Entries |
Document | Title | Date |
20110054968 | CONTINUOUS PERFORMANCE IMPROVEMENT SYSTEM - Disclosed is a system for continuous performance improvement. The system can include a web-based workspace module adapted to provide visibility of project documentation and to provide collaboration and version control for the project documentation, the web-based workspace further adapted to provide a corporate portal. The system can also include a project performance management module adapted to provide an assessment of current project performance against project-unique performance metrics. The system can further include a contract deliverable management module adapted to provide a report of project deliverables along with a delivery status of each project deliverable, and a financial reporting module adapted to provide financial reports representing project financial status. The system can also include an a customer satisfaction assurance module adapted to receive self assessment information and client feedback information related to performance on the project and to provide a report indicating customer satisfaction as represented by the self assessment information and the client feedback information. | 03-03-2011 |
20110071872 | SYSTEM AND METHOD FOR INFRASTRUCTURE RISK ASSESSMENT AND/OR MITIGATION - Provided is a method of assessing reliability of an infrastructure entity. The method includes providing production data for an entity, assessing how the entity is expected to respond to a disturbing event, adjusting production data based on how the entity is expected to respond to the disturbing event, providing, in a graphical display of a computer system, a display indicative of the adjusted production data, determining a reliability of the entity based on the adjusted production data, and recommending an action for the entity based on the display indicative of the determined reliability. | 03-24-2011 |
20110071873 | Method and apparatus for mitigating aviation risk by analyzing and modeling air crew fatigue - Apparatus and method for analyzing and managing fatigue primarily in aviation occupations. The invention is adaptable to other occupations where assuring crew rest is critical. Air crew specific graphical user interfaces (GUIs) allow for the insertion of sleep into crew work schedules. Alternative sleep models are used for different modes of sleep. The invention produces as an output work/sleep schedules with an associated effectiveness determination. | 03-24-2011 |
20110087517 | Targeted Equipment Monitoring System and Method for Optimizing Equipment Reliability - An operating strategy for effectively operating a system, such as a boiler system, is provided by quantifying operation of the system based on failure characteristics modeled in a computer processor performing failure mode and effects analysis (FMEA) to forecast damage mechanisms from operational parameters. One method includes determining operational consequences from inherent damage impact of fixed operational parameters, enabling instruments for operation with the processor for monitoring and diagnosing potential damage mechanisms, forming a graphic component map sufficient for user review of preselected system locations, and developing macroscopic in-service and out-of-service condition monitoring plans for the system. Detailed condition monitoring plans are then created from the macroscopic plans by the processor classifying each damage mechanism as one of active, incipient, incidental and passive, and processing each classified damage mechanism based on industry and local historical data for providing yield indices and propensities as reference for the FMEA. | 04-14-2011 |
20110093309 | SYSTEM AND METHOD FOR PREDICTIVE CATEGORIZATION OF RISK - A system and method for predictive categorization of risk of at least one project related activity is provided. The system and method provide categorization of the project related activity into one of a plurality of predetermined risk categories. Further, the risk category of the project related activity is predicted in at least one stage of the project life cycle. The method comprises collecting inputs pertaining to the project related activity being categorized and a predetermined set of details for categorizing the project related activity. The method further comprises categorizing the project related activity by applying discriminant analysis. The application of discriminant analysis comprises constructing a set of functions based on the predetermined set of details. Thereafter, the constructed set of functions are applied on the details collected pertaining to the project related activity, wherein the functions are applied for predicting the risk category of the project related activity. | 04-21-2011 |
20110093310 | COMPUTER-READABLE, NON-TRANSITORY MEDIUM STORING A SYSTEM OPERATIONS MANAGEMENT SUPPORTING PROGRAM, SYSTEM OPERATIONS MANAGEMENT SUPPORTING METHOD, AND SYSTEM OPERATIONS MANAGEMENT SUPPORTING APPARATUS - Based on past failure sign appearance situations and past failure occurrence situations, failure occurrence probability which varies with a time elapse after failure sign appearance is calculated, and also, based on maintenance cost information of an operations management objective system, a short-term troubleshooting cost required for responding to a failure associated with the failure sign appeared in the system is calculated. Furthermore, based on the past failure sign appearance situations and the past failure occurrence situations, and also, the maintenance cost information and the failure occurrence probability, a short-term first preventive maintenance cost required for preventive maintenance of the failure associated with the failure sign, and also, the failure occurrence probability and a short-term second preventive maintenance cost for when preventive maintenance performance is postponed until next failure sign appearance, are calculated. Then, options in which the short-term first preventive maintenance cost, the short-term second preventive maintenance cost and the troubleshooting cost are associated with the failure occurrence probability, are prepared to be offered via an output device. | 04-21-2011 |
20110099043 | Infrastructure System Management Based Upon Evaluated Reliability - In a method of managing a structure having an infrastructure system, a plurality of candidate components configured to provide redundancy to the infrastructure system are identified. Reliability levels of the structure are evaluated with a plurality of different combinations of candidate components. In addition, the structure is managed based upon the evaluated reliability levels. | 04-28-2011 |
20110106578 | Reputation Risk Framework - A risk framework is described for computing risk. One or more persons may be grouped into classes of stakeholders. Different types of risk may be classified into risk categories. Within each risk category, events contributing to that type of risk may be determined and assigned a weight/severity value and a likelihood of occurrence value. Risk likelihood may be computed for each risk category by summing the products of weight/severity value and likelihood of occurrence value for each event within the risk category. A severity level may be determined and assigned with respect to each class of stakeholders regarding the risk categories, and a risk score may be computed for each stakeholder class and risk category combination. An aggregate risk likelihood may be computed by summing and/or weighting the risk likelihoods computed for each risk category. | 05-05-2011 |
20110106579 | System and Method of Management and Reduction of Subscriber Churn in Telecommunications Networks - A closed loop system to monitor a communications system and to detect conditions indicative of deficient subscriber service. Circuitry responsive to the detected conditions to adjust one or more parameters of the communications system to improve subscriber service. Additional circuitry to provide subscriber feedback so as to try to minimize subscriber churn and reduce dissatisfaction. | 05-05-2011 |
20110112886 | CRITICAL PARAMETER/REQUIREMENTS MANAGEMENT PROCESS AND ENVIRONMENT - A critical parameter/requirements management process model for managing a development program for a product and an associated product structure-driven critical parameter/requirements management tool and environment is provided. In one embodiment, the process includes a product structure classification scheme, a parameter/requirements classification scheme, a parameter/requirements process and maturity model, and in-process and requirements conformance views. In one embodiment, the tool includes a user interface layer, a business layer, a data layer, and a database. The user interface layer may include a product structure feature group, an add/edit/link feature group, a manage maturity feature group, and a manage conformance feature group. The tool may be implemented as a web server accessible to user workstations operating as thin clients. The tool may be integrated with one or more other product development tools, such as a document-driven requirements management, configuration management, manufacturing/production control system, problem management, and phased product delivery process tools. | 05-12-2011 |
20110112887 | CRITICAL PARAMETER/REQUIREMENTS MANAGEMENT PROCESS AND ENVIRONMENT - A critical parameter/requirements management process model for managing a development program for a product and an associated product structure-driven critical parameter/requirements management tool and environment is provided. In one embodiment, the process includes a product structure classification scheme, a parameter/requirements classification scheme, a parameter/requirements process and maturity model, and in-process and requirements conformance views. In one embodiment, the tool includes a user interface layer, a business layer, a data layer, and a database. The user interface layer may include a product structure feature group, an add/edit/link feature group, a manage maturity feature group, and a manage conformance feature group. The tool may be implemented as a web server accessible to user workstations operating as thin clients. The tool may be integrated with one or more other product development tools, such as a document-driven requirements management, configuration management, manufacturing/production control system, problem management, and phased product delivery process tools. | 05-12-2011 |
20110119105 | SYSTEM AND METHOD FOR CONDUCTING NON-NOUISANT SURVEYS OVER VIRTUAL NETWORKS - A polling method, online polling system and program product therefor. A system avatar unit creates, maintains and controls system avatars distributed throughout a virtual world. System avatars receive questions received from polling system clients. A dialogue module manages dialogs between system avatars presenting the questions to user avatars in the virtual world. A report generator generates reports responsive to responses given by user avatars to system avatars. | 05-19-2011 |
20110119106 | APPLICATION RISK FRAMEWORK - A risk framework is described for computing application risks. A risk value associated with each of one or more products included in an application may be determined. The risk value associated with each of the products may be classified as declining software risk, not-permitted software risk, declining hardware risk, and not-permitted hardware risk and may be weighted and summed to produce a technical risk score. A business criticality score may be computed based on how critical the application is to a business. The technical risk score and the business criticality score may be weighted and summed to produce a composite risk score. Based on one or more of the scores, planning may be conducted and strategies may be formulated to mitigate risk. | 05-19-2011 |
20110119107 | AUDIT PLANNING - An audit planning system enables users to plan effective audits by identifying audit units having potentially large impacts and risks on an enterprise and enabling users to select audit units to include in audits based on a variety of different criteria. The audit planning system displays the audit units of the enterprise and a visual indicator of the impact and risk associated with each audit unit. The audit planning system enables users to select the displayed audit units to plan an audit. The audit planning system may display audit units in an impacted financial statement, a tree map, a graph, and/or a table. The audit planning system may sort and/or display audit units with visual indicators specifying associated risks, impacts, materiality values, exposures, coverages, and/or audit costs. The audit planning system can further display visual indications of the changes in audit units' associated attributes over time. | 05-19-2011 |
20110125548 | BUSINESS SERVICES RISK MANAGEMENT - A business service model includes a description of a topology of interconnections between configuration items that implement a business service. Each of the configuration items is associated with a respective vulnerability score and a respective type classification. Based on the vulnerability scores and the type classifications, the following values are determined for each of the configuration items: a respective activity level value indicating a probability of the configuration item being active in the business process, a respective vulnerability probability value indicating a probability of the configuration items being compromised and damaged in the business process, and a respective business process risk value indicating a probability of a failure of the business process resulting from damage of the configuration item. The business process is scored based on the activity level values, the vulnerability values, and the business process risk values. | 05-26-2011 |
20110131076 | METHOD AND APPARATUS FOR RISK MINING - A computer implemented method for mining risks includes providing a set of risk-indicating patterns on a computing device; querying a corpus using the computing device to identify a set of potential risks by using a risk-identification-algorithm based, at least in part, on the set of risk-indicating patterns associated with the corpus; comparing the set of potential risks with the risk-indicating patterns to obtain a set of prerequisite risks; generating a signal representative of the set of prerequisite risks; and storing the signal representative of the set of prerequisite risks in an electronic memory. A computing device or system for mining risks includes an electronic memory; and a risk-identification-algorithm based, at least in part, on the set of risk-indicating patterns associated with a corpus stored in the electronic memory. | 06-02-2011 |
20110137703 | METHOD AND SYSTEM FOR DYNAMIC PROBABILISTIC RISK ASSESSMENT - The DEFT methodology, system and computer readable medium extends the applicability of the PRA (Probabilistic Risk Assessment) methodology to computer-based systems, by allowing DFT (Dynamic Fault Tree) nodes as pivot nodes in the Event Tree (ET) model. DEFT includes a mathematical model and solution algorithm, supports all common PRA analysis functions and cutsets. Additional capabilities enabled by the DFT include modularization, phased mission analysis, sequence dependencies, and imperfect coverage. | 06-09-2011 |
20110137704 | SYSTEM AND METHOD FOR CALCULATING A COMPREHENSIVE PIPELINE INTEGRITY BUSINESS RISK SCORE - A method and system for calculating pipeline integrity business risk score for a pipeline network is provided. The method includes a step of first calculating a structural risk score, an operational risk score and a commercial risk score for each pipeline segment in a pipeline network. The method further includes calculating pipeline integrity business risk score for each pipeline segment. The structural risk score, operational risk score, commercial risk score and pipeline integrity business risk score for each pipeline segment is rolled-up to calculate the respective risk scores of a pipeline network. The rolled-up risk scores are calculated by computing weight factors for each pipeline segment, relative risk scores weight of each pipeline segment and relative risk scores contribution of each pipeline segment. The system of the invention comprises executable files, dynamic linked libraries and risk score computing modules configured to display the risk scores using a dashboard. | 06-09-2011 |
20110137705 | METHOD AND SYSTEM FOR AUTOMATED CONTENT ANALYSIS FOR A BUSINESS ORGANIZATION - A method and a system for automated content analysis to assess impact on one or more business organizations. Content is aggregated from at least one content provider. The aggregated content is classified in knowledge ontology on the basis of a plurality of attributes of the content. Subsequently, a score is assigned corresponding to the impact of the classified content on the business organization in accordance with a set of scoring rules. Finally, a graphical representation is generated showing a cumulative score corresponding to the impact of the content on the business organization assessed during a predefined time period. | 06-09-2011 |
20110153383 | SYSTEM AND METHOD FOR DISTRIBUTED ELICITATION AND AGGREGATION OF RISK INFORMATION - A method and system for the distributed elicitation and aggregation of risk information is provided. The method comprises selecting a risk network, the risk network comprising one or more risk nodes having associated risk information; assigning a role to each risk node, said role indicating a type of user to evaluate the risk node; generating a customized survey to elicit risk information for a risk node based upon the role and the user, wherein an order of questions in the customized survey presented to the user is determined by an ordering criteria; publishing the customized survey to the user; collecting risk information for the risk node from the user's answers to the customized survey; and populating the risk nodes based on the collected risk information. | 06-23-2011 |
20110161133 | Planning and Performing Drilling Operations - The present disclosure relates to dynamically incorporating and economically validating drilling decisions. A computer system having a memory and central processing unit is provided and a knowledge store residing in the computer system is populated with data. The data may include surface drilling parameter data, bottomhole assembly data, bit records, measurement-while-chilling data, logging-while-drilling data, drilling event data, and lessons learned data. The data may be correlated data from one or more offset wells. One or more computerized static or dynamic contextual earth models are provided and used to dynamically incorporate and economically validate the drilling decisions. The one or more earth models can be updated in real-time. | 06-30-2011 |
20110166906 | Concentration Risk Modeling - A system and method of calculating a concentration risk score for a work process at an organization center are provided. The concentration risk score may be based on a redundancy score and a criticality score. In some examples, the redundancy score may be determined based on a percentage of total resources associated with the work process at a first center. The redundancy score and criticality score may then be combined to determine a concentration risk score for the work process at that center. | 07-07-2011 |
20110166907 | METHODS AND SYSTEMS FOR RISK EVALUATION - Methods, systems and computer products are provided for risk evaluation. A computer may assign a risk to an object which has an object estimation-value. The computer may also receive a risk estimation-value for the risk. The computer may re-calculate the object estimation-value based on the risk estimation-value. | 07-07-2011 |
20110166908 | METHODS AND SYSTEMS FOR RISK EVALUATION - Methods, systems and computer products are provided for risk evaluation. A computer may assign a risk to an object which has an object estimation-value. The computer may also receive a risk estimation-value for the risk. The computer may re-calculate the object estimation-value based on the risk estimation-value. | 07-07-2011 |
20110173044 | Possible worlds risk assessment system and method - A possible worlds risk assessment system including a planning subsystem configured to create a plan for each risk source which threatens a defended area in one or more possible worlds. A clustering subsystem may be configured to cluster states of each plan for each risk source by spatial locality to generate a risk source slice for each plan. Each risk source slice may be partitioned into cells representing the risk to the defended area in the one or more possible worlds. A risk assessment subsystem may be configured to combine each corresponding cell of each risk source slice to generate a risk assessment slice which includes an assessment of the risk associated with each cell of each risk source slice to provide a unified total situational assessment of the risk to the defended area. A data grid may be configured to store each risk source slice and the risk assessment slice. | 07-14-2011 |
20110173045 | System and methods for improving hazardous incident prevention, mitigation and response - The invention comprises a system, method, and computer program product that enables any stakeholder that has responsibility for responding to hazardous incidents with a systematic process whereby they can optimize and continuously improve their abilities to reduce the harm caused by such incidents. This process is tailored to the stakeholder's individual characteristics and practices but also facilitates comparability between stakeholders and provides methods to evaluate the potential consequences of each attack form, prioritize investments in mitigative activities and to evaluate the efficacy of such investments. | 07-14-2011 |
20110178836 | Systems and Methods for Analyzing a Potential Business Partner - A computer-implemented method is provided for facilitating a due diligence analysis of a potential business partner of a business entity. The method includes receiving key data regarding a potential business partner. The method further includes facilitating an analysis of the potential business partner, including receiving risk-related data from a user regarding risks associated with the potential business partner, automatically determining a risk class for the potential business partner based at least on the received risk-related data, automatically determining a set of due diligence questions to present to the user based at least on the automatically determined risk class for the potential business partner, and receiving due diligence data from the user in response to the set of due diligence questions. The method further includes facilitating an approval process for the received due diligence data. | 07-21-2011 |
20110178837 | Systems and Methods for Managing Goodwill Activities in a Business Entity - Computer-implemented systems and methods for managing goodwill activities in a business organization are provided. A computer-implemented activity management tool collect user-submitted activity identification data regarding a proposed activity, and automatically classifies the proposed activity into one of a plurality of activity types based at least on the user-submitted activity identification data. The activity management tool also receives user-submitted activity value data regarding the proposed activity, automatically determines a value of the proposed activity based at least on the user-submitted activity value data, and automatically determines an appropriate approval level for the proposed activity based at least on the determined value of the proposed activity. The activity management tool also facilitates an approval process for the proposed activity based at least on the approval level determined for the proposed activity, including facilitating approval decisions by a selected set of one or more approvers via the computer network. | 07-21-2011 |
20110184776 | METHOD AND SYSTEM OF GENERATING AUDIT PROCEDURES AND FORMS - A professional services audit tool is disclosed that includes an application that performs a variety of functions such as completing certain audit planning processes/forms, offering a tailored set audit programs based on the assessed risks, allowing users to further tailor the suggested audit programs, and rendering these audit programs in a helpful format. The application also provides functionality to perform and document audit work, guide the auditor though the engagement process, isolate audit program steps by related assertions and identified risks to ensure that audit plans are tailored to specific risks, provide an engagement dashboard to view at a glance both the overall audit and for each audit area, the steps which are not yet started, in progress, or completed, and allow for the integration of generated documents to be automatically stored to, accessed from, and synchronized with various external engagement management systems. | 07-28-2011 |
20110191138 | RISK SCORECARD - Methods, computer readable media, and apparatuses for evaluating risk associated with a process are presented. Input corresponding to one or more risk elements may be received. An exposure score, an impact score, a likelihood score, and an element score may be determined for each risk element. One or more risk category scores may be determined based on the one or more element scores. One or more risk parameter scores may be determined based on the one or more risk category scores. An overall risk score may be determined based on the one or more risk parameter scores. A risk scorecard may be generated, and the risk scorecard may include a risk scorecard that visually depicts one or more of the determined scores. | 08-04-2011 |
20110202385 | METHOD AND ITS APPARATUS FOR SUPPORTING PROJECT AND PROGRAM FOR CARRYING OUT THE METHOD - The present invention provides a project supporting method which presents information on the order of priority of risk information associated with a target project, the method comprising the steps of: determining, on a past projects basis, similarity between risk information about past projects and information indicative of degree of risk for respective risk items that is characteristic to the target project; extracting past projects, the determined similarity of which is higher; creating profit impact-severity information for the respective risk items based on the risk information for the respective risk items and an estimated value and an actual value which are profit parameters for the extracted past projects; creating handling priority-order information from the created profit impact-severity information for the respective risk items regardless of evaluation information about the respective risk items which is inputted by a user; and outputting the created handling priority-order information and the created profit impact-severity information for the respective risk items. | 08-18-2011 |
20110225019 | SEARCH, ANALYSIS AND CATEGORIZATION - A method of categorizing a brand comprising the steps of: (i) Collecting a brand-related search term from a user via an interface; (ii) Scanning a computer network (optionally the Internet) for data containing the brand; (iii) Scanning one or more pre-selected data sources for data containing the brand; (iv) Returning search results from the two said scanning steps; (v) Comparing the search results with a set of keywords associated with one or more predetermined categories; (vi) Suggesting one or more categories for the brand based on the results of the keyword search; (vii) Ranking the suggested categories in order of relevance to the brand; | 09-15-2011 |
20110231221 | AUTOMATED RISK ASSESSMENT AND MANAGEMENT - Automated risk assessment and management techniques are provided. Assets of an enterprise are monitored within an enterprise repository via their electronic identities. The identities are annotated with business defined values. The annotations can dynamically change based on dynamic policy evaluation and evolving actions of the assets, the state of the enterprise, and/or the state of an enterprise system. The annotations are accumulated and used in customized calculations for purposes of driving automated actions of the enterprise and producing a variety of reporting features. | 09-22-2011 |
20110251869 | SYSTEM AND METHOD FOR DETECTING FRAUDULENT AFFILIATE MARKETING IN AN ONLINE ENVIRONMENT - A method for monitoring merchant website transactions generated by affiliate marketing sources to detect fraudulent affiliate transactions involves obtaining transaction data for multiple on-line transactions, processing the transaction data using an affiliate separation module to separate the transactions based on affiliate identification, grouping the transaction data by affiliate source, analyzing all transactions corresponding to each affiliate using first algorithm that determines whether transaction data for each of said transactions matches pre-defined parameters that are consistent with fraudulent activity, determining the percentage of suspicious transactions relative to all transactions using a second algorithm, and identifying an affiliate as potentially fraudulent if said percentage of suspicious transactions exceeds a predetermined percentage. | 10-13-2011 |
20110270647 | METHOD AND SYSTEM FOR ESTIMATING RISK IN THE FINANCIAL METRICS OF A BUSINESS CASE - The system and method of the present disclosure allow the user to enumerate a set of risk factors for each financial metric time-profile projection, and respond to a set of questions that is linear in the number of risk factors. In one embodiment, the risk elicitation on each risk factor uses user input of likelihood of risk and impact and/or severity. On each of the risk factors for any given nominal, financial projection estimate, the inputs are systematically converted into a net impact distribution for that nominal, financial estimate. | 11-03-2011 |
20110276362 | AUDITING CLIENT - SERVICE PROVIDER RELATIONSHIPS WITH REFERENCE TO INTERNAL CONTROLS ASSESSMENTS - A system and method for facilitating auditing a client-service provider relationship. An example method includes determining a scope of an audit with reference to an audit plan; ascertaining one or more business entities or processes that are subject to audit based on the scope; and automatically retrieving one or more business controls associated with the one or more business entities or processes. In an illustrative embodiment, the example method further includes electronically accessing one or more Service Level Agreements (SLAs) associated with the one or more business entities to extract one or more descriptions of controls. A description of each control is electronically stored in association with one or more descriptions of one or more risks associated with each control. A description of each control is stored, in a library of risks and controls, in association with one or more risks. | 11-10-2011 |
20110276363 | SERVICE LEVEL AGREEMENT CONSTRUCTION - A method for facilitating construction of an agreement between a client and a service provider. An example method includes determining a business process to be performed by a service provider of a client-service provider relationship on behalf of a client; employing a description of the business process to reference to a library of risks and controls to ascertain one or more risks associated with performance of the business process and one or more predetermined controls for mitigating the one or more risks; providing a first user option to select from a set of one or more controls; and incorporating a description of the one or more selected controls in a proposed agreement to characterize the client-service provider relationship. In an illustrative embodiment, the proposed agreement includes a Service Level Agreement (SLA). The illustrative method further includes providing a second user option to view an SAS-70 certificate associated with the service provider. The SAS-70 certificate certifies that the service provider has one or more controls in place to mitigate the one or more risks associated with the performance of the business process. | 11-10-2011 |
20110282710 | ENTERPRISE RISK ANALYSIS SYSTEM - A system for analyzing enterprise risks is provided and includes a first subsystem to permit creation of enterprise risk management (ERM) templates and modification thereof into instances of searchable and retrievable ERM content, a second subsystem to permit visualization and editing of the ERM content, a plurality of integrated analysis tools and an ERM work product generator supported by the first and second subsystems to produce ERM analytical results and ERM work product based on the ERM content and a platform. | 11-17-2011 |
20110301999 | PROJECT SUPPORTING METHOD, EXECUTION PROGRAM THEREFOR, AND EXECUTION DEVICE THEREFOR - Data to support a determination as to whether or not a project can be executed, etc., is provided on the basis of a cost estimation value of project deliverables. Regarding a risk event parameter group which is a collection of risk event parameters indicating a degree of estimation risk for each of a plurality of estimation risk events, the similarity between risk event parameter groups of a plurality of past projects and a risk target parameter group of a target project is obtained (S | 12-08-2011 |
20110307293 | Method For Assessing And Communicating Organizational Human Error Risk And Its Causes - A method of preventing human error in an organization, the method comprising: making a plurality of collections of pychosocial awareness factor data over an error prediction time period from individuals performing tasks within the organization; accessing human error data relating to the error prediction time period on human error incidents within the organization; using the human error data and psychosocial awareness factor data to determine whether the level of one or more awareness factors predicts human error; if said one or more awareness factors predicts human error, notifying the organization of the nature of the human error predicted, and of the one or more awareness factors that are the cause of the human error. | 12-15-2011 |
20120004945 | GOVERNANCE, RISK, AND COMPLIANCE SYSTEM AND METHOD - An automated system and method is provided for conducting governance, risk management, and/or regulatory compliance audits within an organization. In embodiments, a regulatory compliance unit probes one or more computing devices on an organization's network in an attempt to identify non-compliant assets, including security vulnerabilities, unprotected or improperly-stored data, misconfiguration, outdated software, malware, missing or corrupted data, and the like. The disclosed system includes the capability to collect information from non-digital assets in an organization, including automatically conducting surveys among one or more persons within an organization to confirm such person's knowledge is in compliance with applicable requirements. The disclosed system also includes the ability to automatically discover target devices for further analysis. The regulatory compliance unit includes a data collection unit, a compliance scanning unit, a reporting unit, and a user console unit. | 01-05-2012 |
20120004946 | Integrated Operational Risk Management - Systems, methods, and software are described that may be used to integrate assessments of certain types of operational risks, including forecasted emerging (future) risks, current risks, and/or historical realized risks. | 01-05-2012 |
20120016714 | SYSTEM AND METHOD FOR COLLABORATIVE MANAGEMENT OF ENTERPRISE RISK - A method and system for collaboratively managing risk is presented. In one embodiment the method comprises analyzing a node in a risk network when an output of said node violates a control limit, identifying a cause of said violation of said control limit, creating a mitigation action in response to said node violating said control limit, performing said mitigation action, said mitigation action having an influence on said output of said node, and measuring said output of said node to determine effectiveness of said mitigation action on said node, wherein a program using a processor unit executes one or more of said analyzing, identifying, creating, performing and measuring steps. | 01-19-2012 |
20120022912 | METHOD AND APPARATUS FOR SUPERVISING INTEGRATED TRIP MARGIN OF FACILITIES IN INDUSTRIAL PLANT - Disclosed is a method and an apparatus for supervising the integrated trip margin of an industrial plant facility. The apparatus includes a measurement operation value collection means for collecting a measurement operation value of a facility having a trip setting value inside the industrial plant; a trip margin calculation means for receiving the measurement operation value from the measurement operation value collection means and calculating a trip margin; and a display means for displaying a trip margin having a smallest value among trip margins of respective groups on a screen when there is a plurality of groups of objects of interest, the trip margin of which is to be supervised. When supervising the trip margin of a facility within a plant, which has a trip setting value, information regarding a trip-related signal having the highest possibility of trip occurrence and the movement of the overall trip-related signals are grouped and displayed on the screen so that relevant people can supervise them more easily. As a result, any abnormal condition of facilities is detected as early as possible. This decreases the occurrence of trip, and increases the operating rate of the plant. | 01-26-2012 |
