk. The determined risk level represents the combined effect of the level of failure and the associated consequences in forming a business association with the risk assessed agent. This will form important input into the next two phases, namely transactional risk evaluation and risk management (or risk treatment), which are important steps in the process of risk analysis. In this chapter, we present an approach by which the risk assessing agent can determine the degree of transactional risk in forming a business activity with a risk assessed agent.


Membership Function Business Activity Fuzzy Inference System Linguistic Representation Business Association 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Meadow, C.: Text Information Retrieval Systems. Academic Press, San Diego (1992)Google Scholar
  2. 2.
    Embley, D.W.: Towards Semantic Understanding - An Approach Based on Information Extraction Ontologies. In: 15th Australasian Database Conference (ADC 2004), Dunedin, New Zealand, pp. 3–12 (2004)Google Scholar
  3. 3.
    Weiss, N.A., Holmes, P.T., Hardy, M.: A Course in Probability. Addison-Wesley (2005)Google Scholar
  4. 4.
    Darby, J.L.: Estimating Terrorist Risk with Possibility Theory. Los Alamos National Lab, US Department of Energy, (US) Manuscript number LA-12179 (2004)Google Scholar
  5. 5.
    Zadeh, L.A.: Fuzzy Sets As a Basis For A Theory of Possibility. Fuzzy Sets and Systems 100, 9–34 (1999)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Dubious, D., Prade, H.: Possibility Theory, Probability Theory and Multiple-Valued Logics: A Clarification. Annals of Mathematics and Artificial Intelligence 32, 35–66 (2001)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Dubois, D.: Possibility theory and statistical reasoning. Computational Statistics & Data Analysis 51, 47–69 (2006)MathSciNetzbMATHCrossRefGoogle Scholar
  8. 8.
    Zimmerman, H.-J.: Fuzzy Set Theory and Its Applications. Kluwer Academic Publishers (1991)Google Scholar
  9. 9.
    Berkan, R.C., Trubatch, S.L.: Fuzzy Systems Design Priciples. IEEE Press, New York (1997)Google Scholar
  10. 10.
    Hussain, O.K., Dillon, T.S., Hussain, F.K., Chang, E.: Transactional Risk-based Decision Making System in E-Business Computing. Computer Systems Science and Engineering 25, 15–25 (2010)Google Scholar
  11. 11.
    Dubois, D., Prade, H., Farreny, H., Martin-Clouaire, R., Testemale, C., Harding, E.F.: Possibility Theory: An Approach to Computerized Processing of Uncertainty. Plenum Press, New York (1988)zbMATHGoogle Scholar
  12. 12.
    Yager, R.R., Zadeh, L.A. (eds.): An Introduction To Fuzzy Logic Applications In Intelligent Systems. Kluwer Academic Publishers (1992)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Omar K. Hussain
    • 1
  • Tharam S. Dillon
    • 2
  • Farookh K. Hussain
    • 3
  • Elizabeth J. Chang
    • 1
  1. 1.Digital Ecosystems and Business Intelligence InstituteCurtin UniversityPerthAustralia
  2. 2.Department of Computer Science and Computer EngineeringLa Trobe UniversityMelbourneAustralia
  3. 3.School of SoftwareUniversity of TechnologySydneyAustralia

Personalised recommendations