20120029969 | RISK MANAGEMENT OF BUSINESS PROCESSES - Various embodiments of systems and methods for risk management of business processes are described herein. A system integrating process monitoring and automated risk management through a risk-annotated business process model is described. Such a risk would be computed for each of the possible path of execution of the business process. The source of such a data can be derived from other systems or be entered manually. A risk prediction rule is executed when a given event has happen. Depending on the current execution state of a business process instance, the risk is calculated from the probability and the impact. If the risk is over a certain threshold, some actions can be taken (e.g., stopping processes, initiate mitigation processes or notifying the business process owner). | 02-02-2012 |
20120029970 | SYSTEMS AND METHODS FOR ASSETS, PERSONNEL, AND TRAVEL INFORMATION AND RISK MANAGEMENT - A system(s) and method(s) for providing asset, personnel, and travel information accumulation, analysis, and reporting for improved risk assessment and management are disclosed. In various embodiments, risk assessments(s) may be provided and may include receiving intelligence from at least one intelligence source, receiving information about one or more asset(s), and generating a risk assessment report. Various embodiments may include receiving intelligence from at least one intelligence source, receiving asset information, and generating a risk assessment report based on the intelligence and a personnel or employee profile. Further, various embodiments methods and systems may provide travel information to a consumer, by for example, acquiring information from at least one information source, characterizing the acquired information by its pertinence to travel, transforming the characterized travel information into a useable format, applying rules to this transformed travel information in connection with the consumer-specific travel profile, and delivering a report to the consumer. | 02-02-2012 |
20120029971 | Method and apparatus for risk identification and mitigation in shift work fatigue - Method and apparatus for shift work scheduling based upon an optimization of analyzing and managing fatigue primarily in but not limited to aviation occupations. The invention matches workers to shifts in a manner that minimizes fatigue while on shift and maximizes shift worker effectiveness. The invention is adaptable to other occupations where assuring shift work crew rest is critical. Graphical user interfaces (GUIs) allow for the insertion of sleep into crew shift work schedules. Alternative sleep models are used for different modes of sleep. The invention produces as an output an optimized shift work/sleep schedules with an associated effectiveness determination. | 02-02-2012 |
20120041799 | INFORMATION PROCESSING APPARATUS AND COMPUTER READABLE MEDIUM - An information processing apparatus includes a difference calculation module, an addition module, and an output module. The difference calculation module calculates a difference between a first information amount that is generated between a first person in charge and a second person in charge when a business that constitutes a business process is finished and a second information amount that is estimated to be generated between the first person in charge and the second person in charge when the business that constitutes the business process is finished. The addition module adds the differences calculated by the difference calculation module in a combination of the first person in the business process and the second person in the business process or in other business process related to the business process. The output module outputs the sum of the differences calculated by the addition module as risks of the business processes. | 02-16-2012 |
20120046989 | SYSTEMS AND METHODS FOR DETERMINING RISK OUTLIERS AND PERFORMING ASSOCIATED RISK REVIEWS - Embodiments of the invention relate to risk review assessments and, more particularly to determining risk review candidates by identifying two or more community categories, determining risk scores for each user/employee across risk categories, normalizing the risk scores based on community averages and community standard deviations and determining risk review candidates by comparing the normalized risk scores to predetermined thresholds. In additional embodiments, an outlier reinforcement score for each user/employee by summing all of the positive-valued normalized risk scores across the two or more communities and comparing the outlier reinforcement score to a predetermined threshold. | 02-23-2012 |
20120046990 | PROCESS AND SYSTEM FOR CREATING A COMPATIBILITY RATING USED BY ENTREPRENEURS TO ALLOW THEM TO SELECT BUSINESS OPPORTUNITY PROVIDERS - The present invention generally relates to computer implemented methods for providing a compatibility rating. In particular, the present invention relates to a process that is computer implemented in which an entrepreneur obtains a score (e.g., a numerical expression) of their probability of having a prosperous and profitable experience with a business opportunity, franchise, direct sales company, or independent business idea provider (hereinafter referred as a ‘business opportunity provider”) based on shared compatibility. | 02-23-2012 |
20120059684 | Spatial-Temporal Optimization of Physical Asset Maintenance - A method for determining a maintenance schedule of geographically dispersed physical assets includes receiving asset data including infrastructure relationships between the assets, modeling failure risk of the assets based on spatial, temporal and network relationships, and producing the maintenance schedule according to a combination of the risk model, asset data, maintenance, and external operation constraints. The maintenance schedule may be corrective and/or strategic. | 03-08-2012 |
20120066020 | MULTI-TENANT DATABASE MANAGEMENT FOR SLA PROFIT MAXIMIZATION - Systems and methods are disclosed to consolidate workload on cloud-based computers by co-locating one or more high-penalty tenants on one or more cloud-based servers; reducing service level agreement (SLA) violations by over-provisioning the cloud-based server; and maximizing an SLA profit. | 03-15-2012 |
20120066021 | COMPUTER-IMPLEMENTED COMPANY RISK ANALYSIS AND PROFILE GENERATION - Computer-implemented company risk analysis and profile generation systems and methods are provided. In one embodiment, a computer-implemented method of analyzing risk associated with a plurality of companies includes receiving accounting information about the plurality of companies, receiving legal information about the plurality of companies, and receiving regulatory information about the plurality of companies. The accounting, the legal, and the regulatory information is utilized to assign a risk rating to each of the plurality of companies and to generate a profile for each of the plurality of companies. The risk ratings and the profiles are stored in an electronic database. Access to the electronic database is provided through a web site that enables a user to selectively retrieve the risk rating and the profile for a particular one of the plurality of companies. | 03-15-2012 |
20120072259 | DETERMINING OPTIMAL ACTION IN CONSIDERATION OF RISK - A system and method for determining an optimal action in consideration of risk. The method includes the steps of: (a) selecting a state from possible states in a current term; (b) selecting an action from action candidates that can be executed in a selected state; (c) calculating a probability distribution of an evaluation value for a selected action; (d) calculating a risk measure using the probability distribution of the evaluation value; (e) determining a weighting function conforming to at least one preference by taking the risk measure into consideration; (f) calculating a value measure of the selected action; (g) repeating steps (b) through (f) for all other the action candidates that can be executed in the selected state; and (h) comparing the value measures of the selected actions in order to determine an optimal action for the selected state. | 03-22-2012 |
20120078680 | Electrical Engineering And Capacity Management System And Method - An electrical system and method are provided that has a software system that provides the electrical engineer or designer the capability to design and document the complete electrical infrastructure within a facility and be made available to a facility operations group to monitor and manage capacity, consumption and risk. Furthermore it provides information technology personnel or project/change management system the ability to understand the capabilities of the electrical system as well as include financial metrics for finance as well as all parties to understand the cost of the facility from an operations, capital and power consumption perspective. | 03-29-2012 |
20120095802 | SYSTEM AND METHODS FOR EVALUATING POLITICAL, SOCIAL, AND ECONOMIC RISK ASSOCIATED WITH A GEOGRAPHIC REGION - Embodiments of the invention relate to systems and methods for evaluating political, social, and economic risk associated with a geographic region. In one embodiment, a system for evaluating political, social, and economic risk associated with a geographic region can be provided. The system can include an output device and a computer processor operable to execute computer readable instructions embodied in a data collection module and a risk modeling engine. The data collection module can be operable to: receive a plurality of indexes or scores associated with the geographic region, wherein one or more received indexes or scores are weighted with predefined coefficients; and aggregate the received indexes or scores. The risk modeling engine can be operable to generate at least one quantitative indicator based at least in part on the aggregated indexes or scores; and output a risk level indicator to the output device based at least in part on comparing the at least one quantitative indicator to one or more predefined risk level thresholds. | 04-19-2012 |
20120095803 | Product Inspection Device, Product Inspection Method, and Computer Program - A product inspection device that includes a measuring section, a deemed standard deviation calculation unit, a measurement value standard deviation calculation unit, a determination unit, and a risk calculation unit. The measuring section measures characteristic values of products, the deemed standard deviation calculation unit calculates a deemed standard deviation, and the risk calculation unit calculates a consumer risk and a producer risk based on at least one of an average value of the measured characteristic values of some of the products contained in a measured product lot, the deemed standard deviation, or the measurement value standard deviation. The determination unit changes a inspection standard based on at least one of the calculated consumer risk or the calculated producer risk, and determines whether or not all the products contained in the product lot are non-defective articles with the changed inspection standard as a reference. | 04-19-2012 |
20120101870 | Estimating the Sensitivity of Enterprise Data - A method for evaluating data includes defining a list of data categories, determining a relative sensitivity to each data category, determining one or more classifiers for each of the data categories, receiving a plurality of data items to be valued, determining one of the data categories for each of said plurality of data items according to the one or more classifiers, and determining a respective sensitivity for each of said plurality of data items. | 04-26-2012 |
20120116837 | SOCIAL RISK MANAGEMENT SYSTEM AND METHOD - The present invention provides a social risk management system and method capable of analyzing data pertaining to an economic venture, identifying social risks that may be encountered, generating specific prevention and mitigation measures for those hazards, and evaluating the results. In one embodiment, the present invention provides a user-friendly graphic user interface through which users may access the unique functionality of the present invention. In one embodiment, the present invention is capable of utilizing feedback data to generate one or more evaluation reports illustrating the success, or lack thereof, of the implemented prevention/mitigation measures. | 05-10-2012 |
20120116838 | ANALYSIS OF IT RESOURCE PERFORMANCE TO BUSINESS ORGANIZATION - A system, method and computer program product for determining at least one association between at least one business process and at least one network entity. The system maps at least one user to the business process. The system maps the user to at least one network end-point. The system maps the network end-point to at least one application. The system maps the network entity to the application. The system identifies the association among the business process, the user, the network end-point, the application and the network entity based on one or more of the mappings. | 05-10-2012 |
20120116839 | ENTERPRISE RISK ANALYSIS SYSTEM - A system is provided in which multiple sub-organizations are part of a parent organization and participate in common risk management. The system includes a first sub-system whereby each sub-organization provides a risk assessment, a second sub-system whereby the risk assessment of each sub-organization is converted into a risk assessment of the parent organization and a third sub-system whereby the respective risk assessments of the sub-organizations and the parent organization are employed for additional analysis. | 05-10-2012 |
20120123821 | System and Method for Risk Assessment of an Asserted Identity - A system for providing a risk assessment for an asserted identity comprising an identity database, a first risk database, a second risk database, an identity module that receives the asserted identity and searches the identity database to retrieve one or more known identities and calculates a probability score for each retrieved known identity, a correlator module that receives each retrieved known identity and respective probability score from the identity module, the correlator module further comprising an identity risk sub-module that searches the first and the second risk databases to retrieve respective first and second risk scores for each known identity, and an assessment module that receives the probability score and the first and second risk scores associated with each of the known identities from the correlator module and calculates a final risk score therefrom to thereby provide a risk assessment for the asserted identity. | 05-17-2012 |
20120123822 | COMPUTERIZED COMPLEX SYSTEM EVENT ASSESSMENT, PROJECTION AND CONTROL - Systems, methods and computer readable media for computerized event risk assessment, event projection and control of events associated with complex systems are disclosed. The assessment can include using statistically processed survey data to determine risk category performance. Event projection can be based on data retrieved from a past events database. Control can include real-time control of subsystems within the complex system and providing reports and visualizations. The visualizations can include profile graphs, bar graphs, dashboards and hyperbolic mapping. | 05-17-2012 |
20120136694 | TRANSITION PHASE TROUBLE DETECTION IN SERVICES DELIVERY MANAGEMENT - A method, system, and/or computer program product predicts trouble during a transition phase of a current project. Past operational data and past trouble data for past healthy projects and past troubled projects before transition phases is collected. A trouble correlation between the past operational data and the past trouble data is then determined. A set of key metrics that describes a current health of a current project before transitioning from a current phase to a future phase is defined, and values of the set of key metrics for the current project are identified. Identified values of the set of key metrics for the current project are compared to the past operational data for past healthy and troubled projects in order to generate a pattern comparison. This pattern comparison, along with the trouble correlation, is used to generate a predicted quality of transition for the current project. | 05-31-2012 |
20120136695 | Determining Maturity of an Information Technology Maintenance Project During a Transition Phase - Techniques for determining maturity of a delivery process in an information technology maintenance project are provided. The techniques include collecting information during a delivery process, wherein the information comprises operational data, aggregating the collected information for each delivery dimension into one or more aggregate delivery measures, wherein the one or more aggregate delivery measures comprise one or more delivery dimensions, comparing the one or more delivery dimensions against a threshold to determine a level of maturity for each delivery dimension, and determining an overall level of maturity of the delivery process by combining the level of maturity for each delivery dimension. | 05-31-2012 |
20120143649 | METHOD AND SYSTEM FOR DYNAMICALLY DETECTING ILLEGAL ACTIVITY - The present relates to a method and system for dynamically detecting illegal activity. The method and system collect new information, where the new information comprises at least an identity of an entity and a type of information. For each new information, the method and system determine whether there is at least one relation between the new information and at least one previous information stored in a storage module, and if there is at least one relation, a logical link is added between the new information and the at least one of the previous information with which there is the at least one relation. The method and system further verify whether the new information with the at least one previous information sharing the logical link correspond to at least one of a plurality of stored surveillance patterns, and if the new information with the at least one previous information sharing the logical link correspond to at least one of the plurality of stored surveillance patterns, a first type of alert is generated for the new information. The method and system further assign a risk factor to the new information, and verify whether the assigned risk factor is above a predetermined threshold, and if the assigned risk factor is above the predetermined threshold, generate a second type of alert. The method and system further integrate the new information in the storage module, and storing with the new information the logical link and the assigned risk factor. | 06-07-2012 |
20120143650 | METHOD AND SYSTEM OF ASSESSING AND MANAGING RISK ASSOCIATED WITH COMPROMISED NETWORK ASSETS - A method of managing risk associated with at least one compromised network asset, comprising: performing processing associated with receiving evidence regarding the at least one compromised network asset; performing processing associated with assessing at least one risk associated with the at least one compromised network asset; and/or performing processing associated with prioritizing at least two compromised network assets in order to determine how to respond to the at least one risk. | 06-07-2012 |
20120158454 | METHOD AND SYSTEM FOR MONITORING HIGH RISK USERS - An approach for enabling the monitoring of high risk users is described. A high risk user (HRU) event management platform designates a user as a high risk user candidate and then initiates monitoring of activities of a computing device associated with identity information of the user. The HRU event management platform then collects data from the computing device and from one or more data sources according to one or more predetermined parameters specifying asset information. The data is correlated with the identity information of the user for confirming that the user is a high risk user. | 06-21-2012 |
20120166248 | REMOTE IDENTIFICATION AND VERIFICATION OF STORAGE SYSTEMS - A system and method for generating a contract related to a data recovery. Storage components may be automatically examined by a module that may be automatically downloaded from a server, over a computer network. Hardware information and an identification parameter may be obtained and sent to a server. A contract may be generated based on information received by the server. A contract may be validated and data recovery service may be provided based on a validated contract. | 06-28-2012 |
20120166249 | ASSET MANAGEMENT SYSTEM - An asset management system includes a plurality of assets, a plurality of sensors for determining one or more operating conditions for each of said assets and one or more processors for determining a risk profile for each of the assets over time. The processor is arranged to calculate a risk index value for each asset from the risk profile, the risk index providing a relative indicator of the need for maintenance of an asset. A maintenance queue is established and assets are entered into the queue once the risk index value for that asset matches or exceeds a predetermined threshold value, the position of the asset in the queue being determined based upon the value of its risk index. | 06-28-2012 |
20120173300 | INFRASTRUCTURE ASSET MANAGEMENT - An approach for infrastructure asset management is provided. This approach comprises an end-to-end analytics driven maintenance approach that can take data about physical assets and additional external data, and apply advanced analytics to the data to generate business insight, foresight and planning information. Specifically, this approach uses a maintenance analysis tool, which is configured to: receive data about a set of physical assets of an infrastructure, and analyze the data about the set of physical assets to predict maintenance requirements for each of the set of physical assets. The maintenance analysis tool further comprises an output component configured to generate a maintenance plan based on the predicted maintenance requirements for each of the set of physical assets. | 07-05-2012 |
20120173301 | SYSTEM AND METHOD FOR FAILURE ASSOCIATION ANALYSIS - A system and method for mining the failure association rules of geographically dispersed physical assets is provided. One approach of the present invention has steps of joining input data sources, extracting spatio-temporal (ST) information, quantilizing ST continuous value in automated manner, or based on pre-built knowledge, applying association rule mining algorithm to find associations between attributes and failure and outputting identified ST failure association rules. | 07-05-2012 |
20120185295 | FREQUENCY ANALYSIS MODULE IMPLEMENTING APPARATUS AND METHOD OF QUANTITATIVE RISK ASSESSMENT SYSTEM. - The present invention relates to a frequency analysis module implementing apparatus and method of a quantitative risk assessment system. The apparatus includes an accident scenario generation unit for generating plural accident scenarios that define questions and formulas obtained from an expert for each accident to perform accident frequency and risk analysis; a module generation unit for generating plural modules individually corresponding to the accident scenarios; and a module driving unit for driving a module selected in correspondence with the accident from among the modules when the accident situation such as leaking of a hazardous material occurs. The module driven by the module driving unit performs accident frequency and risk analysis by calling an accident scenario corresponding to the module, providing a question defined by the accident scenario, and applying an answer input from a user in response to the question and a formula defined by the accident scenario. | 07-19-2012 |
20120191503 | INCIDENT COST MODEL - Embodiments of the present invention provide apparatuses and methods for determining the cost of poor quality of an incident within a business. One way to measure costs associated with an incident is by measuring failed customer interactions (“FCIs”). FCIs are defined as incidents that occur within the business that either directly or indirectly affect a customer's ability to use a product or service offered by the business. In most situations an FCI relates to a failed interaction between the business and the customer through a channel that affected the customer's use of a product or service through the channel. The cost of poor quality application calculates the total cost of an incident through a multifaceted valuation that factors in hard metrics, such as but not limited to actual costs, duration, channel costs, FCI severity, etc. in order to calculate a remediation cost, a channel FCI cost, and a reputation cost. | 07-26-2012 |
20120203590 | Technology Risk Assessment, Forecasting, and Prioritization - A computer system assesses the overall risk for different technologies for an organization. Technologies may be evaluated by obtaining severity levels and environmental risk scores for the vulnerabilities associated with the technologies. Each severity level measures a possible risk level of a corresponding vulnerability, while each environmental risk score is based on the organization's environment. Technology risk scores are then determined from the severity levels and the environmental risk scores. Each technology may then be categorized from a statistical distribution of the technology risk scores. An indexed risk score for each technology may also be determined based on time trending variables. Inputs may be a number of vulnerabilities, blended advisory/severity scores, and a standard deviation of the blended advisory/severity scores, and the results then provide behavior forecasting of the technologies. Further evaluation of the technologies may be performed to determine a risk versus reward model for the different technologies. | 08-09-2012 |
20120203591 | SYSTEMS, METHODS, AND APPARATUS FOR DETERMINING PIPELINE ASSET INTEGRITY - Certain embodiments of the invention may include systems, methods, and apparatus for determining pipeline asset integrity. According to an example embodiment of the invention, a computer executable method is provided for determining integrity of assets. The method can include identifying one or more risk factor conditions associated with one or more assets; evaluating the one or more risk factor conditions associated with the one or more assets; assigning non-linear weighted values to the one or more risk factor conditions based at least in part on evaluating the one or more risk factor conditions; determining one or more risk scores for the one or more assets based at least in part on the non-linear weighted values; and outputting the one or more risk scores. | 08-09-2012 |
20120209656 | NAVIGATIONAL CUBE FOR MATCHING VENDOR OFFERINGS TO SERVICE PROVIDER REQUIREMENTS - A displayed navigational cube configured to be navigated for use by a service provider to enable the service provider to select at least one vendor for meeting requirements of the service provider for deploying a selected service in a service delivery environment. The displayed navigational cube includes mutually orthogonal axes of a first axis, a second axis, and a third axis. Subservices of the selected service, vendors, and requirements are respectively represented on the first, second, and third axis to define elements at each unique combination of subservice, vendor, and requirement. Each element is transparent or non-transparent such that the navigational cube includes transparent elements and non-transparent elements. Each transparent element denotes an indication that the vendor is unable to meet each requirement for implementing each subservice. Each non-transparent element denotes an indication that the vendor is able to meet each requirement for implementing each subservice. | 08-16-2012 |
20120221374 | MEASURING INFORMATION COHESION IN AN OPERATING ENVIRONMENT - Devices, methods, and systems for measuring information cohesion in an operating environment are described herein. One or more device embodiments include a memory and a processor coupled to the memory. The processor can be configured to execute executable instructions stored in the memory to receive a measurement of an information cohesion factor associated with an operating environment through an interaction with a human user via a user interface for information entry, analysis, and visualization, and determine a risk score associated with the operating environment by applying a weighting factor to the measurement of the information cohesion factor, wherein the weighting factor is based, at least in part, on a cognitive effect associated with the information cohesion factor. | 08-30-2012 |
20120221375 | METHOD AND APPARATUS FOR SMART SAFETY MANAGEMENT - A method and apparatus for smart safety management is disclosed. The method may include receiving a request from a user to complete risk assessment form, retrieving a risk factors database from a memory and providing the risk factors database to the user, receiving risk factor information from the user concerning items in the risk factor database and any new or changed in risk factor information as defined by the user, storing the new or changed risk factor information received from the user in the risk factors database, calculating risk factor values based on the received risk factor information from the user concerning items in the risk factor database and any new or changed risk factor information as defined by the user, and outputting the risk assessment form containing the calculated risk factor values and providing the form to the user. | 08-30-2012 |
20120221376 | SYSTEM AND METHOD FOR OPTIMIZATION OF DATA SETS - Systems and methods for optimizing a portfolio comprising a plurality of assets, wherein the plurality of assets have a degree of interdependence are disclosed. The method may include estimating expected return rates, levels of risk, and correlation coefficients for a plurality of assets, wherein the assets are of the plurality of assets and the correlation coefficients are associated with the degree of interdependence of the assets; applying a non-standard probability distribution function to the assets to determine a distribution for each asset, wherein the non-standard probability distribution function is based at least on the expected return rate, level of risk, and correlation coefficient of that asset; and calculating an efficient frontier based on the distributions for the assets. | 08-30-2012 |
20120221377 | Augmenting Service Oriented Architecture Governance Maturity - Augmenting service oriented architecture (‘SOA’) governance maturity including receiving an evaluation of the maturity of the governance of the SOA; identifying, for each governance capability in dependence upon the evaluation of the maturity of the governance capability, one or more predefined risks to the SOA; establishing, for each governance capability in dependence upon the predefined risks to the SOA, a risk value representing the severity of the predefined risks; selecting, for each governance capability in dependence upon the evaluation of the maturity of the governance of the SOA and the predefined risk value, one or more governance work products; and communicating to predetermined stakeholders in the SOA the one or more predefined risks to the SOA identified for each governance capability, the risk value established for each governance capability, and the governance work products selected for each governance capability. | 08-30-2012 |
20120226518 | Service Level Agreement Work Prioritization System - A service task request ordering or prioritization system which has the intelligence to check all incidents on accounts supported by the Delivery Team in the current month, check the customer Service Level Agreement (“SLA”), check monthly ticket number average and calculate for a customer (or all customers) a priority level. The priority level assigned to a customer may be relative to other customers, or it may be an absolute indication of priority without regard to other customers. With this information, when a new ticket is opened, if this ticket is crucial to maintain the SLA according to the contract, the ordering will be based upon the priority level. For example, a light and/or sound alarm may turn on to indicate to the Delivery Team that a new ticket requires urgent attention based on its calculated priority level. This automation of priority level determination and/or the indications of priority level provided to the Delivery Team will drive them to fix the crucial tickets more quickly to avoid or minimize violations of the SLAs of the various customers. There is an accessible database which has information about tickets, and numbers of tickets in past periods. The system uses this ticket number information from past periods to determine risk attributes and/or prioritization levels. | 09-06-2012 |
20120226519 | METHODS AND SYSTEMS FOR DETERMINING RISK ASSOCIATED WITH A REQUIREMENTS DOCUMENT - Systems and methods are provided for assessing a risk associated with a requirements document and/or identifying one or more resources that can be used to manage the risk. A requirements document can be analyzed to extract elements from the requirements document into relationships. A relationship interface can be generated that includes the relationships for the requirements document. Information, associated with an entity or otherwise, relevant to the requirements document can be organized into risk issues using the relationships interface. One or more resources may be identified for the information relevant to the requirements document and an interface can be provided between the identified resource and a manager of the requirements document. | 09-06-2012 |
20120232948 | INFORMATION TECHNOLOGY INFRASTRUCTURE RISK MODELING - A system, method, and non-transitory computer readable medium for modeling IT infrastructure risk factors. The non-transitory computer readable medium having stored instructions, which when executed by a processor may cause the processor to generate a plurality of risk matrices, where an external process of a customer of an IT supplier is mapped to an IT infrastructure element of the IT supplier and a business process of a client of the customer is mapped to the external process of the customer, perform a risk analysis using the plurality of matrices to determine a criticality value for the IT infrastructure element in relation to the business process, and cause a presentation of the criticality value. | 09-13-2012 |
20120232949 | Tracking and Using Clinical Trial Protocol Feasibility Information - Systems and methods are disclosed for managing information from a feasibility study of a clinical trial protocol. Data relationships in a database can be utilized to, for example, formulate bids for managing a clinical trial protocol, track information about a feasibility study, output reminder notifications regarding overdue documents in connection with the feasibility study, provide information for use in site start-up or other processes implemented in conducting the clinical trial protocol, and allow feasibility study information to be analyzed after a clinical trial protocol has been conducted. | 09-13-2012 |
20120245972 | PROVIDING ACCESS TO FUTURE EXCEPTION INFORMATION IN A SUPPLY PLAN COLLABORATION SYSTEM - A supply plan collaboration system tracks supply plans and, based upon status information received from users of the system, identifies future exceptions that will arise due to the status information, in the absence of further changes to the supply plan. Future exceptions may be tracked by the system, provided to users before or at the time that they occur, and closed or otherwise managed by the system as they become relevant or are removed by further changes related to the supply plan. | 09-27-2012 |
20120245973 | Methods For Analyzing Job Functions And Job Candidates And For Determining Their Co-Suitability - A method and system for conducting an elemental analysis of a job's functions and requirements, conducting a medical diagnosis of a worker to determine the physical capabilities and limitations of the worker, and comparing the elemental analysis and the medical diagnosis to determine whether the worker can function in a particular job be it the current job, another existing job or a modification of either. | 09-27-2012 |
20120253881 | ELECTRICAL RESOURCE CONTROLLER - In an exemplary embodiment of the present disclosure, an electrical system is provided. The system comprises a controller including a plurality of machine implemented processing sequences. The electrical system also includes a plurality of sensors configured to receive input related to the environmental conditions of the environment surrounding the plurality of sensors and transmit the input to the controller, at least one power source in electrical communication with the controller. The electrical system further includes at least one storage device in electrical communication with the controller, and at least one device sensor in communication with an end user. The at least one device sensor includes memory, and the memory includes priority information regarding the priority of a device associated with the at least one device sensor. The at least one device sensor is operable to transmit information to the controller. | 10-04-2012 |
20120253882 | Identification of Instable Service Plan - A method for identification of an instable network operator service (NOS) plan having one or more mobile users. Instable NOS plans are determined by first determining a heterogeneity constant for each of a plurality of NOS plans. Based at least in part on the constant, the NOS plans are classified among different categories, wherein at least one category identifies an instable NOS plan. For each of the mobile users subscribed to at least one of the instable NOS plan category, determining a best NOS plan from amongst the plurality of NOS plans and a sample network operator service plan based at least in part on a spending behavior of the respective ones of the mobile users. Identifying, the instable NOS plan from amongst the plurality of NOS plans in which maximum number of mobile users correspond to the sample NOS plan as the correspondingly determined best NOS plan. | 10-04-2012 |
20120253883 | Food product contamination event management system and method - An event management system has a first input node, a second input node, and a food event management system. The first input node is adapted to receive epidemiological information. The second input node is adapted to receive food distribution path information. The food event management system is coupled to the first input node and to the second input node. The food event management system is adapted to compare the epidemiological information and the food distribution path information to identify one or more possible correlations and to generate an event output related to the one or more possible correlations. | 10-04-2012 |
20120259673 | Risk-Based Complaint Management System - A risk-based complaint management system is provided to effectively prioritize risks and streamline a complaint process. The risk-based complaint management system comprises a risk assessment database and a risk engine. The risk assessment database is provided to establish and maintain product-specific questions. The product-specific questions are associated to risk and severity levels of product risk assessment. The risk engine is configured to determine a risk level of a customer complaint based on responses to the product-specific questions with regards to the customer complaint. | 10-11-2012 |
20120265579 | ENABLING A SUPPLIER OF COMPUTING INFRASTRUCTURE TO ANALYZE AN ASPECT OF BUSINESS - A supplier of computing infrastructure is enabled to analyze an aspect of business with respect to cloud computing business users of the computing infrastructure. A model for a cloud computing business for the cloud computing business users to rent computing items of the computing infrastructure from the supplier is accessed. The model includes inputs, parameters, and knobs. Sensitivity analysis and risk assessment are performed using the model based on any of the inputs, parameters, and knobs. Output describing results of the sensitivity analysis and the risk assessment is provided. | 10-18-2012 |
20120278126 | LOSS DISTRIBUTION CALCULATION SYSTEM, LOSS DISTRIBUTION CALCULATION METHOD AND LOSS DISTRIBUTION CALCULATION-USE PROGRAM - Provided is a loss distribution calculation system, comprising: a frequency distribution/scale distribution input section that inputs information about a frequency distribution and a scale distribution; a scale distribution discretization section that performs either one or both of upside and downside discretizations for the input scale distribution; a sub-composite distribution calculation section that calculates, after performing division of all events, a probability value of a cumulative sum of losses for a portion out of all events in order to calculate either one or both of an upside sub-composite distribution and a downside sub-composite distribution, the upside sub-composite distribution being calculated based on the frequency distribution and the upside-discretized scale distribution, and the downside sub-composite distribution being calculated based on the frequency distribution and the downside-discretized scale distribution; an accuracy calculation section that calculates upper and lower bounds of a loss distribution function based on either one or both of the upside and downside sub-composite distributions, calculates a function, as an approximate value of the loss distribution function, based on either one or both of the upside and downside sub-composite distributions, and calculates an accuracy of the approximate value; and a loss distribution output section that outputs information about the approximate value of the loss distribution function with guaranteed accuracy represented by information about the calculated accuracy. | 11-01-2012 |
20120296692 | SYSTEM AND METHOD FOR MANAGING A FRAUD EXCHANGE - Systems and methods for presenting fraud detection information are presented. In one example, a computer system for managing and enabling communication of information potentially pertinent to identifying fraudulent activity receives requests via a producer interface, to store a plurality of data points potentially pertinent to identifying fraudulent activity from a plurality of source systems. A fraud exchange engine performs an analysis of the data points to produce a relational data point. And a consumer interface receives, from at least one target system, a request to retrieve at least one of a set of the plurality of data points and the at least one relational data point. | 11-22-2012 |
20120296693 | Risk Portal Including Social Media - Risk information portal systems and methods are provided. The portal allows business managers and others to track, organize and review risks. One or more social media news feeds may provide risk information that is found from social media sources. The portal may also provide research tools and interactive tools to locate industry pricing information. A risk maturity index tool also allows users to obtain a risk maturity score. | 11-22-2012 |
20120296694 | Risk Portal Including Pricing Data - Risk information portal systems and methods are provided. The portal allows business managers and others to track, organize and review risks. One or more social media news feeds may provide risk information that is found from social media sources. The portal may also provide research tools and interactive tools to locate industry pricing information. A risk maturity index tool also allows users to obtain a risk maturity score. | 11-22-2012 |
20120296695 | Risk Portal Including Index Tool - Risk information portal systems and methods are provided. The portal allows business managers and others to track, organize and review risks. One or more social media news feeds may provide risk information that is found from social media sources. The portal may also provide research tools and interactive tools to locate industry pricing information. A risk maturity index tool also allows users to obtain a risk maturity score. | 11-22-2012 |
20120296696 | SUSTAINING ENGINEERING AND MAINTENANCE USING SEM PATTERNS AND THE SEMINAL DASHBOARD - Supporting problem resolution of an organization, in one aspect, may include obtaining operational data associated with the organization, calculating operating metrics based on the operational data, detecting one or more metrics trends based on the calculated operational metrics, identifying one or more relations between the metric trends, and determining one or more SEM patterns from two or more of the calculated operational metrics and metric trends. | 11-22-2012 |
20120303408 | Automated risk transfer system - An automated method, computer program product and system for using artificial intelligence based cognitive learning methods to identify, measure and manage risks for a commercial enterprise on a continual basis. The elements of value, external factors, components of value and categories of value of the enterprise are analyzed and modeled using predictive models that are developed by learning from the data associated with said enterprise. Scenarios of both normal and extreme situations are also developed by learning from the data. The scenarios are then used to drive simulations of the predictive models. The output from these simulations are then used to measure a plurality of risks and complete optimization analyses that identify the optimal mix of risk reduction activities for the enterprise. The optimal mix of risk reduction activities is then presented to the user for optional editing, rejection or acceptance. | 11-29-2012 |
20120310700 | SYSTEM AND METHOD FOR EVALUATING COMPLIANCE OF AN ENTITY USING ENTITY COMPLIANCE OPERATIONS - A server defines a plurality of compliance factors that specify one or more operations for compliance with a policy. The server configures at least one of the plurality of compliance factors to be completed based on an entity type of an entity. The server receives entity data of an entity. The entity data pertains to the compliance factors that correspond to an entity type of the entity. The server determines the status of at least one compliance factor based on the entity data and determines a compliance score for the entity based on the status of the at least one compliance factor. The server provides the compliance score to a user to notify the user of a level of compliance of the entity. | 12-06-2012 |
20120316916 | METHODS AND SYSTEMS FOR GENERATING CORPORATE GREEN SCORE USING SOCIAL MEDIA SOURCED DATA AND SENTIMENT ANALYSIS - The present invention provides a News/Media Analytics System (NMAS) adapted to automatically process and “read” news stories and content from blogs, twitter, and other social media sources, represented by news/media corpus, in as close to real-time as possible. Quantitative analysis, techniques or mathematics, such as green scoring/composite module and sentiment processing module are processed to arrive at green scores, green certification, and/or model the value of financial securities, including generating a green score, green compliance certification, and a composite environmental or green index. The NMAS automatically processes news stories, filings, new/social media and other content and applies one or more models against the content to determine green scoring and/or anticipate behavior of stock price and other investment vehicles. The NMAS leverages traditional and, especially, social media resources to provide a sentiment-based solution for scoring the “greenness” of companies. | 12-13-2012 |
20130006701 | ASSESSING AND MANAGING RISKS OF SERVICE RELATED CHANGES BASED ON DYNAMIC CONTEXT INFORMATION - A method of assessing and mitigating a risk of a proposed change includes entering a category of the change, filtering risk assessment questions based on the entered category of the proposed change, determining an initial risk based on a dynamic change context, determining at least one high risk factor that is associated with the initial risk, filtering mitigation risk questions based on the at least one high risk factors, and re-determining the risk from mitigation answers to the filtered mitigation risk questions. | 01-03-2013 |
20130006702 | SYSTEM FOR COLLECTING AND MANAGING RISK MANAGEMENT FILE AND SAFETY ASSURANCE CASE DATA - An electronic intermediary electronically connects with a medical device manufacturer and regulatory agencies, collects and processes electronically product life cycle safely related events and information from a medical device manufacturer. The electronic intermediary processes the information collected electronically, integrates, generates, maintains, presents and distributes the risk management file and safely assurance case through the product life cycle using, linking, and connecting the collected and processed data. | 01-03-2013 |
20130024238 | RISK SCORE DETERMINATION - Embodiments of the invention are directed to systems, methods and computer program products for determining a risk score for an agent associated with an entity. In some embodiments, a method includes: (a) receiving first information associated with an agent's action related to an account and/or an agent's actions over a predetermined period of time related to one or more applications, and (b) determining a first risk score based at least partially on the first information. In some embodiments, the method further includes: (c) receiving, from a data system, second information associated with the agent, where the second information comprises one or more entitlements granted to the agent by the entity, and (d) determining a second risk score based at least partially on both the first information and the second information. Embodiments of the invention allow an entity to monitor an agent's actions and determine whether the agent's actions, either singly or cumulatively, pose a risk to the customer's account and/or other information provided by the customer. | 01-24-2013 |
20130024239 | INSIDER THREAT DETECTION - Embodiments of the invention are directed to systems, methods and computer program products for determining a threat associated with an agent's provision of a service to an outsider. In some embodiments, a method includes: (a) receiving first information associated with the outsider, (b) receiving, from a data system, second information associated with the agent, where the agent provided the service to the outsider, and (c) determining a relationship between the outsider and the agent. In some embodiments, the method further includes: (d) receiving third information associated with the agent's provision of the service to the outsider, and (e) determining an abnormal event associated with the service. | 01-24-2013 |
20130030861 | DETERMINING ACTIVITY OUTLIERS FROM AMONGST A PEER GROUPING OF EMPLOYEES - Systems, methods, and computer program products are provided for identifying activity outliers from amongst employees/associates within a predetermined peer group of employees. The inventive concepts herein disclosed require establishing consistent peer groupings of employees/associates. In specific embodiments, the peer groupings may be defined by combining one or more and, typically two, line of business hierarchies and job title. Once the peer grouping is established, monitoring of pre-determined activities within designated applications is performed to determine the number of occurrence of the predetermined activities over a designated period of time. Activity outliers are subsequently determined based on the number of occurrence of the predetermined activities over the designated period of time. In specific embodiments, such determination of activity outliers includes determining peer group averages, an employee/associate's variance from the average, the employee/associate's standard deviation and the employee/associate's z-score. | 01-31-2013 |
20130041711 | ALIGNING PROJECT DELIVERABLES WITH PROJECT RISKS - Methods, computer readable media, and apparatuses for aligning project deliverables with project risks are presented. According to one or more aspects, an architectural assessment of a new project may be received at an initial estimation phase of the new project. Subsequently, a rigor worksheet for the new project may be received at the initial estimation phase of the new project. A rigor score for the new project then may be calculated based on the architectural assessment and the rigor worksheet. Thereafter, one or more project deliverables to be imposed on the project may be selected based on the calculated rigor score. | 02-14-2013 |
20130041712 | EMERGING RISK IDENTIFICATION PROCESS AND TOOL - Managing risks may include receiving multiple issues associated with an enterprise where each issue is a future risk or a current risk, storing the issues, aggregating the issues, filtering the issues by executing a predefined rule set to determine a set of issues for analysis, creating a report including the set of issues for analysis, and transmitting the report to a user. Managing risk may also include determining a status of an action item associated with an issue in the set of issues, monitoring open issues and associated action items, and removing any closed issues. | 02-14-2013 |
20130041713 | Supplier Risk Dashboard - A system and method for a supplier risk dashboard is disclosed. A method for determining comprehensive supplier risk includes receiving a first supplier data from a first data source, the first supplier data indicating a plurality of suppliers and one or more risk characteristics associated with each of the plurality of suppliers to an organization. The method further includes receiving a second supplier data from a second data source, the second supplier data indicating a plurality of suppliers and one or more risk characteristics associated with each of the plurality of suppliers to the organization. The method also includes for one or more of the suppliers indicated in the first supplier data, associating one or more risk characteristics indicated in the first supplier data with one or more risk characteristics indicated in the second supplier data. | 02-14-2013 |
20130041714 | Supplier Risk Health Check - A system and method for a supplier risk health check system is disclosed. A method for determining supplier risk includes receiving a first supplier data from a first data source, the first supplier data indicating a plurality of suppliers and one or more risk characteristics associated with each of the plurality of suppliers to an organization. The method further includes receiving a second supplier data from a second data source, the second supplier data indicating a plurality of suppliers and one or more risk characteristics associated with each of the plurality of suppliers to the organization. The method also includes for one or more of the suppliers indicated in the first supplier data, associating one or more risk characteristics indicated in the first supplier data with one or more risk characteristics indicated in the second supplier data. | 02-14-2013 |
20130041715 | RISK EVALUATION SYSTEM USING PEOPLE AS SENSORS - Disclosed is a risk evaluation system that uses people as sensors, wherein a control unit ( | 02-14-2013 |
20130054302 | ENABLEMENT OF EXPOSURE MANAGEMENT TO HANDLE PRICED EXPOSURE - A message may be used to update computing system of a commodity transaction. The message may include a commodity identifier, a date term, a quantity term, and a price term. The price term may include a formula arrangement or reference to a formula arrangement for calculating a fractional exposure of the entity to the commodity on each date in which an event affecting commodity transaction occurs. Each of these fractional exposures may be calculated for each commodity transaction and stored as separate entries in a data structure. The entries may then be updated, queried, and/or reorganized to generate an exposure position. | 02-28-2013 |
20130060598 | Supply Chain Risk Management Method and Device - The invention comprises a device for and method of managing supply chain risk at a computer system device comprising a processor, a memory subsystem in communication with the processor, and computer executable instructions storable in the memory subsystem and executable by the processor to perform the method, the method comprising determining a degree of supply chain risk to an enterprise as a function of an effect of a disruption of delivery of the production input to the enterprise on a financial performance metric of the enterprise. | 03-07-2013 |
20130060599 | People Risk Portal - A computer server hosts a web portal used to customize and display data associated with personnel factors affecting business at a particular geographic location. The data may be collected covering a number of human resource factors, such as personal income, age, crime rate, education, corruption, healthcare and others and may be used to analyze problems such as recruitment, training, retention, etc. A portal allows access to the data for an individual location as well as presenting side-by-side comparison of multiple locations. The portal further allows a user to apply a custom weight to each factor according to the needs of a particular business, such as high tech or consumer products, to allow more meaningful analysis of the location or locations. | 03-07-2013 |
20130060600 | RISK REPORTING LOG - Risk organizing and tracking systems are provided. Users may enter risks relevant to a business entity and associate one or more parameters. The parameters may be chosen from a default list or created by a user. A risk scoring algorithm may also be selected or provided. Scores for the risks may then be generated using the risk scoring algorithm. | 03-07-2013 |
20130066673 | Adapting thresholds - Promoting a candidate content item included in a plurality of content items is disclosed. A plurality of user reputation scores is received. For the candidate content item in the plurality of candidate content items, a content reputation score is determined based at least in part on a portion of the received user reputation scores. A determination of whether to promote the candidate content item is made based at least in part on the content reputation score and a dynamically adjusted threshold. The candidate content item is promoted if it is determined that the candidate content item should be promoted. | 03-14-2013 |
20130080207 | System and Method for Identifying Relevant Information for an Enterprise - A system and method are provided for finding and retrieving information within an enterprise that is relevant to enterprise problems, enterprise opportunities, and unexpected or interesting events. The method includes scanning content related to a process conducted by an enterprise, where the process includes one or more process steps; identifying a problem, opportunity or event associated with a process step (an enterprise stress point); indexing the scanned content with respect to the enterprise stress point; determining whether the scanned content is information relevant to the problem, opportunity or event; and providing relevant information to a user. The relevant information includes a description or discussion of a contemporaneous or previous experience of the enterprise regarding the problem, opportunity or event. | 03-28-2013 |
20130085800 | System and Method of Business Risk Based Authorization - A system and method of authorizing access in a computer system. The method includes receiving a request to use the computer system, reading authorization data associated with the user, and denying the request according to the authorization data. The method further includes determining a business process risk associated with the request and comparing a characteristic of the request and the business process risk. The method further includes authorizing the request to use the computer system by the user when the business process risk exceeds the characteristic. In this manner, the delay involved in performing the normal access provisioning process is avoided for situations in which the business risk exceeds the cost of the delay. | 04-04-2013 |
20130085801 | Supply Chain Performance Management Tool Having Predictive Capabilities - A method for providing a supply chain management tool may include generating a representation of a supply chain of an organization where the representation is generated responsive to identification of supply chain entities and corresponding flows therebetween. The flows may include transactional layer activities at a stock keeping unit level. The method may further include referencing the representation to determine historical data indicative of supply chain performance, and utilizing processing circuitry to employ the historical data to generate at least one prediction regarding future operating performance of the supply chain. | 04-04-2013 |
20130090978 | RISK-BASED EVALUATION OF FINANCIAL ADVISORS - A particular method includes selecting a financial advisor from a plurality of financial advisors. The selected financial advisor has a plurality of financial advising relationships with a plurality of clients. The financial advising relationships are automatically evaluated based on a plurality of risk assessment rules. A relationship risk score for each of the financial advising relationships is computed. | 04-11-2013 |
20130096979 | SYSTEM FOR MONITORING SAFETY PROTOCOLS - Systems and methods for monitoring safety procedures for an industrial facility. A user interface for a safety operator interfaces with a database containing safety documents for components installed and in use in the industrial facility. The user interface also interfaces with a safety calculation module that calculates the risk level for specific potential consequences if specific safety procedures are not implemented. Whenever a potentially unsafe situation occurs, the risk levels associated with the potential consequences of the unsafe situation are presented to the safety operator along with contingencies which may be implemented to alleviate the risks. Past potentially unsafe situations are also presented to the safety operator by way of a time line such that a historical record of the safety of the facility can be taken in at a glance. | 04-18-2013 |
20130096980 | USER-DEFINED COUNTERMEASURES - A particular set of computing assets is identified on a particular computing system including a plurality of computing assets. A user definition is received of a particular countermeasure applied to the particular set of assets, the user definition of the countermeasure including identification of each asset in the particular set of assets and identification of at least one vulnerability or threat addressed by the particular countermeasure in a plurality of known vulnerabilities or threats. Based on the user definition, actual deployment of the particular countermeasure on the particular computing system is assumed in a risk assessment of at least a portion of the particular computing system. | 04-18-2013 |
20130103454 | METHOD AND SYSTEM FOR ASSESSING COMPLIANCE RISK OF FINANCIAL INSTITUTIONS - A system and method for assessing compliance risk of a financial institution. Data on a plurality of financial institutions is extracted from publicly available sources and stored in an extracted information database. A client questionnaire is created and separated into a plurality of role categories. A list of employees and their area of responsibility is obtained from a client financial institution. The client questionnaire is distributed to the employees, each employee receiving questions from a role category based on their area of responsibility. Answers are stored in a client questionnaire database. Data on the client financial institution is located in the extracted information database. Then, based on the questionnaire answers and extracted data, the risk that the client financial institution will not be compliant with a set of regulations is assessed. | 04-25-2013 |
20130110579 | COMPARING CONTRACTS WITH DIFFERENT LENGTHS USING UNCERTAINTY INFORMATION | 05-02-2013 |
20130110580 | SYSTEM AND METHOD OF PROVIDING PRODUCT QUALITY AND SAFETY | 05-02-2013 |
20130117066 | DECISION SUPPORT METHOD AND SYSTEM FOR PROJECT MANAGEMENT OF LIQUEFIED NATURAL GAS PLANT - Provided are a decision support method and system for project management of a LNG plant. In the decision support method, a plurality of stages corresponding to sequential processes performed for Engineering, Procurement & Construction project management of the LNG plant are determined Decision items necessary to perform each of the plurality of stages are determined. Individual performance scores with respect to the decision items are estimated and a total performance score with respect to each of the plurality of stages is determined using the individual performance scores. Risk factors with respect to each of the plurality of stages are determined and risk indexes with respect to each of the plurality of stages are derived by evaluating the risk factors. Decision-making is performed with respect to a corresponding stage according to the total performance score and the risk index derived with respect to each of the plurality of stages. | 05-09-2013 |
20130124256 | METHOD AND SYSTEM FOR MONITORING PLANT ASSETS - The invention is a method and system for monitoring plant assets automatically comprising the steps of calculating a sum of the plant assets to be monitored, storing the calculated sum in a database, calculating a sum of the bad actors, computing the percentage of bad actors from the calculated sum, storing the computed percentage of bad actors into the database, calculating a current sum of the plant assets to be monitored after a predetermined interval, retrieving the stored sum of the plant assets, determining whether the current sum of the plant assets corresponds to the stored sum. When the stored sum corresponds to the current sum, the current sum of bad actors is calculated, the percentage of bad actors is computed from the calculated sum to determine an Asset Health Risk Index (“ARI”). | 05-16-2013 |
20130132149 | METHOD FOR QUANTITATIVE RESILIENCE ESTIMATION OF INDUSTRIAL CONTROL SYSTEMS - A three-layer model of an engineering system is proposed for developing and evaluating a resilient industrial control system incorporated within the engineering system, the model based upon a group of metrics that are cyclically estimated, operated and evaluated to create a valid resilient arrangement. The layers in the model include a human/operator layer, an automation layer and a process layer, where the industrial control system resides in the automation layer. The metrics are based upon the identification of a number of undesirable incidents, as well a determination of the frequency of occurrence of these incidents, their impact on the performance of the engineering system and the financial loss of the engineering system based upon these undesirable incidents. | 05-23-2013 |
20130132150 | METHOD AND SYSTEM FOR ASSESSING COMPLIANCE RISK OF REGULATED INSTITUTIONS - A system and method for assessing compliance risk of a regulated institution. Data on a plurality of regulated institutions is extracted from publicly available sources and stored in an extracted information database. A client questionnaire is created and separated into a plurality of role categories. A list of employees and their area of responsibility is obtained from a client regulated institution. The client questionnaire is distributed to the employees, each employee receiving questions from a role category based on their area of responsibility. Answers are stored in a client questionnaire database. Data on the client regulated institution is located in the extracted information database. Then, based on the questionnaire answers and extracted data, the risk that the client regulated institution will not be compliant with a set of regulations is assessed. | 05-23-2013 |
20130132151 | Automated Omnipresent Real-time Credibility Management System and Methods - Some embodiments provide a credibility management system that aggregates user posts from several social media sites contemporaneously with the posts being published to those sites. The system parses each of the aggregated posts to identify an entity that is targeted in each of the posts and presents the posts to the targeted entities in a real-time manner. The credibility management system computes a score to determine the impact that a user post would have on the credibility of a targeted entity. By presenting the computed scores and aggregated posts to the targeted entities, the credibility management system notifies the targeted entities about what is being said about them across social media, identifies the impact of those posts, and provides a platform whereby the targeted entities can reply in order to mitigate or improve the impact that the posts would have on credibility. | 05-23-2013 |
20130138474 | CUSTOMER RETENTION AND SCREENING USING CONTACT ANALYTICS - Potential customer loss is identified under circumstances where structured data may be ineffective. Game theory analytics of customer loss enable the construction of a parameter list to be screened. Concepts are associated with the parameters and their ranges. Keywords associated with the concepts are mined by an extraction engine to identify contact records of customers at risk of loss. Appropriate customized loss mitigation and customer retention strategies can be implemented. | 05-30-2013 |
20130144681 | COMPUTER-BASED METHOD FOR MANAGING CONFLICT IDENTIFICATION - The invention is a computer-based method for identifying and managing conflict identification within an organization. Specifically, the present invention preferably provides the organization with the ability to: (1) identify conflicts through preset factors; (2) designate trigger levels for each conflict; (3) identify the sources of each conflict; (4) provide email notifications of the identified conflict; (5) efficiently allocate existing resources by designating certain personnel to address the identified conflict; (6) suggest conflict intervention and de-escalation strategies to address the identified conflict; (7) provide a continuous feedback loop until the identified conflict is resolved; (8) provide users with a list of completed and pending assessments; and (9) provide a reporting scheme to track each conflict within the organization. Preferably, the present invention is adaptable and customizable to different organizational environments such as medical, business, military, and school administrative systems. | 06-06-2013 |
20130151306 | SYSTEM AND METHOD OF PERFORMING AN ENGINEERING-BASED SITE DEVELOPMENT AND RISK ASSESSMENT PROCESS - A system and method is provided for on-site site risk assessment and to encourage collaboration between professional disciplines related to land development and construction projects. A graphical risk analysis system is provided based on answers to interdisciplinary questions related to risks. Use of the system promotes a complete checklist of interdisciplinary and informational consultation which, when completed for a project, assesses the risk related to construction site development and allows for reduction in risk as the project progresses. | 06-13-2013 |
20130159049 | AUTOMATIC RISK CALIBRATION OF ROLES IN COMPUTER SYSTEMS - Various embodiments of systems and methods for automatic calibration a risk level of a role are described herein. Automatically and periodically a risk level of a role is evaluated based on various risk factors associated with the role. Risk factors' values are determined by respective risk factor aggregators. Risk factors are assigned weights to determine their influence degree on the risk level of the role. The risk level of the role is computed by a risk calibration engine based on the determined risk factors' values and assigned weights, respectively. | 06-20-2013 |
20130159050 | Methods and Systems for Managing Corporate Risk - Methods and systems for facilitating transactions are disclosed. A method for identifying corporate risk, implemented on a computer system, includes obtaining corporate data on computer-readable media, the corporate data comprising at least one of internal data and external data, obtaining behavioral corporate data from the corporate data on computer-readable media, the behavioral corporate data comprising at least one event data point, obtaining data indicative of risk-creating behavior from the behavioral corporate data on computer-readable media by evaluating the corporate data against a knowledge-base of characteristic risk-creating behavior, and communicating the data indicative of risk-creating behavior to a user as threat vectors with at least one dimension, the threat vectors displayed on a graphical user interface. | 06-20-2013 |
20130166346 | Systems, Computer-Implemented Methods and Computer-Readable Media to Provide Multi-Criteria Decision-Making Model for Outsourcing - Embodiments including systems, computer-implemented methods, and computer-readable media can generate an outsourcing questionnaire interface to be displayed at a display. The outsourcing questionnaire interface can include a plurality of questions, relating to a plurality of outsourcing dimensions, and a corresponding plurality of response fields for users to respond with respect to a business process. Embodiments can further determine a plurality of dimensional scores for the business process responsive to a plurality of user-selected responses received at the plurality of response fields. Embodiments can further generate an outsourcing recommendation interface, to be displayed at the display, that is a graphical chart including a process-recommendation bubble, for the business process, which can be displayed having a position and size in the graphical chart determined responsive to one or more of the plurality of dimensional scores. | 06-27-2013 |
20130179215 | RISK ASSESSMENT OF RELATIONSHIPS - Assessing risks arising from relationships with third-parties that support the operations or strategic goals of an organization, such as a bank, are provided. A risk assessment system receives risk assessment values respectively corresponding to the likelihood, severity, and control for a risk item associated with a third-party relationship. The risk assessment system then determines a risk priority value for the risk item based on the risk assessment values. The risk assessment system may prioritize multiple risk items according to their respective risk priority values, risk categories, or both. In some arrangements, the risk assessment system may identify a risk item for additional risk mitigation and determine a risk mitigation action plan for the identified risk item. | 07-11-2013 |
20130197963 | System and Method for Calculating a Risk to an Entity - According to one embodiment, a system includes a memory, a processor, and an interface. For a first region, the processor calculates a risk associated with a political situation of the first region, a risk associated with a legal situation of the first region, a risk associated with an economic situation of the first region, a risk associated with a social situation of the first region, a risk associated with a technological situation of the first region, and a risk associated with an environmental situation of the first region. For a first entity, the processor calculates a risk associated with an exposure level of the first entity in the first region. Based at least on these calculated risks, the processor calculates a ranking for the first region, the ranking representing an amount of risk to the first entity in the first region. The interface communicates the ranking for display. | 08-01-2013 |
20130197964 | METHOD OF MASS MANUFACTURING, MAINTAINING, REPAIRING, SELLING, FINANCING, AND DELIVERING LOW-COST AND LONG-LIFE PASSENGER MOTOR VEHICLES - A method of mass manufacturing is provided wherein an assembly (e.g., a passenger vehicle) is manufactured from a plurality of parts. The method comprises the steps of licensing/selecting/auditing engineering firms and independent contractors to mass manufacture the assembly in an efficient manner. Reputable agencies are designated to finance loans having a payback schedule extending substantially over the life of the manufactured assembly. The manufactured assemblies are then delivered to individuals who have obtained financing, preferably without dealer intermediates. | 08-01-2013 |
20130197965 | RISK ASSESSMENT AND MITIGATION PLANNING, SYSTEMS AND METHODS - Risk management systems and methods for plant EPCCOM are described. The system comprises a risk management database for storing risk objects, each object representing a real-world risk mitigation factor. A risk recommendation engine is communicatively coupled to the risk management database and is configured to provide recommendations for mitigating and managing risks as a function of efficacy attributes of the risk objects. The efficacy attributes represent the effectiveness mama of previously implemented and/or simulated risk mitigation strategies. The efficacy attributes are preferably multi-variable dependent and are defined by prioritizing and weighing different objectives. | 08-01-2013 |
20130197966 | ANALYTICS ENGINE, SYSTEM AND METHOD FOR ASSESSING AND PREDICTING RISK AND OPPORTUNITIES - The present invention pertains to an analytics engine, system and method for providing risk/opportunity assessment and decision support solutions to users, such as for life sciences and healthcare constituents. The system includes an ontology based risk analytics engine that enhances its clients' decision making by systematically identifying and quantifying knowledge, which presents unexplored opportunities or risks. This independent review and evaluation leads to action plans that optimize critical project planning, improve success and outcome and lower costs. The system complements and extends existing internal decision processes and facilitates the systematic and unbiased application of knowledge to assist in making the best-informed decisions. | 08-01-2013 |
20130197967 | COLLABORATIVE SYSTEMS, DEVICES, AND PROCESSES FOR PERFORMING ORGANIZATIONAL PROJECTS, PILOT PROJECTS AND ANALYZING NEW TECHNOLOGY ADOPTION - Processes, machines, and computer-readable media are provided for proposing and evaluating pilot projects. A project management system stores feedback items specified by agents of an organizational entity in association with a pilot project. An agent may submit a feedback item in association with a type of feedback such as: problem reporting feedback, action recommending feedback, question asking feedback, feature recommending feedback, or feature listing feedback. The project management system causes display, to an agent on a type-selection interface, of two or more options, each corresponding to a different type of feedback on the pilot project. The project management system receives a selection of an option to view or create feedback items of a type. In response, the project management system causes display of feedback items of the particular type and an option to create a feedback item of the particular type. | 08-01-2013 |
20130211871 | ASSESSMENT AND RATIONALIZATION OF RESILIENCY OF DATA CENTER STRATEGIES - Assessing resiliency of facility configuration strategies, in one aspect, may employ a mathematical model representation of facility configuration. Organization environment factors and one or more desired performance metrics associated with the organization may be determined. A technical model specification that defines the configuration of facilities of the organization may be received, and a mathematical model representation of the configuration may be created. The mathematical model representation is solved for steady-state characteristics, and one or more values may be estimated respectively of the desired performance metrics based on the steady-state characteristics. The resiliency may be measured based on the estimated one or more values. | 08-15-2013 |
20130211872 | Assessing Risk Associated with a Vendor - There is disclosed a method and apparatus for assessing risk associated with a vendor. The method includes receiving vendor information from a vendor, the vendor information including uniquely identifying data, acquiring a first data set associated with the vendor from a third party and acquiring a second data set including a history of transactions with the vendor. The method further includes aggregating the vendor information, the first data set and the second data set into a vendor collective data set and identifying a risk factor using the vendor collective data set. | 08-15-2013 |
20130211873 | DETERMINING A CHURN RISK - An operator's terminal ( | 08-15-2013 |
20130226652 | RISK ASSESSMENT AND MANAGEMENT - Embodiments of the invention relate to identification of risks in a brand commodity supply chain. Risks are centrally assessed and a single holistic image of the risk assessment is provided. Specifically, risks are assessed vertically and horizontally across the supply chain, brand, and commodity. Risk identification techniques may be applied to the identified risks to reduce supply chain disruption and to enable continued manufacturing. | 08-29-2013 |
20130226653 | Systems And Methods For Determining Concentrations Of Exposure - A system and method are provided for identifying exposure concentrations. The process of determining exposure concentrations may include organizing exposure data, defining parameters, determining elevated exposure concentrations, and providing output results. The exposure data may relate to at least geographical locations, policies, accounts, portfolios, treaties, and other exposure data. The parameters may be defined to include at least an area of analysis, a region of interest, a threshold amount, results parameters, and other parameters. The exposure concentration may include at least defining and locating exposure locations using various techniques. The results may be presented using textual, graphical, or other display schemes. The output may be configured to convey information such as positional accuracy of an identified area, exposure accumulation in a defined area, and other information. | 08-29-2013 |
20130238387 | Visualization Tools for Reviewing Credibility and Stateful Hierarchical Access to Credibility - Some embodiments provide a credibility system including an interface portal for presenting a holistic view of entity credibility. To provide the holistic view, the credibility system aggregates credibility data from multiple data sources. The aggregated credibility data is processed and ordered to present different dimensions of entity credibility, with each dimension graphically presented in the interface portal through an interactive credibility module. In some embodiments, the credibility data associated with each credibility module is processed to produce at least one value that quantifiably represents the credibility data. In some embodiments, the credibility data associated with each credibility module is hierarchically ordered to present the credibility data in a drill-down fashion with each hierarchical layer presenting more detailed credibility data for better understanding the credibility data presented in the preceding layer. | 09-12-2013 |
20130238388 | OPTION FRAMEWORK FOR MANAGING ON-DEMAND SERVICE OFFERINGS - A method of and system for managing on-demand service offerings in a service delivery chain. The method comprises the steps of a service provider announcing upfront capacity pricing, an on-demand premium structure, and an on-demand exercise structure; a service distributor committing to upfront capacity and to units of on-demand options; and the service provider provisioning a number of resources to the collection of service distributors. Preferably, the upfront capacity pricing includes three components. A first component is a price structure for capacity or resources to be purchased for immediate use, a second component is an on-demand premium structure, and a third component is an on-demand usage fee structure. | 09-12-2013 |
20130238389 | INFORMATION PROCESSING DEVICE, AN INFORMATION PROCESSING METHOD AND AN INFORMATION PROCESSING METHOD - When a problem occurs in a system, an evaluation as to whether or not an important information service or an important person receiving the service is influenced, and an evaluation of the degree of the influence, are performed. Accordingly, an information processing device for notifying an information service providing state is provided with: an acquisition unit for acquiring measurement values regarding monitoring target items relating to the information service; an importance degree calculation unit for calculating the degree of importance regarding the information service or a person receiving the service; a determination unit for determining a degree of violation of the conditions, by comparing the measurement values with a plurality of conditions required in relation to the monitoring target items relating to the information service; and an image generation unit for generating an image indicating the degrees of violation of the conditions. | 09-12-2013 |
20130253978 | METHOD, APPARATUS AND PROGRAM FOR CALCULATING PROCUREMENT RISK - A procurement risk calculation apparatus includes a control unit which accepts ordering information given by an orderer, via a network, and reads past ordering detail history information and BOM information, an operation unit which extracts a part for which plural corporation purchase is conducted and calculates a procurement risk such as a situation of dependence of child parts constituting an ordered part upon terminal suppliers on the basis of the ordering detail history information and the BOM information, and an output processing unit which outputs a screen to assist in determining selection intention of a part to be ordered and an order receiver enterprise on the basis of an operation result. | 09-26-2013 |
20130253979 | OBJECTIVELY MANAGING RISK - A computer implemented method for managing risk, which can include determining an organizational impact score from an aggregate of scenario impact scores and storing the organizational impact score in a memory of the computer. Some embodiments include calculating a likelihood score based upon an analysis of threats, imminence of each threat, and a likelihood associated with each threat, and storing the likelihood score in a memory of the computer. In some embodiments, an organizational maturity score is determined based on the ability of the organization to mitigate the actions of a potential threat and recover from a given scenario, and the organizational maturity score is stored in a memory of the computer. Some embodiments include calculating a Risk Index using a processor of the computer wherein the Risk Index equals the impact score multiplied by the likelihood score and divided by the maturity score. | 09-26-2013 |
20130268313 | System and Method for Security Management - A security evaluation and scoring system includes a computer server in wireless communication with a mobile electronic device. The computer server is configured to receive input from the mobile electronic device, where the input is related to individuals to be evaluated. The server is further configured to evaluate risk, based on a plurality of predetermined parameters, and to provide both a qualitative and quantitative scoring-based risk assessment of the individual, and to output the results of the risk assessment to a display of the mobile electronic device. | 10-10-2013 |
20130275176 | RISK ASSESSMENT OF A SUPPLIER OF AN ORGANIZATION - According to one embodiment of the present invention, risk associated with a supplier of an organization may be assessed. A supplier associated with an organization is identified for risk assessment. The risk assessment comprises a plurality of questions where each question has a priority level. A plurality of selections for the supplier associated with the plurality of questions is determined. A respective selection of the plurality of selections is associated with a respective question of the plurality of questions. A plurality of values associated with the plurality of selections is determined. A respective value of the plurality of values is associated with a respective selection of the plurality of selections. Using a processor, a risk score for the supplier is calculated according to the plurality of values and the priority level of each of the plurality of questions. | 10-17-2013 |
20130282426 | Targeted Security Implementation Through Security Loss Forecasting - A method of selecting security actions is provided. The method comprises estimating a maximum forecast loss, identifying general, sector specific, and targeted threats. The method further comprises forecasting a security loss based on the estimated maximum forecast loss and the threats, estimating a reduction in the security loss based on a first investment on a general threat countermeasure, on a second investment on a sector specific countermeasure, and on a third investment on a targeted threat countermeasure. The method further comprises allocating at least a portion of a security investment budget among the first, the second, and the third investments to maximize the estimated reduction in security loss. An aspect disclosed comprises a method that determines rates of return on security investment and selects security investments based on the rates of return. An aspect disclosed comprises a system for forecasting a security loss based on a security investment. | 10-24-2013 |
20130290067 | METHOD AND SYSTEM FOR ASSESSING RISK - The present disclosure relates to a risk module that determines an important set of a plurality of potential risk events for an organization, each member of the important set of potential risk events having no more than a selected probability of occurring but at least a selected significance of impact on the organization, whether a mitigation strategy exists for each member of the important set of the plurality of potential risk events, when a mitigation strategy exists for a selected member of the important set, determining a corresponding mitigated significance of impact for the selected member of the important set of the plurality of potential risk events, and a more important set of the plurality of potential risk events. | 10-31-2013 |
20130297373 | DETECTING PERSONNEL EVENT LIKELIHOOD IN A SOCIAL NETWORK - A computer implemented method for calculating the probability of an employee leaving an organization is provided. Closely associated groups of employees within the organization are identified on based on their date of joining the organization. The email traffic among different members of the closely associated group is monitored over a predefined time period. The occurrence of an event in the closely associated group is used to compute a risk parameter for the remaining employees of the closely associated group. The risk parameter is used in conjunction with a first parameter and a second parameter to calculate the probability of an employee leaving the organization. | 11-07-2013 |
20130297374 | Targeted Equipment Monitoring System and Method for Optimizing Equipment Reliability - An operating strategy for effectively operating a system is provided in a computer-implemented method of quantifying operation of the system based on failure characteristics modeled in a computer having data storage coupled to a processor. One computer-implemented method comprises identifying precursors of damage associated with damage mechanisms and storing the identified precursors in the data storage of the computer. An inherent damage impact from the precursors is characterized for determining operational consequences. Instruments are provided for measuring physical characteristics of the identified precursors and the physical characteristics of the identified precursors are communicated to the processor by the instruments for monitoring the damage mechanisms. The damage mechanisms are diagnosed for determining the inherent damage impact and evaluated by the computer for managing operation of the system. | 11-07-2013 |
20130297375 | Software Service To Facilitate Organizational Testing Of Employees To Determine Their Potential Susceptibility To Phishing Scams - A software system and service for facilitating organizational testing of employees in order to determine their potential susceptibility to phishing scams is disclosed to evaluate their susceptibility to e-mail and Internet cybercrimes such as phishing. The e-mail addresses of a client organization's employees are provided to the system, a phishing e-mail is created and customized, and a phishing e-mail campaign in which the phishing e-mail message is sent and the responses to the phishing e-mail is monitored, and the results of the e-mail campaign are provided for evaluation. The phishing e-mail may optionally contain attachments and various types of probes and “call home” mechanisms. | 11-07-2013 |
20130297376 | SYSTEM AND METHOD FOR RISK DETECTION REPORTING AND INFRASTRUCTURE - A method, a system, and a device for monitoring risks associated with at least one business process, including: evaluating at least one of a plurality of document instances, wherein each of the document instances includes, in association therewith, a plurality of document values, against a plurality of risk categories; implementing the plurality of risk categories pursuant to at least one acceptable risk policy approved for the at least one business process; and qualifying at least one of the at least one of the plurality of documents pursuant to an approval rating of the at least one document in at least one risk category. The system, method, and device efficiently monitor risk, and allow for flexibility in modifying or updating risk policy. | 11-07-2013 |
20130297377 | INTEGRATED PRODUCTION LOSS MANAGMENT - Current monitoring systems often provide the operating condition of a specific component and do not consider the impact of a specific failure upon an entire system or a business. Nor do the current systems provide an avenue for the business to predict the loss, as well as its impact, and make an educated decision of mitigating the loss based upon economic, environmental, and health and safety considerations. Methods and systems are provided for predicting loss events, impacts of loss events, and providing potential corrective measures to reduce or eliminate the occurrence or impact of the loss events. One aspect relates to the use of system-wide information to predict variables that are directly linked to business impact, such as production loss. Extraneous and transactional data are also utilized according to other aspects of the invention. | 11-07-2013 |
20130311229 | PROACTIVE RISK ASSESSMENT FOR SYSTEM ARCHITECTURE EVOLUTIONS - Risks from system architecture evolutions are assessed by an apparatus that comprises a database comprising a plurality of roadmaps for a corresponding plurality of components that may be used to form an enterprise architecture, the roadmaps identifying the planned characteristics of the plurality of components. The apparatus also comprises a modeling module executed by a processor to identify the components that form the enterprise architecture, to identify the current characteristics of those components, and to map those components to the roadmaps for corresponding components among the plurality of components in the database. In addition, the apparatus comprises a risk identification module executed by the processor to identify which of the components that form the enterprise architecture have current characteristics that are different from the corresponding planned characteristics. | 11-21-2013 |
20130311230 | SYSTEM AND METHOD OF INITIATING IN-TRIP AUDITS IN A SELF-CHECKOUT SYSTEM - The system and method described herein may be used to make a binary determination of whether to initiate an in-trip audit of self-scans in a self-checkout system. For example, the system may receive one or more audit parameters that are used to calculate an audit score. The audit score may be compared to a predefined audit threshold to determine, during a shopping trip, whether to initiate the in-trip audit. After or in combination with making the binary determination, the system may make a probabilistic determination of whether to initiate an audit based on historical audit points associated with the shopper. The audit points are incremented or decremented based on prior audits and other characteristics of the shopper. | 11-21-2013 |
20130311231 | RISK MANAGEMENT DEVICE - A risk management device includes: a memory for storing a plurality of verification units each composed of one or more scenario data each including a predicted value of loss occurrence frequency, a verification range that is a collection of the plurality of verification units, and actual loss occurrence numbers corresponding to the scenario data; and a processor connected to the memory. The processor is programmed to determine by using a goodness-of-fit test on a Poisson distribution whether the total value of the loss occurrence numbers corresponding to the scenario data included in the verification range follows a Poisson distribution that the total value of predicted values of loss occurrence frequency in the scenario data included in the verification range is defined as a mean. | 11-21-2013 |
20130317880 | PERFORMANCE OF CONTROL PROCESSES AND MANAGEMENT OF RISK INFORMATION - A computer system receives a collection of attributes that defines a procedure executed by a control tool in performing at least a portion of the attributes. Each respective attribute has a defined data structure, and the collection of attributes includes a genesis attribute that defines a starting attribute performed by the control tool. The collection of attributes further includes a first successor attribute, a second successor attribute, and a third successor attribute. The data structure for each respective attribute of the collection of attributes defines a plurality of data elements, where each data element is associated with a function. The data structure for each respective attribute further defines at least one joining operand for the plurality of data elements. | 11-28-2013 |
20130325544 | METHOD FOR MANAGING ENVIRONMENTAL, HEALTH AND SAFETY RISKS IN A MANUFACTURING ENVIRONMENT - A method is provided for managing environmental, health and safety (EHS) risks in a manufacturing environment. Risk assessment data received from a first risk assessment database and a second risk assessment database is stored in an EHS risk assessment database. The risk assessment data includes a plurality of first risk assessments and a plurality of second risk assessments for the manufacturing environment. The first risk assessments may be indicative of ergonomic risk assessments, machine guarding risk assessments, industrial hygiene risk assessments, incident investigation risk assessments, or lock-out tag-out risk assessments. The first risk assessments and the second risk assessments are processed to prioritize the risk assessments, and a notification is provided indicative of the prioritized risk assessments. | 12-05-2013 |
20130325545 | ASSESSING SCENARIO-BASED RISKS - Techniques for managing risks of a business enterprise include identifying a threat to a business enterprise; identifying, based on the threat, a plurality of business enterprise assets and associated impacts; determining a plurality of threat scenarios, each threat scenario including a qualitative probability and a qualitative impact; assigning a quantitative probability and a quantitative impact to each of the plurality of scenarios based on an evaluation of the qualitative probability and the qualitative impact in a risk matrix; determining, with a simulation model, a quantitative risk of the identified threat based on the assigned quantitative probability and quantitative impact; and preparing an output including the determined quantitative risk of the identified threat for display. | 12-05-2013 |
20130332225 | RISK-PROFILE GENERATION DEVICE - A risk profile generation device includes: a memory for storing model information of a risk profile defined by a first parameter set, model information of a probability distribution of the first parameter set defined by a second parameter set, and a required condition; and a processor connected to this memory. The processor is configured to: calculate a value of the second parameter set such that a risk profile to be specified by applying a value of the first parameter set generated in accordance with the probability distribution to the model information of the risk profile satisfies the required condition with a higher probability; and generate a value of the first parameter set in accordance with a probability distribution specified by applying this calculated value of the second parameter set to the model information of the probability distribution. | 12-12-2013 |
20130339081 | RISK ANALYSIS SYSTEM AND RISK ANALYSIS METHOD - A risk indicating a degree of impact of a change in a production volume of one industrial sector on a production volume of another industrial sector at an arbitrary time is analyzed. Input coefficients among a plurality of interdependent industrial sectors are stored in an input-output table storage unit; an initial production volume of each industrial sector at an initial time is stored in an initial production volume storage unit; based on the input coefficients and the initial production volumes, a plurality of sample values of an accumulated production volume of each industrial sector from the initial time to a predetermined analysis time is generated such that there is a variation in the plurality of sample values; the plurality of generated sample values is stored in a sample storage unit; based on the plurality of sample values stored in the sample storage unit, a risk of a change in an accumulated production volume at the analysis time in at least one industrial sector that is subject to analysis among the plurality of industrial sectors is analyzed; and an analysis result of the risk is outputted. | 12-19-2013 |
20130346142 | INTERNET TRANSACTION ANALYSIS SYSTEM AND METHOD - An internet transaction analysis system and method are disclosed. The system comprises a processing unit and a data communication arrangement, the processing unit being arranged to receive, via the data communication arrangement, data on a transaction, the transaction being associated with internet activity at a remote user terminal, the processing unit being arranged to apply a plurality of checks to the data on the transaction, generate a value for a risk metric in dependence on the results of the checks and cause an indicator on the relative risk of the transaction to be output at the user terminal, the indicator of the relative risk being determined in dependence on the value for the risk metric. | 12-26-2013 |
20140006094 | CONTEXT-DEPENDENT TRANSACTIONAL MANAGEMENT FOR SEPARATION OF DUTIES | 01-02-2014 |
20140006095 | CONTEXT-DEPENDENT TRANSACTIONAL MANAGEMENT FOR SEPARATION OF DUTIES | 01-02-2014 |
20140012621 | RISK MANAGEMENT DEVICE - A storing unit stores loss data each including a loss amount and loss occurrence frequency, and a coefficient table holding a coefficient in association with the loss occurrence frequency, the coefficient being equal to a value of an occurrence number at a lower α % point (α is a predetermined constant) in a cumulative distribution function of a probability distribution with the loss occurrence frequency as a parameter. A processor is programmed to calculate multiplication values, each of which is calculated for each of the loss data and is a multiplication value of the coefficient held in the coefficient table in association with the loss occurrence frequency included in the loss data and the loss amount included in the loss data. | 01-09-2014 |
20140019193 | Issue Processing Systems and Methods - Example issue processing systems and methods are described. In one implementation, a method identifies an issue and accesses rules related to resolving the issue. The method also accesses data associated with previous issue resolutions. The identified issue is analyzed based on the rules and data associated with previous issue resolutions. Based on the analysis, the method determines a first activity to perform and identifies the results of performing the first activity. If the first activity did not resolve the issue, the method further analyzes the issue based on the rules, the data associated with previous issue resolutions, and the results of performing the first activity. Based on this further analysis, the method determines a second activity to perform in an attempt to resolve the issue. | 01-16-2014 |
20140019194 | Predictive Key Risk Indicator Identification Process Using Quantitative Methods - Methods, computer-readable media, and apparatuses are disclosed for identifying predictive key risk indicators (KRIs) for organizations and/or firms through the application of specific statistical and quantitative methods that are well integrated with qualitative adjustment. An indicator is a variable with the purpose of measuring change in a phenomena or process. A risk indicator is an indicator that estimates the potential for some form of resource degradation using mathematical formulas or models. Organization/enterprise key risk indicators are an essential arsenal in the risk management framework of any firm or organization and may be required by regulatory agencies. | 01-16-2014 |
20140019195 | Operational Risk Back-Testing Process Using Quantitative Methods - Methods, computer-readable media, and apparatuses are disclosed for quantifying risk and control assessments. The risk includes both residual risk and direction of risk. Various aspects of the invention quantitatively compare the risk and control assessments against step-ahead losses using special regression models that are particularly applicable to this kind of data. The empirical comparison may be performed on both loss event frequency and severity in two different and separate dimensions. The empirical comparison may also be performed using losses extracted by even occurrence and event settlement dates in two separate dates. | 01-16-2014 |
20140019196 | SOFTWARE PROGRAM THAT IDENTIFIES RISKS ON TECHNICAL DEVELOPMENT PROGRAMS - The disclosed system relates to identification of risk before and during the creation of hardware and software products and services. A method for assessing risk in product development includes the steps of creating a software program and storing the software program in a non-transitory medium, receiving user input respecting the product development program, identifying risks to continuing development of the product, and assigning a technology readiness level to the new technology being incorporated into the product. User input includes query functions and data display capabilities. | 01-16-2014 |
20140019197 | WEATHER RISK MANAGEMENT SYSTEM - This disclosure relates to a system for managing financial risk associated with weather-based service contracts, and more specifically, to a system based on the purchase of weather derivatives to select, manage, minimize, and redistribute financial burdens associated with costs incurred from the payment of services related to greater than average weather-based events. An option contract having a tick price, and an associated premium at a fixed strike price is selected at a desired coverage, in one embodiment, the desired coverage is associated with a payout with the associated tick price that covers the base price of performing the service for a nominal weather condition, the premium of buying the option, and the price of performing the services for exceptional weather precipitations of a three standard deviation from the nominal value. If a hedge trader offers this service rather than a service provider, the desired coverage will also cover the a commission for the trade. | 01-16-2014 |
20140019198 | System and Method for Identifying Relevant Information for an Enterprise - A system and method are provided for finding and retrieving information within an enterprise that is relevant to enterprise problems, enterprise opportunities, and unexpected or interesting events. The method includes scanning content related to a process conducted by an enterprise, where the process includes one or more process steps; identifying a problem, opportunity or event associated with a process step (an enterprise stress point); indexing the scanned content with respect to the enterprise stress point; determining whether the scanned content is information relevant to the problem, opportunity or event; and providing relevant information to a user. The relevant information includes a description or discussion of a contemporaneous or previous experience of the enterprise regarding the problem, opportunity or event. | 01-16-2014 |
20140046722 | SYSTEM FOR ON-SITE ENVIRONMENT MONITORING - Methods and systems are provided herein for monitoring pathogens in various environments and on various items, wherein data from monitoring is trackable, analyzable and comparable versus various standards or thresholds. The methods and systems disclosed herein also include a platform for managing the detection and reporting of pathogens across a number of locations within a number of environments, and using such detection for a wide variety of purposes. | 02-13-2014 |
20140052494 | Identifying Scenarios and Business Units that Benefit from Scenario Planning for Operational Risk Scenario Analysis Using Analytical and Quantitative Methods - Methods, computer-readable media, and apparatuses are disclosed for risk scenario analysis. Aspects of the embodiments disclose methods, computer readable media, and apparatuses for identifying scenarios for operational risk scenario analysis using analytical and quantitative methods. Additional aspects of the embodiments disclose methods, computer readable media, and apparatuses for identifying business units for performing risk scenario analysis using analytical and quantitative methods. | 02-20-2014 |
20140067460 | SYSTEM AND METHOD FOR SIMULATING RETURN - The invention generally relates to a tool for planning a communication campaign. The invention provides systems and methods for communicating through mobile devices in which a publisher can model the effectiveness of a customer's communication campaign as a function of media purchase quantity to aid the customer in selecting a purchase quantity that optimizes a ratio of return on investment to risk. The publisher can do this by providing the customer with access to a computer server system that includes a campaign management tool with an ROI simulator. In certain aspects, the invention provides a method of planning communication on mobile devices by receiving a set of communication campaign parameters, simulating effectiveness as a function of units purchased for the received parameters, and for providing the simulated effectiveness for a plurality of values for the units purchased. | 03-06-2014 |
20140067461 | System and Method for Predicting Customer Attrition Using Dynamic User Interaction Data - A method, system and non-transitory computer-readable medium for predicting customer attrition are provided. The method can include executing code to load historical data relating to a customer into a database to create a customer history summary file. The method can include executing code to load daily data relating to the customer into a scoring engine. The method can include programmatically processing, via the scoring engine, at least one of the historical data and the daily data to generate an attrition score. The attrition score can indicate a predictive signal of attrition of the customer. | 03-06-2014 |
20140074546 | Ergonomic Safety Evaluation With Labor Time Standard - An integrated safety-evaluation with labor-time-standard system is provided that includes a work-task manager, integrated module and ergonomic safety evaluator. The work-task manager may be configured to receive a work instruction and determine work elements applicable to the work instruction, with the work elements may have respective associated elemental unit times, elemental risk ratings and frequency values. The integrated module may be configured to receive the elemental unit times, elemental risk ratings and frequency values for the work elements, and calculate a labor time standard and ergonomic safety rating therefrom. And the ergonomic safety evaluator may be configured to receive the labor time standard and ergonomic safety rating and perform an ergonomic safety evaluation therefrom. In this regard, the ergonomic safety evaluator may be configured to perform the ergonomic safety evaluation to determine whether to release or reject the work instruction. | 03-13-2014 |
20140074547 | PERSONAL AND WORKFORCE REPUTATION PROVENANCE IN APPLICATIONS - Techniques for storing information include making determinations whether to store data from a data source based at least in part on one or more reputation metrics calculated for an individual associated with the information. The scope of information collected about an individual is varied based on the individual's reputation and/or the reliability of the source of information, which may be a social network system or other data source. | 03-13-2014 |
20140074548 | Systems And Methods For Managing Information Associated With Legal, Compliance And Regulatory Risk - Some embodiments include a system, method, apparatus and means for managing information associated with risk. In some embodiments, information associated with risk is collected, analyzed, stored, and disseminated. According to some embodiments, the information associated with risk is utilized to identify risk. | 03-13-2014 |
20140081699 | SYSTEMS AND METHODS FOR MONITORING AND DETECTING FRAUDULENT USES OF BUSINESS APPLICATIONS - A systems and methods are described detect fraud in existing logs of raw data. There can be several disparate logs, each including data of disparate data types and generated by different and possibly unrelated software enterprise applications. The fraud management system aggregates and organizes the raw log data, extends the raw data with reference data, archives the data in a manner that facilitates efficient access and processing of the data, allows for investigation of potentially fraudulent usage scenarios, and uses the results of the investigation to identify patterns of data that correspond to correspond to high risk usage scenarios and/or process steps. In subsequent processing, archived data can be compared against the identified patterns corresponding to high risk usage scenarios to detect matches, and the invention thereby automatically detects high risk usage scenarios and issues appropriate alerts and reports. | 03-20-2014 |
20140081700 | METHOD AND SYSTEM FOR MANAGING RESEARCH AND DEVELOPMENT IN AN ENTERPRISE - A method and system for capturing research decision flow in a Research and Development (R&D) activity are provided. The method includes defining an objective of the R&D activity and determining one or more requirements for fulfilling the objective of the R&D activity. Furthermore, the method also includes defining a set of tests to verify that the requirements are satisfied or the risks have been mitigated. Furthermore, the method also includes developing a task plan to satisfy the one or more requirements and mitigate one or more risks of the set of risks. Furthermore, the method also includes linking the objective, the one or more requirements, the set of risks and the task plan, to generate a linked information record. In an additional embodiment, the method includes identifying a set of risks associated with failure to satisfy the one or more requirements. | 03-20-2014 |
20140089038 | APPLYING OF SOCIAL MEDIA METRICS FOR SUPPLIER EVALUATION - In an example embodiment, supplier management is performed first by defining one or more social media metrics pertaining to a supplier brand of interest, with the one or more social media metrics being based on data gathered from social media. These metrics may then be used to analyze values from one or more social media websites. Weights can be assigned to the values, and a score for the supplier brand of interest can be determined, based on the weighted values for the one or more social metrics and based on weighted values for one or more other metrics. The score can then be presented to a user via a graphical user interface. | 03-27-2014 |
20140089039 | Incident management system - A method of managing a data breach is implemented in a management platform, preferably as an Internet-accessible service. The method begins upon receipt of data defining a data loss event associated with an organization. The data is processed by a rules engine against a corpus of data sets. A data set is associated with a business requirement (e.g., a State regulation) and encodes a decision tree defining predefined responses prescribed by the business requirement upon occurrence of a data breach. As a result of the processing, a privacy impact assessment defining an impact of the data loss event may be generated. The data loss event may then be escalated into an incident. The incident has associated therewith a response plan that is generated as a function of at least one characteristic of the data loss event and at least one response in the set of predefined responses. | 03-27-2014 |
20140089040 | System and Method for Customer Experience Measurement & Management - The invention measures and captures customer experience perception parameters against a host of touch-points and from various perspectives, through a coordinated and participative process. Further it provides detailed insight into various telecom process and application impacting the customer experience by using standard approach of eTOM process & TAM application for better understand ability. The system also enabled to perform RAG analysis for the purpose of report generation that helps the management identify good/bad customer experience areas within the total lifecycle of the interaction with the customer. | 03-27-2014 |
20140095250 | INNOVATION MANAGEMENT - A system and method for facilitating facilitating management of innovations and accompanying constituent concepts. An example method includes providing a first user option to define one or more alternate solution categories for one or more concepts, wherein each alternate solution category is associated with an innovation comprising a structure of concepts, and wherein an alternate solution category is associated with an alternate solution structure; providing a second user option to define a concept as an alternate solution concept belonging to an alternate solution category; and associating one or more metric attributes with an alternate solution concept. The user options may be provided via a user interface display screen with additional user interface controls for generating analysis pertaining to alternative concept structures in association with one or more metrics, such as supply chain risk, cost, compliance, fulfillment, and/or other product objectives or metrics. | 04-03-2014 |
20140100913 | BUSINESS CONTINUITY AND RESPONSE PLAN MANAGEMENT - Embodiments described herein include are directed to managing response plans of an enterprise. Business recovery plans, system recovery plans, and emergency management plans for the enterprise are identified, where the business recovery plans relating to business aspects of the enterprise, the system recovery plans relating to technology aspects of the enterprise, and the emergency management plans relating to emergencies affecting the enterprise. The business recovery plans, system recovery plans, and emergency management plans are evaluated and plan metrics for the business recovery plans, system recovery plans, and emergency management plans are calculated independently and separately from each other. The plan metrics are calculated in response to the evaluation of the business recovery plans, the system recovery plans, and the emergency management plans. A readiness of the business recovery plans, the system recovery plans, and the emergency management plans is determined based on the evaluation. | 04-10-2014 |
20140108088 | SYSTEM AND METHOD FOR MANAGING SUPPLY CHAINS ACROSS SEPARATE ORGANIZATIONS - A system and method of managing supply chains across separate organizations. The organizations that supply items to an organization and the organizations that use items supplied by that organization are defined in a consumer/producer hierarchy of three or more layers. Organizations at the first layer supply items to one or more organizations at the second layer while organizations at the second layer supply items to one or more organizations at the third layer, wherein each item may include a product or a service. A supply chain database is created and each organization is given access only to supply chain information within that organization's supply chain. The supply chain database includes an entry for each item supplied by one organization to another organization, wherein the entry includes item attributes, including an indication of the item supplied, a primary location where the item comes from, and disaster recovery parameters including an alternate location and a recovery time associated with bringing the alternate location online. | 04-17-2014 |
20140108089 | CYBERSPACE SECURITY SYSTEM FOR COMPLEX SYSTEMS - A computer implemented method monetizes the security of a cyber-system in terms of losses each stakeholder may expect to lose if a security break down occurs. A non-transitory media stores instructions for generating a stake structure that includes costs that each stakeholder of a system would lose if the system failed to meet security requirements and generating a requirement structure that includes probabilities of failing requirements when computer components fails. The system generates a vulnerability model that includes probabilities of a component failing given threats materializing and generates a perpetrator model that includes probabilities of threats materializing. The system generates a dot product of the stakes structure, the requirement structure, the vulnerability model and the perpetrator model. The system can further be used to compare, contrast and evaluate alternative courses of actions best suited for the stakeholders and their requirements. | 04-17-2014 |
20140114720 | APPARATUS AND METHOD FOR PROCESSING MARKET DATA - An apparatus, method and non-transitory computer-readable storage medium for processing market data. The apparatus may comprise a risk analyzer arranged to access a first set of time-series market data from a data source and to process said first set of time-series market data to generate data indicative of a risk category. The apparatus may also have a trend analyzer arranged to access said data indicative of a risk category determined by the risk analyzer and to output a value of a market indicator based on a second set of time-series market data. The trend analyzer may be arranged to determine the value of the market indicator using an output of a set of filters and the set of filters may be selected by the trend analyzer according to said data indicative of a risk category. | 04-24-2014 |
20140122163 | EXTERNAL OPERATIONAL RISK ANALYSIS - Analyzing external operational risk comprises receiving data associated with an organization from a data source over a network. Data associated with a plurality of third parties is received from a plurality of data sources over the network. A processor categorizes the organization data and the third party data according to operational risk categories and analyzes the categorized organization data and the third party data. A report is created based on the analysis and communicated to a computer. | 05-01-2014 |
20140122164 | System and method for analyzing commuting metrics - A system and method for analyzing commuting metrics. One exemplary embodiment includes a method that includes receiving, via a computer interface, location data for a set of locations associated with an entity, the location data including physical location data, the computer interface selected from at least one of a user interface or network communications interface; receiving commuter data for a set of commuters, the commuter data for each commuter from the set of commuters including commute start location data; determining a set of values of a commuting metric, each value from the set of values of the commuting metric being based on one of the physical location data and one of the commute start location data; and generating an electronic file including at least one of the set of values of the commuting metric. | 05-01-2014 |
20140129287 | METHOD AND SYSTEM FOR REDUCING ROLL-OUT RISK - A system and method for monitoring business processes implementation in organizations, and more specifically, system and method for reducing roll-out risks. | 05-08-2014 |
20140136276 | QUANTITATIVE RISK ASSESSMENT METHODS AND SYSTEMS FOR RENEWABLE AND NON-RENEWABLE ENERGY PROJECTS - A quantitative based risk assessment process is disclosed. The process includes the identification of parameters and sub-parameters relating to socio/economic, environmental and project construction risks in providing a quality risk assessment of a region and/or project for renewable and non-renewable energy projects. Risks parameters are variable and can be selected from a number of predetermined categories as needed for each project and can be weighted differently based on the needs and/or goals of the project and the impact thereof. Systems, storage devices and mediums and outputs of same are also provided. | 05-15-2014 |
20140136277 | SYSTEM AND METHOD TO DETERMINE DEFECT RISKS IN SOFTWARE SOLUTIONS - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to receive one or more risk factors, receive one or more contexts, identify one or more context relationships and associate the one or more contexts with the one or more risk factors. Additionally, the programming instructions are operable to map the one or more risk factors for an associated context to a software defect related risk consequence to determine a risk model and execute a risk-based testing based on the risk model to determine a defect related risk evaluation for a software development project. | 05-15-2014 |
20140143009 | RISK REWARD ESTIMATION FOR COMPANY-COUNTRY PAIRS - The reward or return a company receives in a particular country relative to the risk the company takes in that country is assessed. The relative risk of the particular country compared to selected groups of countries, for example groups including countries having emerging or developing economies and groups including countries having developed economies. The relative profitability of the particular country in relation to the profitability of such groups of countries is further considered in the assessment. Other return components are also considered to allow risk adjusted decisions. | 05-22-2014 |
20140143010 | System and Method for Assessing Interaction Risks Potentially Associated with Transactions Between a Client and a Provider - A method for assessing interaction risks via a computer server potentially associated with transactions between a client and a provider is disclosed. The method comprises receiving client claims data on a server from at least a first data source, which is stored in a database operably associated with the server. Risk guidelines are also stored in the database. The server receives client identifying information from the provider and selects client claims data from the database based that identifying information and categorizes the client into a risk category based on a computer analysis of the provider's risk guidelines and the selected client claims data. The method involves delivering functionality to the provider that automatically captures communications involving the client and the provider and automatically reports on the captured communications via at least one communication platform, wherein the frequency of capturing, reporting, or both is based on the client risk category associated with the client. A system for implementing this method is also disclosed. | 05-22-2014 |
20140143011 | SYSTEM AND METHOD FOR APPLICATION-MIGRATION ASSESSMENT - In one embodiment, a method includes centrally maintaining a parameter bank comprising a plurality of parameters and a question bank comprising a plurality of questions. The method further includes creating an application-migration assessment. The creating includes receiving a selection of parameters from the parameter bank. The creating also includes providing a list of questions attached to at least one parameter in the selection of parameters. The creating further includes receiving a selection of questions from the list of questions. In addition, the method includes facilitating a taking of the application-migration assessment. Furthermore, the method includes scoring the one or more outcome options based on assessment answers from the taking. Additionally, the method includes generating a recommendation for each of the one or more outcome options based on the scoring. | 05-22-2014 |
20140149174 | Financial Risk Analytics for Service Contracts - A method for predicting and quantifying risk in information technology (IT) service contracts includes comparing features of a new IT service contract with similar features from one or more previous IT service contracts selected from a plurality of previous IT service contracts to calculate a similarity value between each pair of the new IT service contract and one of the one or more previous IT service contracts, aggregating the similarity values, and using the aggregated similarity values with a prediction model to predict risk factors affecting the new IT service contract and to quantify an impact of each predicted risk factor on an expected gross profit margin. | 05-29-2014 |
20140149175 | Financial Risk Analytics for Service Contracts - A method for predicting and quantifying risk in information technology (IT) service contracts includes comparing features of a new IT service contract with similar features from one or more previous IT service contracts selected from a plurality of previous IT service contracts to calculate a similarity value between each pair of the new IT service contract and one of the one or more previous IT service contracts, aggregating the similarity values, and using the aggregated similarity values with a prediction model to predict risk factors affecting the new IT service contract and to quantify an impact of each predicted risk factor on an expected gross profit margin. | 05-29-2014 |
20140156339 | OPERATIONAL RISK AND CONTROL ANALYSIS OF AN ORGANIZATION - Systems and methods that facilitate operational risk and control analysis of an organization may include receiving a plurality of key risks and the plurality of key risks identify operational risks of an organization. A plurality of sets of data is received from a plurality of data providers, and the plurality of the sets of data comprise information associated with a plurality of business units in the organization. Each set of data is associated with a key risk, and the plurality of the sets of data is compiled based on the key risk. The compiled data is quantified, and quantifying the integrated data comprises weighting the compiled data according to the key risk. The quantified data is stored to facilitate risk analysis. | 06-05-2014 |
20140156340 | SYSTEM AND METHOD FOR IDENTIFYING OUTLIER RISKS - To identify outlier risks, a risk assessment is received from a first computer, and the risk assessment comprises a plurality of risks and each risk comprises a plurality of words and a plurality of attributes. A risk category associated with the risk assessment is received from a second computer, and the risk category is based on the plurality of words and the plurality of attributes and the risk category is a selected one of a high risk category and a not-high risk category. A word count is calculated for each word in each risk category. A probability score is also calculated for each word to generate a plurality of probability scores associated with the risk, and a risk score is calculated for each risk and is based on the plurality of probability scores associated with the risk. A distribution is generated that indentifies the high risk category and the not-high risk category, and the distribution identifies the risk score in the associated risk category. It is determined whether the risk associated with the risk score is an outlier for the associated risk category. | 06-05-2014 |
20140164052 | System and Method for Managing and Displaying Company Policy Data - A management system for administering and managing corporate policy data in an intranet based graphical user environment is disclosed. The intranet based graphical user environment communicates with a policy management data server to provide policy data to employees and third party vendors. The system selectively formats and displays policy content customized for each user requesting the data. | 06-12-2014 |
20140164053 | Method, Software Program, And System For Ranking Relative Risk Of A Plurality Of Transactions - A method for ranking relative risk of a plurality of transactions, wherein each of the transactions has associated therewith a plurality of variables. In one embodiment the method includes assigning a value to each of the variables associated with each of the transactions, aggregating the values assigned to each of the variables on a transaction by transaction basis to produce an aggregate risk level for each transaction, and ranking each of the transactions relative to one another based upon the aggregate risk level corresponding to each transaction. A corresponding software program and system are also disclosed. | 06-12-2014 |
20140164054 | OPERATING A SERVER COMPUTER - A method of operating a server computer system, which is configured to communicate with a plurality of remote devices. The remote devices are operated by lone workers who are exposed to hazardous environments. The method comprises receiving location data identifying a work location from a transmitting remote device, receiving hazard data relating to hazards in the vicinity of said work location, processing said hazard data to produce an assessment of risk, and conveying an indication of said assessment of risk to a receiving remote device. | 06-12-2014 |
20140172495 | SYSTEM AND METHOD FOR AUTOMATED BRAND PROTECTION - Brand threat information is identified relating to potential threats to one or more brands of one or more organizations. A characteristic of one or more operating environments is identified and a relation is determined between a particular one of the potential threats and the characteristic. The determined relation is used to determine risk associated with a particular brand of an organization. | 06-19-2014 |
20140172496 | Automatic Management of Accidents Using Rules for Starting Post-Accident Procedures - Implementations of the present disclosure are directed to automatically monitoring occurrence and initiating actions in response to accidents in operations of an enterprise with actions including receiving a plurality of vehicle data sets, each vehicle data set corresponding to a vehicle of a plurality of vehicles that support the operations of the enterprise, receiving a set of accident rules from a data repository, processing a vehicle data set based on the set of accident rules, and determining that a vehicle corresponding to the data set was in an accident, and in response: determining one or more remedial actions to be performed, identifying one or more entities, each entity performing at least one remedial action of the one or more remedial actions, and transmitting a plurality of instruction data sets to the one or more entities, each entity of the one or more entities receiving at least one instruction data set. | 06-19-2014 |
20140172497 | APPARATUS AND METHOD FOR MANAGING RISK BASED ON PREDICTION ON SOCIAL WEB MEDIA - An apparatus for managing risk in social web media in a prediction-based manner is provided, and includes a risk vocabulary management unit, which extracts and manages vocabulary to be managed as pertaining to risk from social web content, a risk issue prediction analysis quality extraction unit, which performs language analysis and sensitivity analysis, a risk prediction modeling unit, which models risk prediction analysis, a risk detection and notification unit, which automatically detects and notifies the risk, a risk situation monitoring unit, which monitors in real time a risk state of a risk entity when an alarm is raised with respect to the detected risk, and a risk history management unit, which receives user feedback for monitored risk information and manages a record of a terminated risk situation. | 06-19-2014 |
20140180755 | Identifying, Assessing, And Tracking Black Swan Risks For An Engineering And Construction Program - A risk analysis system having a risk analysis engine that can identify a set of risks for a program based on a constructed program model. The program model can be based on known, historical programs using current program attribute information. The risks can be identified by executing one or more simulations using the program model. The outcome of the simulation can be used to identify individual drivers of risk, which can in turn be used to identify one or more previously undetected and unanticipated black swan-level risks facing the program. | 06-26-2014 |
20140180756 | Method and System for Modeling Workforce Turnover Propensity - Systems, methods and devices for modeling workforce turnover propensity is disclosed. The system can include a memory that stores instructions and a processor that executes the instructions to perform operations. The operations can include receiving questionnaire responses to a questionnaire that elicits a perception of employee turnover factors of a plurality of representatives, where the questionnaire responses are provided by one of company representatives, company workforce representatives or a combination thereof. The operations also can include selecting questionnaire responses of the representatives, calculating representative questionnaire scores and comparing the representative questionnaire scores to a statistical model. Further, the operations can include determining an employee turnover propensity based on comparing the representative questionnaire scores to the statistical model, where the employee turnover propensity indicates a likelihood that an employee will leave a particular job. | 06-26-2014 |
20140188548 | SYSTEM AND METHOD OF FRAUD AND MISUSE DETECTION USING EVENT LOGS - A system and method are provided for detecting fraud and/or misuse of data in a computer environment through generating a rule for monitoring at least one of transactions and activities that are associated with the data. The rule can be generated based on one or more criteria related to the at least one of the transactions and the activities that is indicative of fraud or misuse of the data. The rule can be applied to the at least one of the transactions and the activities to determine if an event has occurred, where the event occurs if the at least one criteria has been met. A hit is stored in the event has occurred and a notification can be provided if the event has occurred. A compilation of hits related to the rule can be provided. | 07-03-2014 |
20140188549 | RISK ASSESSMENT METHOD AND SYSTEM FOR THE SECURITY OF AN INDUSTRIAL INSTALLATION - The present invention relates to a risk assessment method and system for the security of an industrial installation of at least one company, wherein the method comprises the following phases: analyzing a first plurality of data for determining an index of potential threats to the security of the industrial installation; analyzing a second plurality of data for determining a vulnerability index for the security of the industrial installation; identifying a security risk value on the basis of the indexes of potential threats and vulnerability determined; the risk assessment method is characterized in that the phase of analyzing the first plurality of data comprises the following phases: receiving at least one piece of information in the form of textual data from at least one information storage unit; effecting a correspondence analysis between the textual data and a plurality of data included in a master database of the at least one company; assigning a first relevance value to the at least one piece of information according to the result of the correspondence analysis. | 07-03-2014 |
20140195296 | METHOD AND SYSTEM FOR PREDICTING VIRAL ADVERTS TO AFFECT INVESTMENT STRATEGIES - A system for determining a viral entity in a networking environment is provided that includes a presentation tier module that includes a front end user interface to make application calls to start a service. A data tier module receives a selective application call from the presentation tier module and gathers known viral information to be benchmarked for further analysis. A logic tier module sends a request to the data tier module and employs stochastic modeling to process data from a plurality of sources that is likely to be viral. | 07-10-2014 |
20140195297 | ANALYSIS OF USAGE PATTERNS AND UPGRADE RECOMMENDATIONS - An approach is provided for analyzing usage patterns of computing devices and providing upgrade recommendations. The approach is implemented in a computer infrastructure having computer executable code on a computer readable storage medium having programming instructions operable to: monitor usage on one or more electronic devices; and recommend upgraded functionality on the one or more devices based on the monitored usage based on a risk assessment allocation on selected functionality associated with an upgrade for the one or more electronic devices. | 07-10-2014 |
20140200951 | SCALABLE RULE LOGICALIZATION FOR ASSET HEALTH PREDICTION - An aspect of scalable rule logicalization for asset health management includes aggregating data, via a computer processing device, from data sources, extracting a set of features from the data, projecting the features to a lower dimensional space, generating a prediction based on the projecting, logicalizing a decision boundary for the prediction, and estimating a confidence level of the prediction based on the decision boundary. | 07-17-2014 |
20140200952 | SCALABLE RULE LOGICALIZATION FOR ASSET HEALTH PREDICTION - An aspect of scalable rule logicalization for asset health management includes aggregating data, via a computer processing device, from data sources, extracting a set of features from the data, projecting the features to a lower dimensional space, generating a prediction based on the projecting, logicalizing a decision boundary for the prediction, and estimating a confidence level of the prediction based on the decision boundary. | 07-17-2014 |
20140200953 | QUALITATIVE AND QUANTITATIVE MODELING OF ENTERPRISE RISK MANAGEMENT AND RISK REGISTERS - The present invention is applicable in the field of corporate finance, corporate capital investments, economics, math, business risk analysis, simulation, decision analysis, qualitative risk analysis, risk management, quantitative risk analysis, and business statistics, and relates to the modeling and valuation of investment decisions under uncertainty and risk within all companies, allowing these firms to properly identify, assess, quantify, value, diversify, and hedge their corporate capital investment decisions and their associated risks. Specifically, the present invention looks at starting from a comprehensive qualitative risk register and moving the analysis into the realms of quantitative risk modeling, simulation, and optimization. | 07-17-2014 |
20140200954 | RESEARCH AND DEVELOPMENT AND MARKET VIABILITY ANALYSIS FRAMEWORK FOR DRUGS, BIOLOGICS AND MEDICAL DEVICES - A drug, biologic or medical device evaluation software tool for determining optimized research, development and commercialization pathways. The method comprises a) providing comparative clinical trial, value proposition and marketplace success predictors as metrics from a selected range of therapeutically relevant marketplace competitors anticipated at the time of the launch of the new product to a computer device b) assigning comparative benefit and risk scores to the product in research and development relative to these competitors c) incorporating specific feedback from physicians, health plans, healthcare service providers and payers to validate these scores d) offering scenario planning on multiple research, development and marketing options based on theoretical benefit and risk alternative scoring, and refined through various metric weighting and apportioning functions within the tool. | 07-17-2014 |
20140222496 | DETERMINING COST AND RISK ASSOCIATED WITH ASSETS OF AN INFORMATION TECHNOLOGY ENVIRONMENT - A computer determines the cost and risk of assets. The computer analyzes an asset signature, associated with an asset representing a fundamental structural unit of an information technology environment, to determine that the asset is in a non-normal state. The computer determines the cost of the asset by evaluating a price formula associated with the asset signature of the asset, and the computer determines the risk of the asset by evaluating a risk formula associated with the asset signature of the asset. The computer maintains a configuration item for the asset, indicating the state, the risk, and the cost of the asset. One or both of the risk and the cost of the asset are used to determine the priority of recovering the asset. | 08-07-2014 |
20140222497 | DETECTING PATTERNS THAT INCREASE THE RISK OF LATE DELIVERY OF A SOFTWARE PROJECT - Historic and current development data associated with the project may be gathered. A catalog of patterns, each pattern associated with a data measure and an analysis routine capable of detecting the pattern according to the data measure in a given data set may be obtained. A pattern describes a particular indication in the historical and development data, which arises one or more of, at a discrete point in time or over a period of time. The analysis routine may be applied to the historic and current development data. A notification may be issued responsive to identifying the pattern in the historic and current development data. The applying and the issuing may be performed for each pattern in the catalog of patterns. | 08-07-2014 |
20140222498 | System And Method For Determining Loss Data Based On Industry Indices - Systems and methods for evaluating basis risk associated with index based security instruments. The systems and methods calculating an element factor for each of a plurality of elements based on a modeled company loss for a plurality of events and an industry loss for the plurality of events, calculating a company loss for each element based on the element factor and an industry loss for each of the corresponding elements for each of a plurality of events, comparing the company loss for each element to the modeled company loss for each element for each of the events, wherein the comparing occurs within a layer of interest to determine a basis risk for each of the events and outputting a monetary value of the basis risk for each of the events based on each of the elements. | 08-07-2014 |
20140236665 | Automated Risk Management System and Method - An automated risk management system connected to a computer network for use by a organization includes a server connected to the network, the server having a memory configured to store programming and data structures. The system includes a processor connected to the server and memory that is configured to execute the programming. The memory includes process flowchart data indicative of a organization's process objectives and controls. The memory may include regulatory data indicative of current regulations affecting the organization and risk assessment data indicative of potential risks, impacts, and likelihood of occurrence to the business. The system includes programming that automatically initiates searches of the internet using current process, regulatory, or risk assessment data and stores the search results in memory. Current data and search result data may be output to prompt a comparison of the same and, thus, require efficient management of potential risks. | 08-21-2014 |
20140236666 | ESTIMATING, LEARNING, AND ENHANCING PROJECT RISK - A method for ranking a plurality of objects includes obtaining an initial set of data relating to the objects, generating an initial set of estimates based on the initial set of data, wherein the initial set of estimates includes, for each of the objects, an initial estimated change in performance and an initial estimated likelihood of decline in the performance, incrementally and dynamically refining the initial set of estimates in accordance with a new set of data from new data sources and relating to the objects to produce a refined set of estimates, wherein the refined set of estimates includes, for each of the objects, a refined estimated change in performance and a refined estimated likelihood of decline in the performance, without modifying or replacing a system used to generate the initial set of estimates, and generating a list that ranks the objects according to the refined set of estimates. | 08-21-2014 |
20140236667 | ESTIMATING, LEARNING, AND ENHANCING PROJECT RISK - Ranking a plurality of objects includes obtaining an initial set of data relating to the objects, generating an initial set of estimates based on the initial set of data, wherein the initial set of estimates includes, for each of the objects, an initial estimated change in performance and an initial estimated likelihood of decline in the performance, incrementally and dynamically refining the initial set of estimates in accordance with a new set of data from new data sources and relating to the objects to produce a refined set of estimates, wherein the refined set of estimates includes, for each of the objects, a refined estimated change in performance and a refined estimated likelihood of decline in the performance, without modifying or replacing a system used to generate the initial set of estimates, and generating a list that ranks the objects according to the refined set of estimates. | 08-21-2014 |
20140236668 | METHOD AND APPARATUS FOR REMOTE SITE MONITORING - A method for remote site monitoring includes receiving data from a clinical data site, calculating a site-metric risk indicator for each metric, and aggregating the site-metric risk indicators to generate a site-level data quality score. The site-metric risk indicator is calculated using a metric risk profile, which is based on historic clinical study data and study data received from clinical data sites. In some embodiments, each metric risk profile is based on experience levels of the sites. An apparatus for remote site monitoring is also described. | 08-21-2014 |
20140244343 | METRIC MANAGEMENT TOOL FOR DETERMINING ORGANIZATIONAL HEALTH - A metrics management module may be employed to determine organizational health based on data collected for control metrics of an organization. The metrics management module may determine a set of metric health ratings based on the control metric data collected and selects a subset of metric health ratings from the set of metric health ratings. The metrics management module may determine one or more aggregate health ratings based, at least in part, on the subset of selected metric health ratings. The aggregate health ratings may indicate the organizational health of at least a portion of the organization. | 08-28-2014 |
20140244344 | SYSTEM AND METHOD FOR ACTIVITY MONITORING - A system for activity monitoring includes a tracking component, an activity identification component, a procedural component, and a notification component. The tracking component tracks an individual and one or more objects in a work area using a three-dimensional tracking system. The activity identification component identifies an activity of the individual and any of the one or more objects that are affected by the activity. The procedural component determines whether the activity violates one or more procedural rules pertaining to one or more of the individual, the work area, and the one or more objects. The notification component provides a notification of a violation. | 08-28-2014 |
20140257917 | Risk Management System for Calculating Residual Risk of a Process - According to one embodiment, a system includes a processor and an interface. The processor determines an entity, a plurality of process groupings associated with the entity, a plurality of processes associated with the entity, a plurality of risks associated with the entity, and a plurality of controls associated with the entity. For each of the controls, the processor calculates one or more weighted control scores for the control. For each of the risks, the processor calculates an inherent risk score for the risk and a residual risk score for the risk. For each of the processes, the processor calculates a residual risk score for the process. The interface communicates for display, for each of the process groupings, an image representing the process grouping. The interface further communicates for display, for each of the processes, an image representing the process and an indication of the residual risk score for the process. | 09-11-2014 |
20140257918 | Risk Management System for Calculating Residual Risk of an Entity - According to one embodiment, a system includes a processor and an interface. The processor determines a plurality of processes associated with an entity, a plurality of risks associated with the entity, and a plurality of controls associated with the entity. For each of the controls, the processor calculates one or more weighted control scores for the control. For each of the risks, the processor calculates an inherent risk score and a residual risk score. For each of the processes, the processor calculates a residual risk score for the process and determines a process weight associated with the process. The processor further calculates a residual risk score for the entity based on each of the residual risk scores of the processes and each of the process weights associated with the processes. The interface communicates for display an indication of the residual risk score for the entity. | 09-11-2014 |
20140278728 | System and Methods For Determining Risk of Supply Chain Disruption - Methods and systems for determining risk in a supply chain and displaying risk to a user. A supply chain is defined in a database by linking one or more driver components to a monitored component. Each driver component is associated with one or more component indicators that provide an indication of an expected availability of the driver component. Each component indicator is assigned a risk score. An expected risk value and a worst case risk value are determined for each component indicator. A risk profile is then determined based on a ratio between the expected risk values of the component indicators and the worst case risk values of the component indicators. The risk profile may then be displayed on a web page through a database portal. If the risk profile exceeds a threshold, the database may transmit a notification to a subscriber to the database. | 09-18-2014 |
20140278729 | MULTIPLE RESOLUTION VISUALIZATION OF DETECTED ANOMALIES IN CORPORATE ENVIRONMENT - One embodiment of the present invention provides a user interface for presenting anomaly-detection outcomes associated with an organization to a user. The user interface includes a receiving mechanism configured to receive the anomaly-detection outcomes, a display that displays the anomaly-detection outcomes at a first resolution, and a command-receiving mechanism configured to receive commands from the user. In response to receiving a respective user command, the display is configured to display the anomaly-detection outcomes at a second resolution. | 09-18-2014 |
20140278730 | VENDOR MANAGEMENT SYSTEM AND METHOD FOR VENDOR RISK PROFILE AND RISK RELATIONSHIP GENERATION - A vendor management system for calculating risks associated with registered vendors, the system including a processing device including a hardware processor configured to operate a risk calculation module to perform a risk analysis associated with a vendor of the registered vendors, a user terminal for accessing the processing device by a user, the user terminal configured to generate a user interface for the user to select a vendor from a list of registered vendors and to display a result of a risk analysis including a risk score performed by the risk calculation module; and a database access device configured to access data on the registered vendors including an access to a first database entry storing a vendor profile information including risk criteria associated with vendors, a second database entry storing personnel information of the vendors including information on at least one of employees and directors; and a third database entry storing weight factors associated with the risk criteria. | 09-18-2014 |
20140278731 | System and Method for Agricultural Risk Management - A system and method for applying risk analysis to identify optimal crop varieties for use in a particular field with particular environmental characteristics and soil techniques is disclosed herein. The method adapts financial portfolio analysis methods for use with agricultural production to take into account the variability of soil, environment, and crop management. A system for supporting the use of the method is also disclosed. | 09-18-2014 |
20140278732 | DYNAMIC RISK STRUCTURE CREATION SYSTEMS AND/OR METHODS OF MAKING THE SAME - A governance, risk management, and compliance (GRC) computer system is provided that includes at least one processor, a user input device, and a storage system that stores meta-model. The meta-model includes at least one process element, a plurality of dynamic risk elements, and a plurality of dynamic control elements. The risk meta-model is loaded from the storage system. Input is accepted from the user input device for creating a new dynamic risk model based on the loaded extended risk meta-model. At least one process element is added to the new dynamic risk model based on user provided input and the extended risk meta-model. A first dynamic risk element is added from the plurality of dynamic risk elements based on user provided input. A risk type of the first dynamic risk element is determined based on user provided input. | 09-18-2014 |
20140278733 | RISK MANAGEMENT METHODS AND SYSTEMS FOR ENTERPRISE PROCESSES - Methods and systems are provided to manage risk in an enterprise process by performing quantitative risk assessment for a plurality of enterprise resource categories, including a human resource category, that contribute to performance of the process. A plurality of risk values for the respective resource categories are thus determined. Risk assessment is performed based on a comparative analysis of the respective resource category risk values. Quantitative risk assessment for the human resource category comprises calculating an assessed knowledge metric value that indicates measured knowledge of people that contribute to the process, and quantifying a knowledge risk by correlating the assessed knowledge metric value with predefined knowledge metric thresholds. | 09-18-2014 |
20140278734 | RISK SCREENING TOOL - Systems and methods for computerized risk screening are provided. A plurality of facilities are identified for analysis of risk at each facility in the plurality of facilities. For each facility in the plurality of facilities, an answer set to a questionnaire is received. The answer set includes answers to questions for analysis of the risk at the facility. For each facility in the plurality of facilities, a predicted risk level of the risk at the facility is determined based on the answer set. A visual interface is provided. The visual interface includes: (i) a list of at least a portion of the facilities from among the plurality of facilities, (ii) a visual representation of at least one facility from among the plurality of facilities, and (iii) a visual indication of the predicted risk level of the risk for the at least one facility from among the plurality of facilities. | 09-18-2014 |
20140278735 | ENVIRONMENTAL MONITORING DEVICE - An environmental monitoring device that monitors the operation of a legacy electronic device is described. In particular, a sensor in the environmental monitoring device provides sensor data that represents an environmental condition in an external environment that includes the environmental monitoring device. This environmental condition is associated with the operation of the legacy electronic device in the external environment. The environmental monitoring device analyzes the sensor data and provides feedback about the operation of the legacy electronic device based on the analyzed sensor data. Moreover, the sensor provides the sensor data without or excluding communication and/or electrical coupling between the environmental monitoring device and the legacy electronic device. In this way, the environmental monitoring device facilitates monitoring, analysis and feedback of the sensor data without directly interacting with the legacy electronic device. | 09-18-2014 |
20140288995 | CRITICALITY SPATIAL ANALYSIS - A system includes a processor, a memory and a user interface. The processor has an input port to receive node data, path data, and spatial data. The node data corresponds to nodes in a system. A node is associated with a facility in a food supply chain. The path data corresponds to connectivity between nodes along paths. The paths are associated with nodes in the food supply chain. The spatial data corresponds to nodes or paths. The memory stores executable instructions for accessing risk data associated with at a node, a path, or a food item. The instructions generate output data based on the node data, the path data, the spatial data, and the risk data. The output corresponds to criticality of the food supply chain. The user interface receives user-selected input data as to the food supply chain and provides the output data. | 09-25-2014 |
20140288996 | TECHNOLOGY ASSET TRACKING SYSTEM AND METHOD - A Technology Asset Tracking System and Method tracks all technology assets including software, hardware and other devices and telecommunications equipment, plans, contracts and agreements, and usage of technology assets from acquisition and assignment to disposal/retirement. An asset database maintains details on each of the devices, including its costs and features. Business rules related to device usage, including compliance policies, are maintained and checked against phone usage to monitor compliance. The system is designed to provide enterprise level configuration and compliance management—to accumulate information about configurations, changes and other data from disparate sources and enable management and data providers to integrate their data into a coherent, seamless unit, using a familiar type of interface. | 09-25-2014 |
20140288997 | SYSTEMS AND METHODS FOR MANAGING CONTRACTS BETWEEN A FINANCIAL INSTITUTION AND ITS VENDORS - Methods and systems are presented herein for managing contracts between a financial institution and its vendors, for preparation of associated vendor oversight reports, and for securing subscriptions for a financial institution/vendor relationship management system. In certain embodiments, the system provides a guided workflow-driven process for building a complete report for auditors and examiners. In certain embodiments, the system encourages subscriptions from financial institutions for a financial institution/vendor relationship management system. | 09-25-2014 |
20140297358 | EYES ON CONTROL --- A NOVEL ACCOUNTING SYSTEM - A system and method for conveniently dealing with various financial transactions, called Eyes on Control, relates generally to an accounting system and business method with related software programs which is designed to develop a streamlined process to gain a better risk management and more efficient process to run accounting system in terms of cash management, accounts receivable/payable, purchasing, payroll, and general ledger controls. | 10-02-2014 |
20140297359 | RISK MANAGEMENT DEVICE - A risk management device includes: a memory for storing risk weighing data and a threshold risk amount, the risk weighing data including a plurality of scenario data each including a combination of a loss event content, loss occurrence frequency and a loss amount; and a processor. The processor is programmed to calculate post-change risk weighing data obtained by changing only loss occurrence frequency or a loss amount of one specific scenario data of the risk weighing data and transmit to a risk weighing device, and repeatedly executing a process of comparing a risk amount received from the risk weighing device with the threshold risk amount while changing a change width of the loss occurrence frequency or the loss amount, thereby performing calculation of an increase rate of the loss occurrence frequency or the loss amount of the specific scenario data such that a risk amount reaches the threshold risk amount. | 10-02-2014 |
20140297360 | SYSTEM AND METHOD FOR RETAILER RISK PROFILING - The lottery administration entity typically maintains a retail network of terminals that can be used to purchase tickets as well as validate tickets. Each transaction at the retail locations, whether it is purchasing tickets or validating tickets, may be stored in a database or other data store. The data store may be used to search for ticket information, such as when or where a particular ticket was purchased. The stored data may processed in order to generate a risk profile of retailers. | 10-02-2014 |
20140297361 | OPERATIONAL RISK BACK-TESTING PROCESS USING QUANTITATIVE METHODS - Methods, computer-readable media, and apparatuses are disclosed for quantifying risk and control assessments. The risk includes both residual risk and direction of risk. Various aspects of the invention quantitatively compare the risk and control assessments against step-ahead losses using special regression models that are particularly applicable to this kind of data. The empirical comparison may be performed on both loss event frequency and severity in two different and separate dimensions. The empirical comparison may also be performed using losses extracted by even occurrence and event settlement dates in two separate dates. | 10-02-2014 |
20140304030 | SUPPLY CHAIN ARCHITECTURE - The disclosed architecture is an end-to-end supply chain audit and compliance architecture that enables users to capture pertinent supplier information throughout the entire supply chain, and conduct comprehensive risk analysis as part of due diligence compliance efforts. The architecture find particular applicability to monitoring the origin and introduction into the supply chain of conflict minerals, such as gold, diamonds, oil, etc., that have been obtained illegally or against moral and ethical standards. The architecture also enables the exposure of forced labor sources, counterfeit materials, and false quality certifications. | 10-09-2014 |
20140310056 | AUGMENTED REALITY RETAIL SYSTEM - Methods, computer-readable media and apparatuses for providing additional information are disclosed. For example, a method receives from a device of a customer, an identification code identifying a product, obtains social media information regarding the customer from a social network, and provides the additional information to the device of the customer, wherein the additional information relates to the product, and wherein the additional information is based upon the social media information. | 10-16-2014 |
20140316845 | Business Services Dashboard - Novel tools and techniques are provided for implementing a business services dashboard. In some embodiments, a method might comprise defining relationship(s) between at least one technology service and at least one business service provided by an enterprise, and receiving data associated with real-time technical events corresponding to changed conditions in one or more technology services utilizing at least one technology asset. Each defined relationship might indicate a dependence on the one or more technology services by one or more business services. The method might further comprise identifying, based on the defined relationship(s), one or more business events that impact the one or more business services of the enterprise, as a result of the changed condition. Business user views and technical user views might be generated and sent to user devices associated with respective business and technical group users. Corresponding system and apparatus may be provided. | 10-23-2014 |
20140316846 | ESTIMATING FINANCIAL RISK BASED ON NON-FINANCIAL DATA - A method for estimating a risk associated with a project includes preparing a plurality of data models, where each of the plurality of data models examines a different dimension of the project, classifying each of the plurality of data models to produce a plurality of prediction models, where each of the plurality of prediction models is defined by a plurality of quality metrics, and where the plurality of quality metrics includes a preliminary estimate of the risk and a measure of confidence in the preliminary estimate, and computing a refined estimate of the risk based on a quality of the plurality of quality metrics. | 10-23-2014 |
20140316847 | OPERATIONAL RISK BACK-TESTING PROCESS USING QUANTITATIVE METHODS - Methods, computer-readable media, and apparatuses are disclosed for quantifying risk and control assessments. The risk includes both residual risk and direction of risk. Various aspects of the invention quantitatively compare the risk and control assessments against step-ahead losses using special regression models that are particularly applicable to this kind of data. The empirical comparison may be performed on both loss event frequency and severity in two different and separate dimensions. The empirical comparison may also be performed using losses extracted by even occurrence and event settlement dates in two separate dates. | 10-23-2014 |
20140324519 | Operational Risk Decision-Making Framework - A system and method for calculating a quantitative operational risk score and assisting an organization in the risk decision-making process is disclosed. The method may include identifying a plurality of instances of operational risk relevant to the organization to scrutinize, and storing the list of instances of operational risk in computer memory. For each instance of operational risk, the system may provide a rating value for each risk rating input category, and storing the rating values in computer memory. A processor of the system may calculate an operational risk score for each instance of operational risk in the list, and generate/display a risk decision-making matrix/chart. In addition, the system may calculate a portfolio/aggregated operational risk score for each portfolio of related instances of operational risk, and generate/display a risk decision-making matrix/chart accordingly for the portfolio scores. | 10-30-2014 |
20140324520 | METHOD FOR DETERMINISTIC SAFETY ANALYSIS IN NON-STATIONARY HIGH RISK SYSTEM, CONTROL METHOD AND CONTROL SYSTEM USING THEREOF - This invention relates to a method and systems of safety analysis of engineering processes and may be used for safety analysis of nuclear power stations. | 10-30-2014 |
20140324521 | QUALITATIVE AND QUANTITATIVE ANALYTICAL MODELING OF SALES PERFORMANCE AND SALES GOALS - The present invention is applicable in the field of sales performance management coupled with corporate finance, corporate capital investments, economics, math, business risk analysis, simulation, decision analysis, qualitative risk analysis, risk management, quantitative risk analysis, and business statistics, and relates to the modeling and valuation of investment decisions and sales performance management and analysis under uncertainty and risk within all companies, allowing these firms to properly identify, assess, quantify, value, diversify, and hedge their corporate capital investment and sales management decisions and their associated risks. Specifically, the present invention looks at starting from comprehensive qualitative sales performance management and moving the analysis into the realms of quantitative risk-based sales performance modeling, simulation, and optimization. | 10-30-2014 |
20140330615 | RISK ESTIMATION OF INSPECTION SITES - A system for estimating a risk that a site will have deficiencies receives data relating to the site. The data comprises a plurality of previous inspection results of the site. The system determines a risk score that corresponds to the expected deficiencies that would be found if the site were inspected, where a poor risk score corresponds to a higher risk of having deficiencies. The risk score for the site is based upon the plurality of previous inspection results of the site, and previous deficiencies worsen the determined risk score for the site. | 11-06-2014 |
20140330616 | System and Method for Identifying Relevant Information for an Enterprise - A system and method are provided for finding and retrieving information within an enterprise that is relevant to enterprise problems, enterprise opportunities, and unexpected or interesting events. The method includes scanning content related to a process conducted by an enterprise, where the process includes one or more process steps; identifying a problem, opportunity or event associated with a process step (an enterprise stress point); indexing the scanned content with respect to the enterprise stress point; determining whether the scanned content is information relevant to the problem, opportunity or event; and providing relevant information to a user. The relevant information includes a description or discussion of a contemporaneous or previous experience of the enterprise regarding the problem, opportunity or event. | 11-06-2014 |
20140337086 | RISK ASSESSMENT FOR INDUSTRIAL SYSTEMS USING BIG DATA - A cloud-based risk assessment service collects industrial data from multiple relevant and connected sources for storage and analysis on a cloud platform. The service analyzes gathered data from internal and external sources and customers across different industries to identify operational trends as a function of industry type, application type, equipment in use, device configurations, and other such variables. Based on the analysis, the risk assessment service identifies risk factors inherent in a customer's particular industrial enterprise. The cloud-based system generates a risk profile for the customer that identifies the determined risks and recommends risk aversion strategies based on the customer's specific profile, compared to industry standards, product information, internal business expectations, external regulatory bodies, and/or past performance. Risk profiles are tailored for both plant-level users and business-level users to provide intelligent strategies to improve performance and prevent avoidable losses. | 11-13-2014 |
20140337087 | IDENTIFICATION AND RISK EVALUATION - Methods, systems, and machine-readable media are disclosed for identification of an individual and evaluation of risk from doing business with that individual. In one embodiment a method of evaluating a risk from conducting business with an individual comprises receiving identity information related to the individual. The identity information includes information from an identity credential presented by the individual. The identity credential is validated based on the information from the identity credential and one or more positive databases. An identity of the individual is verified based on the identity information and the one or more positive databases. The identity information is screened against one or more negative databases indicating past losses to one or more entities. Results of the screening are reported based on one or more criteria of an entity considering doing business with the individual. | 11-13-2014 |
20140337088 | WEATHER RISK MANAGEMENT SYSTEM - This disclosure relates to a system for managing financial risk associated with weather-based service contracts, and more specifically, to a system based on the purchase of weather derivatives to select, manage, minimize, and redistribute financial burdens associated with costs incurred from the payment of services related to greater than average weather-based events. An option contract having a tick price, and an associated premium at a fixed strike price is selected at a desired coverage, in one embodiment, the desired coverage is associated with a payout with the associated tick price that covers the base price of performing the service for a nominal weather condition, the premium of buying the option, and the price of performing the services for exceptional weather precipitations of a three standard deviation from the nominal value. If a hedge trader offers this service rather than a service provider, the desired coverage will also cover the a commission for the trade. | 11-13-2014 |
20140344008 | STRATEGIC PLANNING PROCESS FOR END USER COMPUTING - Systems and methods are described for end user computing strategic planning. A described method includes obtaining a first governance score that is a measure of federation in an organization, obtaining a first risk score that is a measure of risk tolerance in the organization, obtaining a first audit score that is a measure of record keeping ability in the organization, obtaining a first productivity score that is a measure of workforce productivity in the organization, and obtaining a first elasticity score that is a measure of change tolerance within the organization. The described method further calculates, for each of the first scores, a respective corresponding second score pertaining to a user category, calculates a respective assessment for each of the first scores based on a comparison of the first score with the corresponding second score, and provides a summary of the assessments. | 11-20-2014 |
20140344009 | STRATEGIC PLANNING PROCESS FOR END USER COMPUTING - Systems and methods are described for obtaining a first governance score that is a measure of federation for a platform, a first risk score that is a measure of risk tolerance for the platform, a first audit score that is a measure of record keeping ability for the platform, a first productivity score that is a measure of workforce productivity for the platform, and a first elasticity score that is a measure of change tolerance for the platform. The method further obtains operational readiness scores that are measures of processes used to manage the platform within an organization, adjusts the first scores based on the operational readiness scores, calculates respective corresponding second scores pertaining to the organization, calculates a respective assessment for each of the adjusted first scores based on a comparison of the adjusted first score with the corresponding second score, and provides a summary of the assessments. | 11-20-2014 |
20140344010 | SYSTEM AND METHOD FOR AUTOMATED HANDLING OF A WORKFLOW IN AN AUTOMATION AND/OR ELECTRICAL ENGINEERING PROJECT - A system and method are disclosed for automated handling of at least one working step of a workflow in an automation and/or electrical engineering project via a data input interface, a processing unit and a data output interface connected to the processing unit for transmitting any data read in by the data input interface or generated by the processing unit to at least one of a data repository, another processing unit and/or a display unit. The data input interface can read in input values belonging to the at least one working step of the workflow, and an input uncertainty including a range of input values. The processing unit can generate an output value of the working step from the input value, and calculate an output uncertainty characterizing a range of the output value, by taking into account a parameter and/or a technical condition of the working step. | 11-20-2014 |
20140350998 | PROJECT RISK PATTERNS MODELING AND RISK MITIGATION - Project risk patterns modeling and risk mitigation. The method includes obtaining potential risk factors associated with a project. Further, at least one interacting potential risk factor influencing at least another potential risk factor may be ascertained. The ascertaining is performed based on interaction indicators. The interaction indicators are indicative of an interaction between the at least one interacting potential risk factor and the at least another potential risk factor. Further, a risk emergence pattern is identified based on the interaction between the at least one interacting potential risk factor and the at least another potential risk factor. The risk emergence pattern is indicative of a recurrent interaction between the at least one interacting potential risk factor and the at least another potential risk factor. | 11-27-2014 |
20140350999 | SYSTEM AND A METHOD FOR PROVIDING RISK MANAGEMENT - The present invention provides a system and a method for the risk management through ratio scale measures. The present invention identifies the risk of occurrence of events, develops ratio scale measures for impact of events and likelihood of events and deriving the risk of the events by multiplying the ratio scale measures for impacts with the ratio scale measures for likelihoods of the identified risk events. The ratio scale measures for impact of risk events is the sum-product of the ratio scale measures of the importance of the objectives and ratio scale measures of the impact of associated risk events on the objectives. The ratio scale measures for likelihoods of risk events is the sum-product of the probabilities of the identified causes times the probability of the risk events given the identified causes. | 11-27-2014 |
20140358626 | ASSESSING THE IMPACT OF AN INCIDENT IN A SERVICE LEVEL AGREEMENT - Assessing the impact of an incident in a Service Level Agreement (SLA) by a system including a plurality of nodes organized in a hierarchical structure is disclosed. An incident record for an incident related to a service at a first node is received and an actual impact of the incident at the first node is calculated. The calculated actual impact is transferred to a parent node until a root node is reached. The actual impact of the incident is calculated at the parent node and a final actual impact and a total financial impact for the SLA are calculated at the root node. The actual impact at each node, the final actual impact, and the total financial impact are calculated dynamically while the incident is in progress. | 12-04-2014 |
20140358627 | SYSTEM AND METHOD FOR RISK DETECTION REPORTING AND INFRASTRUCTURE - A method, a system, and a device for monitoring risks associated with at least one business process, including: evaluating at least one of a plurality of document instances, wherein each of the document instances includes, in association therewith, a plurality of document values, against a plurality of risk categories; implementing the plurality of risk categories pursuant to at least one acceptable risk policy approved for the at least one business process; and qualifying at least one of the at least one of the plurality of documents pursuant to an approval rating of the at least one document in at least one risk category. The system, method, and device efficiently monitor risk, and allow for flexibility in modifying or updating risk policy. | 12-04-2014 |
20140365268 | METHOD AND APPARATUS FOR RESOURCE DEPENDENCY PLANNING - Systems, methods, apparatuses, and computer readable media are disclosed for resource dependency planning. A method is provided for resource dependency planning including receiving resource dependency logic. The resource dependency logic may define a dependency relationship among a plurality of resources. The method may also include receiving a set of resource input data. The resource input data may indicate a status of at least one of the plurality of resources. The method may further include determining a status of each of the plurality of resources based on the set of resource input data and the resource dependency logic, and providing the status of the plurality of the plurality of resources via a resource dependency planning interface. Various other means including a system, apparatus, and computer readable medium are also disclosed. | 12-11-2014 |
20140365269 | FAILURE PREDICTION BASED PREVENTATIVE MAINTENANCE PLANNING ON ASSET NETWORK SYSTEM - There are provided a method, a system and a computer program product for maintaining an asset. The system receives data associated with an one asset and other assets to which the one asset is directly or indirectly physically connected. The system determines, based on the received data, a dependency between the one asset and one or more of the other assets. The system predicts, based on the determined dependency, a failure of the one asset within a future time period. | 12-11-2014 |
20140365270 | PROACTIVE SIMULATION AND DETECTION OF OUTBREAKS BASED ON PRODUCT DATA - Embodiments of the present invention relate to proactive computer simulation of portable product failures, and more specifically, to determining the likely cause of an outbreak of foodborne disease or other geographically distributed symptoms of a failure or contamination of a portable product. In one embodiment, a method of and computer program product for simulating portable product failures is provided. Data regarding the locations of consumers of a portable product within a geographic region is received from a data store. A probability density map is determined from the data, indicating where the portable product is likely to be consumed within the geographical region. For each of a plurality of simulated failures of the portable product, the locations of a plurality of simulated incidents arising from the simulated failure are determined. From the locations of the plurality of simulated incidents and the probability density map, the number of incidents necessary to identify the portable product to a predetermined certainty is determined. | 12-11-2014 |
20140365271 | INDUSTRIAL ASSET HEALTH MODEL UPDATE - Among other things, one or more techniques and/or systems are provided for generating a health profile of an industrial asset based upon data pertaining to such an industrial asset. The health profile describes an expected condition of the industrial asset during a prediction period, a predicted cause of the expected condition, and/or a predicted impact of the expected condition. In some embodiments, the health profile is generated using a model that is configured to be periodically and/or intermittently updated. Further, in some embodiments, a diagnostic profile may be generated describing diagnostic actions that may be taken to improve predictions included within a health profile and/or to improve a confidence in one or more of those predictions. | 12-11-2014 |
20140379417 | System and Method for Data Quality Business Impact Analysis - A computer implemented method of calculating a cost impact. The method includes associating cost amounts with various rules, using the rules to identify bad data, and calculating an aggregate cost of the bad data. In this manner, the Data Steward can prioritize various data quality improvement projects. | 12-25-2014 |
20140379418 | METHODS, SYSTEMS AND NON-TRANSITORY COMPUTER-READABLE MEDIA FOR CALCULATING A RISK ASSOCIATED WITH A PROJECT - The present invention provides a method and system for calculating an overall risk associated with a project. A set of activities of the project are extracted by an interface module, where the set of activities are assorted into a set of predetermined categories, each category comprising a plurality of phases of execution of the project. A risk value of the each activity can be retrieved from the database. Further, an associated risk value of the each activity can be aggregated by an aggregating module, for calculation of the overall risk. | 12-25-2014 |
20150025933 | VALUE AT RISK INSIGHTS ENGINE - A method for risk mitigation comprises calculating on at least one processor, a likelihood of occurrence for a risk event, a degree of disruption for the risk event and a disruption time for the risk event. Each risk event is in a list of risk events. The likelihood of occurrence is based on a frequency of risk of the risk event. The degree of disruption is based on a severity of risk of the risk event. The disruption time is based on a duration of restoring an asset to a condition prior to the risk event. A value at risk based on the likelihood of occurrence, the degree of disruption and the disruption time is determined for the risk event. A mitigation action is determined to reduce the value at risk. An indication of the mitigating action is presented on a user interface. | 01-22-2015 |
20150032500 | METHOD FOR CREATING AND EXPRESSING RISK-EXTENDED BUSINESS PROCESS MODELS - A method and computer program product for extending a business process model. The method includes specifying first elements representing performance measures and objectives of a business process which may be compromised by risk events; specifying second elements representing contextual information describing circumstances which may be relevant to a failure mode of the process, said contextual information comprising a type and state of: resources to support the process, of jobs and artifacts that undergo the process; and, a type and state of environmental factors; specifying third elements representing errors which may occur during process execution; specifying fourth elements representing causal relationships among risk events related to the resources, activities, and said environmental factors that may influence process execution; and providing a set of metamodel extensions to a standard process modeling language that incorporate said specified first second third and fourth elements directly in the business process model. | 01-29-2015 |
20150032501 | METHODS AND APPARATUS FOR SIMULATING RISK TOLERANCE AND ASSOCIATED ADVERSARY COSTS IN A DISTRIBUTED BUSINESS PROCESS - Methods and apparatus for simulating risk tolerance and associated adversary costs in a distributed business process are disclosed. The methods and apparatus simulate an interdependent business process, such as a financial transaction system, in a secure distributed manner. Each business entity that is part of the interdependent business process models itself on a local client device at any chosen level of detail. A simulation server connects the separate client based simulations into one large simulation. Details of each local simulation may be hidden from other simulation participants. However, interruptions in business flow caused by simulated disruptions introduced at the simulation server and/or a client device are propagated to all of the effected simulation participants via the simulation server. In addition, the simulation server receives inputs from users indicative of risk tolerance levels and associated response actions. If the operational costs imposed by a selected response action are greater than a deterrence threshold associated with a particular adversary, the adversary is not deterred from causing a certain disruption to the simulated competitive market environment. If the operational costs imposed by a selected response action are greater than the deterrence threshold the adversary is deterred. | 01-29-2015 |
20150039384 | PROGRAM AND PROJECT RISK TOOL - Disclosed is a program and project management system. The program and project management system typically includes a processor, a memory, and a program module stored in the memory. The program and project management system is typically configured for: prompting a user to complete predefined program plan phase tasks; receiving risk information regarding the program, rigor level information regarding the program, and one or more defined business outcomes for the program; calculating a program risk score; determining a rigor level; based on the program risk score not exceeding a predefined risk score threshold and each defined business outcome including one or more associated metrics, initiating a program plan tollgate; based on successful completion of program plan tollgate, prompting the user to complete predefined program execution phase tasks; and determining whether the metrics associated with each defined business outcome have been satisfied. | 02-05-2015 |
20150039385 | SYSTEM AND METHOD FOR LIQUIDATION MANAGEMENT OF A COMPANY - The present disclosure relates to a tool for identifying the probability of liquidation of a company. The system may be configured to collect indicators of liquidation data from a plurality of companies. The system may analyze the indicators of liquidation data to determine placement of a company of the plurality companies along a bankruptcy timeline. The system may mitigate a downside risk to a financial institution based on the placement. The computer based system may be configured to determine if a company has entered a bankruptcy proceeding. Term data may be scraped from a website, such as PACER, comprising legal proceeding data associated with the company for targeted terms. The computer based system may be configured to collect financial indicators pertinent to the bankruptcy proceeding from financial reports, analyze based on the identified targeted terms, the financial indicators. | 02-05-2015 |
20150039386 | METHOD AND SYSTEM FOR RISK ASSESSMENT ANALYSIS - An engineering management system including one or more processors configured to receive input defining one or more requirements for a product. The engineering management system may generate a first risk prevention document based on one or more of the product requirements and receive risk parameter input related to the first risk prevention document. The engineering management system may initiate a problem solver analysis tool based on the first risk prevention document and receive problem parameter input related to the problem solver analysis tool. The engineering management system may determine one or more outputs using the problem solver analysis tool. The engineering management system may populate one or more aspects of the first risk prevention document with the determined outputs based on one or more defined associations between the first risk prevention document and the problem solver analysis tool. | 02-05-2015 |
20150051945 | SYSTEM AND METHOD FOR IDENTIFYING POTENTIAL FUTURE INTERACTION RISKS BETWEEN A CLIENT AND A PROVIDER - A method for identifying potential future interaction risks between a client and a provider using a computer server is disclosed. Transactions between the client and the provider are conducted in association with one or more communication platforms and the method includes storing client data on the computer server received from a variety of data sources including client claims data, and storing agent data on the computer server received from a variety of data sources. The method further includes obtaining feedback data related to at least one of the client, the agent, and one of the transactions and analyzing the data to identify potential future transactional problems. | 02-19-2015 |
20150058072 | Method And System For Mitigating The Risk Of A Wrongful Burial - Methods and systems for managing cemetery operations are provided. More particularly, a method of the present disclosure can mitigate the risk of a wrongful burial at a cemetery by ensuring a blind check is performed by an eligible user. Specifically, the method can determine whether the user has access to a blind check module and can present a blind check module interface when it is determined that the user has access to the blind check module for a deceased's interment, entombment, or inurnment. | 02-26-2015 |
20150066575 | ENTERPRISE RISK ASSESSMENT - Methods and apparatus are disclosed for assessing risk in an enterprise. A server may receive risk scores indicating an asset's risk level across various risk vectors. The server may aggregate the risk scores and assess score ranges for each risk vector. For each risk vector, the server may then segregate the risk scores based on their rank amongst the other risk scores within the range (e.g., top 10%, bottom 60%, and the like). Next, the server may apply a grading rubric to assign grades for each percentage (e.g., top 10% is an F grade, bottom 60% is an A grade and the like) assign grade points (e.g., an F grade is a 0.0, an A grade is a 4.0, and the like). By calculating a grade point average, the server may be able to provide a uniform system of assessing and evaluating risk across all assets in the enterprise. | 03-05-2015 |
20150066576 | Collaborative Audit Management System - A method includes recording audit results from an audit being conducted on a computer searchable storage device, recording supporting documentation on the computer searchable storage device, searching the storage device for similar prior audits to reveal fraud patterns utilizing a database search engine, and correlating the fraud patterns with the audit being conducted. | 03-05-2015 |
20150066577 | METHOD AND SYSTEM FOR ASSESSING, MANAGING AND MONITORING INFORMATION TECHNOLOGY RISK - A method for information technology and information asset risk assessment of a business relationship between a client and a third party. The method includes establishing a database. The database includes a plurality of IT information risk factors stored in the database are associated with certain risks the client may be exposed to based on an action the client follows or based upon who the client uses as their third party provider. The database is configured to receive IT risk information. The IT risk information is associate with the plurality of IT information risk factors. The database is also configured to receive updated risk information for storage thereon. The method includes receiving risk information corresponding to the subset of relationship risk factors. The method continues with generating a relationship risk score. The relationship risk score is determined in response to evaluating the subset of relationship risk factors using the IT risk | 03-05-2015 |
20150066578 | SYSTEM AND METHOD FOR ASSESSING ORGANIZATIONAL HEALTH-RELATED RISK AND READINESS FOR WELLNESS AND DISEASE MANAGEMENT PROGRAMMING - A computer-implemented system and method are provided as an organizational risk and readiness assessment tool (ORA) for assessing organizational health-related risks and readiness for wellness and disease management programming. Survey data is collected for an organization, such as environmental survey data, leadership survey data and health culture survey data. The survey data may include binary survey data and scalar survey data. A scoring engine generates one or more readiness scores for the organization by applying at least one scoring algorithm to the survey data to generate one or more risk and/or readiness scores for the organization. The risk and/or readiness scores may relate to the environment, leadership perceptions, and health culture of the organization. Overall risk and readiness scores may also be generated. Report data generated for the organization enables graphic display of one or more of the organization's risk and readiness scores generated by the scoring engine, for example, including a color-coded display of the organization's environmental, leadership, health culture and overall readiness scores. | 03-05-2015 |
20150073859 | SYSTEM AND METHOD FOR ASSESSING TOTAL REGULATORY RISK TO HEALTH CARE FACILITIES - A medical system ( | 03-12-2015 |
20150073860 | PRODUCTION MANAGEMENT DEVICE AND PRODUCTION MANAGEMENT PROGRAM - According to one embodiment, a data input unit inputs data affecting progress of production, a development risk calculation unit calculates development risks related to development time of the production based on results of classification of the data, a production capability calculation unit calculates production capabilities by process based on results of analysis of the data, and an expected value calculation unit calculates expected values of production volume by process based on the development risks and the production capabilities. | 03-12-2015 |
20150073861 | Gaming Industry Risk Management Clearinghouse - Systems, methods, apparatus, computer program code and means for gathering, organizing and presenting on a real time basis information pertinent to Risks associated with subjects related to the Gaming Industry. Risks associated with the Gaming Industry can be managed by gathering data relevant to the Gaming Industry from multiple sources and aggregating the gathered data according to one or more risk variables. An inquiry relating to a risk subject can be received and portions of the aggregated data can be associated with the risk subject. The associated portions of the aggregated data can be transmitted to an entity placing the inquiry or other designated destination. | 03-12-2015 |
20150073862 | SYSTEM AND METHOD FOR RISK OPTIMIZED, SPATIALLY SENSITIVE PREVENTIVE MAINTENANCE SCHEDULING FOR ASSET MANAGEMENT - A preventative maintenance method and a system for estimating the risk of failure of an asset based on intrinsic parameters such as failure history combined with causative factors like weather and independent external risk factors such as vandalism and risk of flooding. The present invention may further have a system for estimating the risk of failure of an asset based on intrinsic parameters, such as failure history combined with causative factors such as weather and independent external risk factors like vandalism and risk of flooding having a location based asset/service failure risk estimator, an external risk estimates database for feeding and an integrated failure risk database, the external risk estimates database feeding the integrated failure risk database. | 03-12-2015 |
20150081377 | DYNAMIC PRICING FOR FINANCIAL PRODUCTS - An aspect of product pricing includes classifying customers into groups based on shared, predefined characteristics and financial transactions, and identifying services rendered and available but not rendered. For each customer, a risk associated with a service is estimated; availability and prices of the service by third parties are determined; a price for the service set by the entity is compared with the prices set by the third parties; and a demand for the service of the entity is estimated as a function of the availability and prices of the service by the third parties. For each customer, a probability that the customer will purchase the service is estimated based on the demand, and a price for the service that is customized for the customer is calculated, as a function of the risk, the demand, and the probability of purchase, and in view of a target profit and/or target revenue. | 03-19-2015 |
20150081378 | TRANSACTIONAL RISK DAILY LIMIT UPDATE ALARM - Embodiments relate to a transactional risk daily limit (TRDL) update alarm. Customer data including historical transaction data and customer profile data is accessed, along with economic data from an external data source. A TRDL alarm analytics model is applied to the customer data and the economic data to predict a number of transactions in a specified time period that are expected to exceed a TRDL. The TRDL alarm analytics model takes into account a payment transaction pattern associated with the customer. A threshold value is compared to the number of transactions in the specified time period that are expected to exceed the TRDL. An increase in the TRDL is requested to be applied at least during the specified time period based on the number of transactions in the specified time period that are expected to exceed the TRDL being greater than the threshold value. | 03-19-2015 |
20150081379 | SYSTEM FOR MONITORING SAFETY PROTOCOLS - A system for monitoring the impact of lack of safeguards and procedures and for converting that into a metric of risk for any industrial facility or transportation of the same substances or products. A user interface allows access to a database containing safety documents for all safeguard's and procedures. The user interface also interfaces with a safety calculation module that calculates the risk level for specific potential consequences if specific safety procedures are not implemented and if specific safeguards become unavailable in any way. The calculation module calculates risk on a per scenario basis using a risk performance indicator, (RPI), metric. This metric is calculated as the difference between projected risk and tolerable risk. A total risk for an area of a facility can be calculated by summing all risk performance indicator metrics for all scenarios in that area. | 03-19-2015 |
20150088594 | TECHNIQUES FOR ANALYZING RESTAURANT OPERATIONS - Embodiments of the invention provide techniques for using operational data and/or video footage to identify and diagnose operational issues. In some embodiments, business metrics represented in data produced by a restaurant's operational systems are identified and stored, conditions which warrant attention are identified, and the metrics that may indicate potential causes for those conditions are identified. Video footage may be correlated with business metric data to assist in diagnosing and remediating issues. | 03-26-2015 |
20150088595 | Systems and Methods for Evaluating Risks Associated with a Contractual Service Agreement - Systems and methods for evaluating risks associated with a contractual service agreement are provided. According to one embodiment, a system may include a processor configured to analyze the contractual service agreement to determine risk categories associated with the contractual service agreement. The system may receive risk parameters associated with the one or more risk categories and weights associated with the one or more risk parameters. The weights may be associated with the risk parameters to produce weighted risk parameters. The risk associated with the contractual service agreement may be evaluated by adding the weighted risk parameters. | 03-26-2015 |
20150088596 | SUPPLY CHAIN MANAGEMENT USING PROBLEM AND REMEDIATION PROPAGATION MODELING - A method for problem remediation in supply chain management is provided in the illustrative embodiments. A determination is made whether a data in a data stream of a supply chain process is indicative of a problem in the supply chain. Responsive to determining that the data is indicative of the problem, a confidence level is assigned to a diagnosis of the problem. Using a historical data repository, a symptom of the problem is identified. The symptom identifies a point in the data stream where the problem is manifested. Using the historical database, a remedy for the problem is identified. The remedy is recorded in the historical data repository with the problem and the symptom at a previous time. The previous time is before receiving the data stream. The remedy is applied to the supply chain. | 03-26-2015 |
20150088597 | METHOD, SYSTEM, AND APPARATUS FOR MANAGING CORPORATE RISK - A method, system, and apparatus for facilitating the process of a corporate risk assessment procedure (which may be identified as an “ESA” or “Enterprise Security Assessment”) are disclosed. A method for data gathering and security assessment may allow security assessors to more readily combine the results of a documentation review process and the results of client interviews, and associate those findings with a broad set of sector-specific and international cyber security standards. This method may include aggregating both sets of data, displaying the aggregated data to the security assessor or another party in a convenient manner, executing functions on the data to transform it into a useful form, and electronically comparing the data to one or more cyber security standards. Data may then be communicated back to a user in the form of an electronic or hard-copy report. A system and apparatus may likewise be configured to perform these steps. | 03-26-2015 |
20150095099 | RAPID ASSESSMENT OF EMERGING RISKS - Apparatus and methods described herein may rapidly identify emerging risks that may impact an entity. Methods may update and identify emerging risks on a frequent basis. Using an electronic form, information may be collected from a filtered set of experts. The set of experts may be “filtered” based on the emerging risk and a scope of the emerging risk. The information may include the experts' responses to a set of questions. The information may include values on absolute scales. The information may be analyzed to determine variation in the responses of the experts. The information may be aggregated across a plurality of emerging risks and across a plurality of lines-of-business. Based on the information, a convergence point may be determined. The convergence point may identify a time at which a combined impact of each of the plurality of emerging risks exceeds a risk threshold of an entity. | 04-02-2015 |
20150095100 | System and Method for Integrated Risk and Health Management of Electric Submersible Pumping Systems - A system and process for optimizing the performance and evaluating the risks of pumping systems includes the steps of measuring the operation and condition of components within a discrete electric submersible pumping system, accumulating these measurements across a field of electric submersible pumping systems, performing statistical analysis on the accumulated measurements and producing one or more selected outputs from the group statistical analysis. In the preferred embodiments, the statistical analysis and data processing occurs at both the individual pumping system and at one or more centralized locations. | 04-02-2015 |
20150095101 | METHOD AND SYSTEM FOR POPULATING REQUIREMENTS - A non-transitory machine readable storage medium storing instructions that, when executed, cause a processor to perform a method of receiving input defining one or more requirements for a product. The method may generate one or more cross-reference matrices from the one or more requirements based on a hazard analysis risk assessment. The method may generate a parent-child structure for the one or more cross-reference matrices and populate a requirement file based on the cross-reference matrices. The method may generate a risk prevention analysis file based on input from the requirement file and one or more linkages between the one or more requirements and the parent-child structure, and output the risk prevention analysis file. The method may output the risk prevention analysis file as a tree structure and have a tool to enable a user to scroll through the tree structure. | 04-02-2015 |
20150095102 | COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR ENSURING COMPUTER INFORMATION TECHNOLOGY INFRASTRUCTURE CONTINUITY - The present invention relates to a system computer implemented information technology (“IT”) management solution that bridges the gap between deployed computer information technology infrastructure and business services to determine what information technology a business entity or other organization currently has, what is at risk and what is needed to assure IT infrastructure continuity. | 04-02-2015 |
20150106154 | SYSTEM AND METHOD FOR FINANCIAL RISK ASSESSMENT - A computer-implemented method and system for financial risk assessment are provided. The method includes receiving financial data related to an international monetary transaction from a transferring country to a receiving country; determining a universal currency for the receiving country based on at least one purchasing power parity (PPP) value related to the receiving country; and assessing the financial risk of the international monetary transaction based on the universal currency and the financial data. | 04-16-2015 |
20150127414 | SYSTEM AND METHOD FOR SELECTIVE AUDITING OF MOBILE COMMERCE BASKETS - The invention relates to systems and methods of selective auditing of mobile commerce baskets based on real-time behavior, profile information, event information, and/or other information in self-scan and other self-serve retail systems. The system may make a comprehensive, real-time, audit decision based on various risk factors that indicate a probability that a given shopping trip in a self-scan system includes a scan error. The audit decision may be parameterized such that different risk factors may be considered and weighted/prioritized with respect to other risk factors. For example, audit parameters may be used to determine which risk factors are used when processing the audit decision. The system may keep track of purchases, audits, and audit results in order to provide real-time reports and analytics. The system may also model audit decisions such that audit decisions may be simulated for a one or more retail locations during different time periods. | 05-07-2015 |
20150127415 | SYSTEMS, METHODS AND COMPUTER READABLE MEDIA FOR GENERATING A MULTI-DIMENSIONAL RISK ASSESSMENT SYSTEM INCLUDING A MANUFACTURING DEFECT RISK MODEL - Some implementations can include a computerized method, system or computer readable media for generating a manufacturing defect risk assessment model. The method can include obtaining training data for a plurality of loans, the training data can include loan information and a forensic audit finding and deficiency code associated with each loan. The method can also include cleaning the training data to obtain data associated with a time of origination for each loan, and enriching the training data for each loan by adding additional data. The method can further include grouping deficiency codes into one or more classes of defects, in which each class includes one or more related defect codes. The method can also include selecting one or more variables for the manufacturing risk assessment model and assigning a coefficient to each selected variable. | 05-07-2015 |
20150127416 | SYSTEMS, METHODS AND COMPUTER READABLE MEDIA FOR MULTI-DIMENSIONAL RISK ASSESSMENT - Some implementations can include a computerized method, system or computer readable media for multi-dimensional risk assessment. The method can include obtaining loan application data and preprocessing the loan application data including limit checking values and augmenting the loan application data with information from external sources. The method can further include selecting scoring values corresponding to key scoring variables and scoring the application by processing the scoring values in a multi-dimensional risk assessment system including an operational risk model. | 05-07-2015 |
20150127417 | SYSTEMS AND METHODS FOR FORECASTING FINANCIAL RISK - In one embodiment, forecasting financial risk includes eliciting from multiple risk experts subjective probability distributions regarding the future of a risk index, generating a pooled subjective probability distribution for the index based upon the individual subjective probability distributions, and presenting the pooled subjective probability distribution to users. | 05-07-2015 |
20150134398 | RISK DRIVEN PRODUCT DEVELOPMENT PROCESS SYSTEM - New product developments are getting more and more risks due to the following uncertainties. The technology uncertainties are caused by the immaturity of components or system integration. The company-internal uncertainties are resulted from an inefficiency and unqualified Product Development Process (PDP). The customer requirement uncertainties are induced by levels of understanding of customer requirements or customer requirement changes. The market uncertainties are due to the actions of competitors or environmental influence. | 05-14-2015 |
20150134399 | INFORMATION MODEL FOR SUPPLY CHAIN RISK DECISION MAKING - An apparatus for building an information model for supply chain risk decision making includes a risk selection module, a priority module, a risk assessment module, and a scheduling module. The risk selection module selects, based upon a profiling questionnaire, one or more risk categories for an assessment subject. The priority module sets, based upon the profiling questionnaire, a level of importance of and a risk tolerance for the assessment subject in a supply chain. The risk assessment module receives, for each risk category of the one or more risk categories for the assessment subject, a likelihood and an impact of the risk category. The scheduling module sets a risk assessment schedule of the assessment subject based upon the level of importance of the assessment subject. | 05-14-2015 |
20150134400 | MAINTENANCE PARTS INVENTORY PLANNING SYSTEM, MAINTENANCE PARTS INVENTORY PLANNING SYSTEM SERVER, AND MAINTENANCE PARTS INVENTORY PLANNING SYSTEM CLIENT TERMINAL - A maintenance parts inventory planning system which creates a maintenance parts inventory planning of one or more industrial machines by computer ( | 05-14-2015 |
20150142506 | Account Health Assessment, Risk Identification, and Remediation - A method and system for determining account health, identifying and rating hidden and visible risks, and identifying remediation actions in response to identified risks and as a means to improve account health scores is provided. The method includes retrieving metrics associated with a customer account of a customer. Aggregated metrics from the metrics and additional aggregated metrics are generated and stored. Weighting factors are applied to the aggregated metrics and the additional aggregated metrics. Attributes of events and symptoms of incidents are modeled to identify best fit & possible root causes. In response, overall health & risk scores for the customer account are calculated | 05-21-2015 |
20150142507 | RECOMMENDATION SYSTEM FOR SPECIFYING AND ACHIEVING GOALS - Methods, systems, and computer-readable storage media for recommending one or more indicators to be monitored. In some implementations, actions include receiving user input, the user input indicating a measure selected by a user, identifying a plurality of dimensions corresponding to the measure, receiving goal data, the goal data being provided by the user, determining a rank for each dimension of the plurality of dimensions, each rank being determined based on a risk and a contribution associated with a respective dimension, the risk being determined based on the goal data, and providing dimensions of the plurality of dimensions for display to the user, the dimensions being displayed based on rank, each dimension filtering the measure to provide a respective filtered measure, the filtered measure being an indicator that can be monitored. | 05-21-2015 |
20150142508 | INCIDENT PLAYBOOK GENERATED IN REAL TIME FROM DISASTER RECOVERY PLAN EXTRACTIONS - Systems, methods and procedures enabling an incident planner to build and distribute disaster response playbooks to be used by incident responders. Information is excerpted from multiple plan documents (such as disaster recovery, crisis management, business continuity, or emergency response plans) that includes only what are the essential personnel contacts, tasks, and resources needed at time of disaster. | 05-21-2015 |
20150142509 | Standardized Technology and Operations Risk Management (STORM) - A computer system analyzing a risk by identifying and assessing the risks, determining the disposition of the risks, monitoring and mitigating the risks, and reporting the risk items across an information technology system. A risk assessment tool may map known risk items into a risk framework as well as map risk categories between different risk frameworks. The risk management tool may also identify a root cause through a defined root cause dictionary based on an identified risk or the associated risk category of the identified risk. This capability may enable a user to analyze end-to-end operations, particularly where the main areas of risk are and where new controls or modified existing controls should be implemented. The risk management tool may also provide risk assessment reports that that are expressed in a common risk language with operations associates, with internal auditors, external auditors and regulatory bodies, and with government agencies. | 05-21-2015 |
20150149239 | Technology Element Risk Analysis - A quantitative approach to analytically assess technical elements within a system design. Numerical analysis and sorting is performed across the technical elements. Risk analysis is performed by evaluating criteria and ranking the evaluated criteria. The ranking criteria are placed into groups, with the groups identifying area that will be mitigated against risk. | 05-28-2015 |
20150149240 | IDENTIFYING CONTROL IMPROVEMENT OPPORTUNITIES FOR KEY PROCESSES - Embodiments of the invention are directed to apparatus, methods, and computer program products for identifying process control gaps and process control improvement opportunities in a financial institution. The present invention leverages both Failure Mode and Effects Analysis (FMEA), specifically implementation of a risk priority number/score and Federal Financial Institution Examination Council (FFIEC) examination guidelines, specifically completion of a process control guidance checklist to result in a process control status score. As a result of the integration of FMEA and FFIEC examination guidelines, a resulting risk-based process health score is implemented to identify the risk of lack of process controls or gaps in existing process controls. As a result, actions may be taken to mitigate the risk and/or provide the requisite process controls. | 05-28-2015 |
20150149241 | SCENARIO STATE PROCESSING SYSTEMS AND METHODS FOR OPERATION WITHIN A GRID COMPUTING ENVIRONMENT - Systems and methods are provided for generating multiple system state projections for one or more scenarios using a grid computing environment. A central coordinator software component executes on a root data processor and provides commands and data to a plurality of node coordinator software components. A node coordinator software component manages threads which execute on its associated node data processor and which perform a set of matrix operations. Stochastic simulations use results of the matrix operations to generate multiple state projections. Additional processing can be performed by the grid computing environment based upon the generated state projections, such as to develop risk information for users. | 05-28-2015 |
20150149242 | METHODS, APPARATUS, AND SYSTEMS FOR ACQUIRING AN ENHANCED POSITIVE RESPONSE FOR UNDERGROUND FACILITY LOCATE AND MARKING OPERATIONS BASED ON AN ELECTRONIC MANIFEST DOCUMENTING PHYSICAL LOCATE MARKS ON GROUND, PAVEMENT, OR OTHER SURFACE - A positive response notification to provide information regarding locate and/or marking operations for underground facilities may include time-stamp information to provide proof of a time at which the locate and/or marking operation was completed by a locate technician, and/or place-stamp information to provide proof of a presence of the locate technician at or near a work site. An electronic manifest image and/or a virtual white line image similarly may be included in a positive response notification. In one example, such images may be bundled together based on respective descriptor files (or descriptor metadata) that associates the corresponding images with a locate request ticket for the operation. In another example, a positive response notification may include environmental information regarding one or more environmental conditions present at or near the work site during the locate and/or marking operation. | 05-28-2015 |
20150294246 | SELECTING OPTIMAL TRAINING DATA SET FOR SERVICE CONTRACT PREDICTION - A selection parameter is applied to a set of risk assessment data and corresponding performance measure data for a completed, or active, project that is similar to a proposed project. Certain combinations of the risk assessment data and corresponding performance measure data are selected for training an optimal predictive model. The predictive model is applied to available data of a proposed project for predicting associated risks, or outcomes, of the proposed project. | 10-15-2015 |
20150294249 | RISK PREDICTION FOR SERVICE CONTRACTS VASED ON CO-OCCURENCE CLUSTERS - A method for predicting risks for information technology service contracts includes calculating a probability of occurrence of each target risk in a target contract; constructing clusters of root causes observed in historical contracts similar to the target contract, for each of the clusters, identifying root causes that co-occur with target contract risks by searching each cluster for root causes of similar historical contract risks such that the identified root causes represent additional new contract risks, and calculating the probability of occurrence of each new target risk identified for the target contract based on root causes identified in the similar historical contract risks. Two root causes are in the same cluster if both root causes occur in one or more contracts in the set of historical contracts, where two root causes co-occur if both root causes are in the same cluster. | 10-15-2015 |
20150294250 | BUILDING CONFIDENCE OF SYSTEM ADMINISTRATOR IN PRODUCTIVITY TOOLS AND INCREMENTAL EXPANSION OF ADOPTION - A system management tool, with a risk assessment mode enabled, is executed within an execution infrastructure on a management computer system, to manage a target computer system in a production situation. When the execution of the tool reaches a risk segment which raises risk for the target system, a user is informed of at least one action to be executed in the risk segment. If the user agrees, the tool is allowed to execute in an automatic mode until an end of the risk segment is reached. Feedback is obtained from the user regarding safety of the risk segment; and the steps are repeated for a plurality of additional risk segments until the tool is deemed safe for all of the risk segments, after which the tool is transitioned from the risk assessment mode to an automatic mode of operation. | 10-15-2015 |
20150302326 | SYSTEMS AND METHODS FOR BUSINESS IMPACT ANALYSIS AND DISASTER RECOVERY - Systems and methods for business impact analysis and disaster recovery, wherein the system comprises of an input interface; business function parameters; limiting parameters associated to the said business function parameters; a tracking sub-system; an impact calculator; an operation site; and a disaster recovery site; wherein the said limiting parameters defines the limits of the said business function parameters; and wherein the said business function parameters and the said limiting parameters are entered into the system through the said input interface; and wherein the said entered business function parameters are independently or simultaneously tracked by a tracking sub-system; and wherein on occurrence of a change in business function parameters that cross the limits defined by the said limiting parameters is tracked by the said tracking sub-system and the said impact calculator calculates the impact of the change in the said business function parameters simultaneously in real time. | 10-22-2015 |
20150302336 | STRATEGIC PARTNER GOVERNANCE FRAMEWORK AND PERFORMANCE TRACKING - Systems, apparatus, methods, and computer program products are provided for managing the productivity and performance of a business' offsite service providers. Productivity is measured multi-dimensionally taking into account the unique business metrics that result in increased productivity. In addition, the framework herein provided can dynamically be adjusted over time at allow for different business metrics to be considered and/or assign a pre-determined level of importance to a business metric (i.e., proper weighting), resulting in a final productivity score that allows for comparison amongst service providers. | 10-22-2015 |
20150317576 | FRAMEWORK FOR ASSESSING THE SENSITIVITY OF PRODUCTIVITY MEASURES TO EXOGENOUS FACTORS AND OPERATIONAL DECISIONS AND FOR THE COMPUTER GENERATED PROPOSAL OF OPTIMAL OPERATING PLANS - The present disclosure is directed to a framework for modelling the effects on exogenous factors on an operating plan that captures how a business would react to variability of exogenous factors as well as the effect of simultaneously implementing various operating decisions. The framework can also generate optimal operating plans given variability of exogenous factors and reactive business decisions. The framework offers strategic risk management decision support for a business producing goods that are heavily exposed to raw material prices in the commodity markets. The framework accounts for both exogenous factors as well as operational decisions. Specifically, for example, the framework can model corporate earnings and the impact of expenses, revenue, and profit/loss from financial instruments given uncertain exogenous factors while integrating the effects on earnings of operational decisions made in relation to physical assets, real options, and of finished goods selection. | 11-05-2015 |
20150317577 | METHODS OF MONITORING BEHAVIOR/ACTIVITY OF AN INDIVIDUAL ASSOCIATED WITH AN ORGANIZATION - A cooperative arrangement and method to monitor behaviors and other activities by an individual in an organization. Personal financial information associated with an individual who is associated with, or to be associated with, the organization are obtained. Information is extracted from the personal financial information and input into a risk assessment algorithm. The risk assessment algorithm operates on the input information and generates risk assessment data. The risk assessment data is evaluated to make a determination of certification with respect to the individual. A decision to certify means that the risk associated with the individual, with respect to committing fraud or some other improper act with respect to the organization, is acceptable. Risk assessment data on a plurality of key individuals within the organization may be generated and evaluated to make a determination of certification with respect to the organization as a whole. | 11-05-2015 |
20150324715 | LOGISTICS SETTLEMENT RISK SCORING SYSTEM - A method and system for measuring financial risk in logistics transactions is disclosed. Historical data from processing logistics transactions is reviewed with analysis tools to determine risk scores in key areas. The method may be updated for new components representing high risk in logistics and to refresh risk scores periodically. In embodiments, a module generates risk score results for a given client profile, which may include actual or estimated inputs for both activity levels and a control configuration. Control configuration inputs include not only the basic controls in place for risk mitigation, but also the data enhancements applied for every control as implemented by the client. The client data inputs originate from shippers, logistics service providers, financiers, auditors or other logistics ecosystem partners. The outputs include quantified risk score results in various formats, which may be accessed by computer, smart phone, tablet, mobile device, or via an Internet browser. | 11-12-2015 |
20150324934 | Management system for injection press molding problems - A method executed by a programmable unit ( | 11-12-2015 |
20150332184 | Application Risk and Control Assessment - Systems and methods are disclosed for assessing risks that may be associated with an application and assessing controls that may be implemented to mitigate the risks associated with the application. The systems and methods may include identifying risk data that may be used at least partially to calculate a risk score. The systems and methods may also include identifying control data that may be used at least partially to calculate a control score. The risk score and the control score may be compared to one another. An assessment of the risks and controls application may be performed at least partially based on the risk score and the control score. A threshold value may be set for the risk score and/or the control score that are compared and used to assess an application. | 11-19-2015 |
20150339604 | METHOD AND APPLICATION FOR BUSINESS INITIATIVE PERFORMANCE MANAGEMENT - A method including, for a set of historical and/or ongoing business initiatives, determining key negative and positive performance factors by a computer from a structured taxonomy of negative and positive performance factors stored in a memory; modeling at least one of the performance factors for the ongoing business initiative or a new business initiative at at least one level of the hierarchical taxonomy. The key negative and positive performance factors are modeled based, at least partially, upon a likelihood of occurrence of the key negative performance factors during the business initiative, and based, at least partially, upon potential impact of the key performance factors on the business initiative. The method further includes providing the modeled performance factors in a report to a user, where the report identifies the modeled performance factors, and the potential impact of the at least one modeled performance factor. | 11-26-2015 |
20150339605 | METHODS OF GENERATING PROSPECTIVE LITIGATION EVENT SET - Examples of the disclosure are directed to methods of generating an event set of prospective litigation scenarios and further generating a visualization of a subset of the event set that constitutes a worst-case mass litigation associated with a common agent. A prospective litigation scenario may describe a claim that a particular plaintiff or class of plaintiffs suffered a harm caused by an agent in an exposure setting, and a particular defendant or class of defendants are identified as potentially liable. Further, a prospective litigation scenario may be paired with a liability risk score indicating the likelihood that a particular defendant or class of defendant might be held financially responsible given the claim. | 11-26-2015 |
20150339606 | DYNAMIC METHODS SYSTEMS AND DEVICES FOR ASSESSING RISK IN ENERGY-RELATED ASSETS - Devices, systems, and methods for assessing risk or value in energy-related assets are disclosed. In one aspect a dynamic computerized method for calculating a likelihood that an end-user will fulfill obligations on an asset associated with energy-related equipment is disclosed. In another aspect a dynamic computerized method for calculating a likelihood that an end-user will renew the energy-related asset or enter into a new agreement for a new energy-related asset at the end of the term of the energy-related asset is disclosed. | 11-26-2015 |
20150347937 | Characterizing Risks in Resource Distribution Systems - Characterizing risks in resource distribution systems includes collecting measurements from multiple end users in a resource distribution system and identifying a subset of the end users that pose a greater than average risk to the resource distribution system with a risk identification engine. | 12-03-2015 |
20150347965 | SYSTEMS AND METHODS FOR REPORTING COMPROMISED CARD ACCOUNTS - A system or method is provided to generate and send a notification to a card issuing bank to report a compromised card. In particular, the notification may be embedded in a pseudo card transaction message based on the ISO 8583 protocol message format. Card issuing banks may be a participant in a compromised card account reporting program to receive the notifications via the ISO 8583 transaction messages from a merchant or a payment service provider. In particular, data elements within the ISO 8583 protocol that are not reserved for carrying information for a transaction may be designated to carry information for reporting the compromised card account. Thus, merchants or payment service providers may send notifications of compromised card accounts to card issuing banks in a secured manner using ISO 8583 transaction messages. | 12-03-2015 |
20150356478 | SYSTEM AND METHOD FOR RISK ASSESSMENT - A system and method for assessing risk. In one embodiment, a system for risk assessment includes a processor and a storage device. The storage device is coupled to the processor, and stores instructions that when executed cause the processor to: 1) receive inspection result information for an inspected unit; 2) generate a probability of mishap value for the inspected unit based on the inspection result information; 3) generate a risk assessment code for the inspected unit based on the probability of mishap value; and 4) generate an inspection schedule for the inspected unit based on the risk assessment code. | 12-10-2015 |
20150371162 | SYSTEM AND METHOD FOR IDENTIFYING ENTERPRISE RISKS EMANATING FROM SOCIAL NETWORKS - A computer-implemented method and a system for identifying one or more enterprise risks emanating from one or more social networks are provided. In various embodiments of the present invention, interaction data of one or more users of the one or more social networks are aggregated. The aggregated interaction data and one or more predefined keywords relating to the one or more enterprise risks are employed to identify one or more communities of users interacting in a predetermined time period. One or more non-active users are iteratively eliminated from the one or more communities and interaction data of remaining users are analyzed for identifying the one or more enterprise risks. | 12-24-2015 |
20150371163 | CHURN PREDICTION IN A BROADBAND NETWORK - A churn predictor predicts whether a customer is likely to churn. The churn predictor is built and trained from data collected from multiple customers. The data can include static configuration data and dynamic measured data. A churn predictor builder generates multiple customer instances and processes the instances based on the collected data, and based on separating the instances into one or more training subsets. Based on the processing, the builder generates and saves a churn predictor. The churn predictor can access data for a customer and generate a customer instance for evaluation against the training data. The churn predictor processes the customer instance and generates a churn likelihood score. Based on a churn type, the churn predictor system can generate preventive action for the customer. | 12-24-2015 |
20150379443 | SYSTEM AND METHOD FOR ENTERPRISE RISK MANAGEMENT - A system and apparatus for establishing, evaluating, managing and enhancing risk management programs. One primary embodiment of the system is the capability to integrate, organize and affect all requisite program factors, processes and outcomes using a simple, unified program dashboard and associated toolset. | 12-31-2015 |
20160005049 | PREDICTING A LIKELIHOOD OF CUSTOMER SERVICE INTERACTIONS - A device and method may predict the likelihood of a customer service interactions. The method may include selecting a plurality of customer accounts, and determining events over at least one predetermined time period that are associated with each customer account from the selected customer accounts. The method may include determining risk values associated with the determined events, and generating a combined risk score for each customer account based upon the associated risk values. The method may further include assigning, for each customer account, a risk level associated with a likelihood of each customer interacting with a service representative. The method may also include determining that the risk level assigned to a customer account indicates a high likelihood of a customer interacting with a service representative, and then performing an action to automatically reduce the likelihood of the customer interacting with a service representative. | 01-07-2016 |
20160012360 | ASSESSING AN INFORMATION SECURITY GOVERNANCE OF AN ENTERPRISE | 01-14-2016 |
20160019478 | OPTION-BASED DISRUPTION MITIGATION SYSTEM IN A LOGISTICS NETWORK - A disruption mitigation system for a network is disclosed. The system has at least one processor and a memory module configured to store instructions that when executed enable the at least one processor to receive a data set, the data set indicative of at least one option for mitigating an event that disrupts at least one component of the network. The instructions further enable the at least one processor to determine a probability of occurrence of the event by randomly sampling a specified probability space and estimate a cost of the at least one option based on the probability. | 01-21-2016 |
20160019479 | Interactive and Iterative Behavioral Model, System, and Method for Detecting Fraud, Waste, and Abuse - An interactive, iterative, and/or reiterating behavioral model (FWA-IIRB) for detecting, preventing, and/or mitigating fraud, waste, and abuse in an industry is provided. The model is comprehensive and facilitates analysis of different types of fraud cases in different ways. For example, an approach may be determined by the nature of the industry. Likewise, the identity of a primary player identified by the system may at least in part determine the approach. The WA-IIRB model is comprehensive in data collection and effective in handling a wide variety of situations, players and industries. Simultaneously, the system builds data volume by creating additional data points and discovering gaps as the model/framework proceeds to final output/results. By tailoring the analysis algorithm to the type and content of the data provided to the system, the invention improves a computer's speed and efficiency in processing the data and supplying a result. | 01-21-2016 |
20160034830 | METHODS AND SYSTEMS FOR SAFETY, SECURITY, AND ENVIRONMENTAL MANAGEMENT - A method, system and computer program for managing assessment, comprising creating a project for an assessment associated with a company and a particular site for a selected issue or issues, selecting a protocol for the project, wherein the protocol includes one or more elements with associated questions, receiving assessment information in response to the questions, and generating, via the processing device, a report based on the assessment information. | 02-04-2016 |
20160042304 | RISK-BASED EXECUTION FOR PROJECTS - Disclosed is a risk-based project management system. The risk-based project management system typically includes a processor, a memory, and a program module stored in the memory. During the planning phase of a project, the program and project management system is typically configured for: prompting a first user to provide inherent risk information regarding the project, receiving inherent risk information regarding the project; and based on the received inherent project risk information, calculating an inherent project risk score. During the execution phase of a project, the program and project management system is typically configured for receiving residual risk information regarding the project and, based on the received residual project risk information, calculating a residual project risk score. | 02-11-2016 |
20160042305 | ENVIRONMENT RISK SORTING SYSTEM - An environment risk sorting system includes a plant environment database for storing pieces of environment risk data; a risk sorting server for updating the environment risk data; a managing server coupled with the risk sorting server, wherein, the risk sorting server executes generating through a first risk evaluation module, based on the environment risk data, a first risk evaluation result for each abandoned plant, which produces an environmental site evaluation list, through which, an environmental site evaluation data of each abandoned plant and a on-spot environmental site evaluation data are obtained, updating through a second risk evaluation module succeeding environment risk data based on the environmental site evaluation data of each abandoned plant and hence generating a second risk evaluation result for each abandoned plant, which, in turn, produces an investigation list of each abandoned plant as a basis for follow-up investigation. | 02-11-2016 |
20160048781 | Cross Dataset Keyword Rating System - A system may include an interface, a memory, and one or more processors. The system receives a request to determine a significance of a first keyword and accesses a first record comprising the first keyword. The system determines a first risk score of the first record and assigns the first risk score of the first record as a first keyword instance score associated with the first keyword. The system determines the significance of the first keyword based at least in part upon the first keyword instance score. The system analyzes the significance of the first keyword. | 02-18-2016 |
20160048782 | Controlling and Managing Identity Access Risk - Methods and systems for controlling and managing identity and access management risks are presented. A computing device may generate a maturity model that maps a plurality of access management controls to a plurality of information technology (IT) resources associated with an IT environment. Subsequently, the computing device may determine, for each IT resource of the plurality of IT resources, a plurality of access management maturity scores. Each access management maturity score of the plurality of access management scores may correspond to an access management control of the plurality of access management controls that are associated with the corresponding IT resource. The computing device then may determine an aggregate maturity score for the IT environment based on the plurality of access management maturity scores for the plurality of IT resources. Thereafter, the computing device may provide the maturity model and the aggregate maturity score to at least one governance system. | 02-18-2016 |
20160048938 | METHOD FOR DETERMINING AND ANALYZING IMPACT SEVERITY OF EVENT ON A NETWORK - The present disclosure discloses a server having a microprocessor, a memory, a network interface to receive incoming and send outgoing messages, a buffer for temporary storage of incoming and send outgoing messages, and an interface driver to provide the control signals to effect operation of the network interface and buffer. The memory can include a microprocessor executable impact assessment analyzer to determine and provide, via the network interface, buffer, and interface driver and for an event impacting a selected supply and/or logistics chain, a significance of an impact of the event on a selected object in the selected supply and/or logistics chain. | 02-18-2016 |
20160055434 | DYNAMIC RISK ASSESSMENT BASED PRODUCT SAMPLING - In a method, system, and computer program product for dynamic risk assessment based product sampling, for a product to be produced in response to an order for the product, a processing flow comprising a plurality of stages for producing the product is determined. A set of conditions expected to be present at a time of executing a stage in the plurality of stages is identified. A risk model corresponding to a subset of the set of conditions is selected. A failure mode related to the risk model is selected. The failure mode is applied to the risk model using the subset of conditions to compute a risk value associated with the product. The product is selected as a sample for the stage responsive to the risk value exceeding a threshold risk value. | 02-25-2016 |
20160055435 | SYSTEM AND METHOD FOR RISK DETECTION REPORTING AND INFRASTRUCTURE - A method, a system, and a device for monitoring risks associated with at least one business process, including: evaluating at least one of a plurality of document instances, wherein each of the document instances includes, in association therewith, a plurality of document values, against a plurality of risk categories; implementing the plurality of risk categories pursuant to at least one acceptable risk policy approved for the at least one business process; and qualifying at least one of the at least one of the plurality of documents pursuant to an approval rating of the at least one document in at least one risk category. The system, method, and device efficiently monitor risk, and allow for flexibility in modifying or updating risk policy. | 02-25-2016 |
20160063405 | PUBLIC TRANSPORTATION FARE EVASION INFERENCE USING PERSONAL MOBILITY DATA - Embodiments include fare evasion inference using personal mobility data in a public transportation system. Aspects include receiving personal mobility data and constructing a plurality of personal trajectories from the personal mobility data. Aspects also include mapping each of the plurality of personal trajectories to a route and time of the public transportation system and calculating an estimated occupancy for each route and time in the public transportation system based on a number of personal trajectories mapped to each route and time. Aspects further include comparing the estimated occupancy with a paying passenger data received from the public transportation system and assigning a score to each route and time in the public transportation system based on the comparison of the estimated occupancies and the paying passenger data, wherein the score is indicative of a probability of a fare evasion occurring. | 03-03-2016 |
20160063424 | INTEGRATED FRAMEWORK FOR MONITORING BUSINESS ACTIVITIES - Methods and system are disclosed that assist monitoring activities in an organization in real-time using an integrated application. In one aspect, the integrated application establishes a connection with a central monitoring framework and an in-memory data store. The in-memory data store includes business data and associated key performance indicators (KPIs). In response to a detection of a modification of key performance indicators or an unauthorized access of the business data, an analytical engine associated with the integrated application analyzes the associated KPIs and/or the business data and generates results including modified KPIs and identifiers. Based on the identifiers, the KPIs and the modified KPIs are mapped with control parameters in a corresponding framework to determine a deviation in the values of KPIs and a workflow in the corresponding framework is instantiated. Upon instantiating the workflow, the KPIs are displayed on a user interface that provides monitoring information in real-time. | 03-03-2016 |
20160071035 | IMPLEMENTING SOCIALLY ENABLED BUSINESS RISK MANAGEMENT - A method that comprises receiving a plurality of inputs including data a plurality of multiple business repositories, generating from the plurality of inputs a corpus graph as a statistical relational network, inferring a plurality of new relations between informational elements of the statistical relational network, and generating a plurality of summaries of the plurality of new relations. Further, each summary describes the informational elements of the statistical relational network associated with a corresponding risk-relation. | 03-10-2016 |
20160078376 | INFORMATION PROCESSING APPARATUS, NON-TRANSITORY COMPUTER READABLE MEDIUM, AND INFORMATION PROCESSING METHOD - An information processing apparatus includes an instructing unit that, if a deficiency in a first organization is discovered by implementation of a control in the first organization, instructs a second organization to implement the control implemented in the first organization, the second organization having a risk equivalent to a risk corresponding to the control and adopting a control that is not equivalent to the control. | 03-17-2016 |
20160078377 | SOFTWARE SERVICE TO FACILITATE ORGANIZATIONAL TESTING OF EMPLOYEES TO DETERMINE THEIR POTENTIAL SUSCEPTIBILITY TO PHISHING SCAMS - A software system and service for facilitating organizational testing of employees in order to determine their potential susceptibility to phishing scams is disclosed to evaluate their susceptibility to e-mail and Internet cybercrimes such as phishing. The e-mail addresses of a client organization's employees are provided to the system, a phishing e-mail is created and customized, and a phishing e-mail campaign in which the phishing e-mail message is sent and the responses to the phishing e-mail is monitored, and the results of the e-mail campaign are provided for evaluation. The phishing e-mail may optionally contain attachments and various types of probes and “call home” mechanisms. | 03-17-2016 |
20160086112 | PREDICTING RENEWAL OF CONTRACTS - A device may provide a user interface to a user device for inputting contract information. The device may receive the contract information from the user device via the user interface. The contract information may include information about a contract between a first party and a second party, and information about a relationship between the first party and the second party. The device may determine values for risk variables based on the contract information. The device may determine a risk score based on the values for the risk variables. The risk score may indicate a likelihood that the second party will renew the contract. The device may provide risk information to the user device to be displayed via the user interface. The risk information may indicate the risk score. | 03-24-2016 |
20160092807 | Automatic Detection and Resolution of Pain Points within an Enterprise - Methods, systems, and computer program products for automatic detection and resolution of pain points within an enterprise are provided herein. A method includes collecting multiple items of pain point data from multiple individuals across multiple parts of an organization, wherein said pain point data comprise information pertaining to one or more issues negatively impacting operations within the organization; automatically validating the collected pain point data via one or more items of evidence; correlating two or more of the multiple items of pain point data across two or more of the multiple parts of the organization; and automatically outputting, to an individual within the organization, a recommendation for resolving a submitted query related to an item of pain point data based on said correlating. | 03-31-2016 |
20160092808 | PREDICTIVE MAINTENANCE FOR CRITICAL COMPONENTS BASED ON CAUSALITY ANALYSIS - A maintenance data collector may be used to collect maintenance data characterizing maintenance events associated with maintaining operations of a plurality of components, and a critical component identifier may be used to identify, from the plurality of components and based on the maintenance data, critical components that contribute disproportionately to production losses caused by the maintenance events. A causality analyzer may then determine causal connections between the maintenance events, based on operational dependencies between pairs of the plurality of components, and a maintenance policy generator may generate a maintenance policy governing future maintenance events for the plurality of components, based on the identified critical components and the causal connections. | 03-31-2016 |
20160092809 | Method And System For Mitigating The Risk Of A Wrongful Burial - Methods and systems for managing cemetery operations are provided. More particularly, a method of the present disclosure can mitigate the risk of a wrongful burial at a cemetery by ensuring a blind check is performed by an eligible user. Specifically, the method can determine whether the user has access to a blind check module and can present a blind check module interface when it is determined that the user has access to the blind check module for a deceased's interment, entombment, or inurnment. | 03-31-2016 |
20160098652 | Method and system for the management and evaluation of potential events - A system, apparatus or product for the management and evaluation of potential events. The method comprising: obtaining potential event specifications and obtaining control specifications defining controls. A potential event specification defines an initial evaluation of a potential event and an effect of different evaluations of the potential event on the evaluation of one or more other potential events. A control specification defines potential findings for a control. The control specification defines for each potential finding an effect on an evaluation of one or more potential events. The method further comprises obtaining findings of performing monitoring of the controls, and determining a modified evaluation for each potential event as a modification of the initial evaluation of the potential event. The modified evaluation is based on an aggregated effect of findings and of other potential events on the potential event, in accordance with the potential event specification and the control specification. | 04-07-2016 |
20160098653 | Risk Analysis to Improve Operational Workforce Planning - Techniques are described for operational workforce planning tool. The planning tool can be utilized by a manager to analyze an existing workforce plan. A manager within the organization can adjust the workforce plan based on planning criteria. The adjustments can be stored as planning tasks of the workforce plan. Changes made to the workforce by a lower level manager can be rolled up to an upper level manager for review and approval before the changes are finalized. Furthermore, upper level managers can generate sub-plans for lower level managers. Sub-plans can include planning criteria that is created by an upper level manager for a lower level manager. The lower level managers can report back to the upper level manager on the completion of the sub-plan when the lower level manager rolls up his changes to the workforce plan for the manager to review. | 04-07-2016 |
20160098655 | INTERACTIVE BUSINESS LIFECYCLE MANAGEMENT SYSTEM - An interactive business lifecycle management system is disclosed which provides intuitive views of business programs, program performance, operations status, and compliance status. The interactive business lifecycle management system provides near real-time status, process analytics, business portfolio management, compliance and governance functions over business operations, and delivers program lifecycle management functions complete with comprehensive business program analysis capabilities and governance program compliance analysis. In this way, the interactive business lifecycle management system enables business leaders to perform business operations while satisfying governance compliance objectives. | 04-07-2016 |
20160117622 | SHARED RISK GROUP MANAGEMENT SYSTEM, SHARED RISK GROUP MANAGEMENT METHOD, AND SHARED RISK GROUP MANAGEMENT PROGRAM - Provided are a service influence degree calculation unit | 04-28-2016 |
20160117623 | DATABASE MANAGEMENT AND PRESENTATION PROCESSING OF AGRAPHICAL USER INTERFACE - A system for database management and presentation processing of a graphical user interface includes a network interface interfacing with multiple data sources comprising internal systems and external systems, one or more processors, and an application service integration and communication layer to receive data including a live data feed. A data storage device stores schemas of data structures, and the data structures may include tables based on types and fields. The application service integration and communication layer normalizes and formats the live data feed according to the predetermined schemas, and stores the normalized and formatted procurement data in the database. A graphical user interface of true conditions assigned to procurement data in the live data feed is displayed. | 04-28-2016 |
20160132798 | SERVICE-LEVEL AGREEMENT ANALYSIS - According to an example, service level agreement (SLA) analysis may include receiving selection of a SLA to be analyzed. The SLA may include clauses including attributes. The SLA analysis may further include receiving selection of a grouping option for the SLA clauses, receiving selection of a sub-grouping option for the SLA clauses, and analyzing the attributes of the SLA clauses based on the selected grouping option and the selected sub-grouping option. The SLA analysis may further include receiving selection of a minimum status of the SLA, evaluating the analyzed SLA clauses based on the selected minimum status, and identifying the SLA clauses based on the analysis related to the selected grouping option and the selected sub-grouping option, and based on the evaluation related to the selected minimum status. | 05-12-2016 |
20160132799 | LIST HYGIENE TOOL - A computer-implemented method of assessing the veracity of a list of email addresses for use with an e-mail messaging campaign is described. The method comprises: receiving the list of email addresses; categorising and marking any email addresses from the received list of email addresses which are considered to have predetermined email address problems; each marked email address being assigned a category of problem; associating each marked email address with a score, wherein the score is dependent on the severity of risk associated with the assigned category; calculating a cumulative score of all of the marked email addresses; and determining, in view of the cumulative score of the marked email addresses, whether the list of email addresses is safe for use for the email messaging campaign. | 05-12-2016 |
20160140466 | DIGITAL DATA SYSTEM FOR PROCESSING, MANAGING AND MONITORING OF RISK SOURCE DATA - A method and system for triaging and monitoring a risk source based on risk categorization. The system comprising a risk management server comprising a risk triage module configured to identify a risk source, receive information associated with the risk source, determine a category risk of the risk source, probe an inherent risk of the risk source, and configure scorecard monitoring for the risk source. The system further comprises a communications interface communicatively coupled to one or more client devices. | 05-19-2016 |
20160162820 | Governance, Risk, and Compliance (GRC) Cloud Services - Governance, risk, and compliance (GRC) functionality is implemented in a cloud environment utilizing logic provided by a function library that is present within an underlying in-memory database layer. In some embodiments, the GRC logic of the in-memory database function library is expressed in a language (e.g., C++) agnostic to that of an overlying application layer(s). In other embodiments, the in-memory database function library may be expressed in a specialized application code (e.g., ABAP of SAP SE) that is utilized by an application/application layer designed to interact with the in-memory database (e.g., HANA of SAP SE). In such embodiments the logic of the function library may be consumed (e.g. by the in-memory database engine) utilizing a function afforded by that specialized language. Particular embodiments may check for Segregation of Duties (SoD) violations based upon user and risk information input to the system. | 06-09-2016 |
20160171398 | Predictive Model Development System Applied To Enterprise Risk Management | 06-16-2016 |
20160171415 | CYBERSECURITY RISK ASSESSMENT ON AN INDUSTRY BASIS | 06-16-2016 |
20160180264 | RETENTION RISK DETERMINER | 06-23-2016 |
20160180265 | MOBILE ASSESSMENT TOOL | 06-23-2016 |
20160180291 | RETENTION RISK MITIGATION SYSTEM | 06-23-2016 |
20160180477 | TECHNIQUES FOR ANALYZING OPERATIONS OF ONE OR MORE RESTAURANTS | 06-23-2016 |
20160189068 | RISK INFORMATION PROCESSING METHOD AND SERVER DEVICE - A risk information processing method used in a risk information processing system that manages a degree of risk at a spot where a moving object is located includes: storing, as risk information in a storage, a degree of risk for a combination of spot and situation; and estimating first risk information for a first combination for which a degree of risk has not been input by using three or more pieces of risk information including degrees of risk for a second combination whose spot is the same as the first combination and whose situation is different from the first combination, for a third combination whose situation is the same as the first combination and whose spot is different from the first combination, and for a fourth combination whose situation is the same as the second combination and whose spot is the same as the third combination. | 06-30-2016 |
20160192216 | ADAPTIVE PREDICTION AND REAL TIME MONITORING OF BEACONS - A system and/or method may be provided to enable a server to monitor a plurality of wireless beacons that are deployed by a merchant in a location, such as a merchant store, a car dealership, a vehicle, a hotel, a casino, a theme park, etc. More specifically, provided are methods to enable a server to estimate a remaining lifetime for each of the monitored wireless beacons, and based on the estimated remaining lifetime, to predict a business effect assuming a failure of each of the monitored wireless beacons. Such predicted business effect may be communicated between the merchant and the server so as to let the merchant be aware of any business effect that may occur in a short-term future. | 06-30-2016 |
20160196513 | COMPUTER IMPLEMENTED FRAMEWORKS AND METHODOLOGIES FOR ENABLING CLIMATE CHANGE RELATED RISK ANALYSIS | 07-07-2016 |
20160196514 | DETECTING BUSINESS ANOMALIES UTILIZING INFORMATION VELOCITY AND OTHER PARAMETERS USING STATISTICAL ANALYSIS | 07-07-2016 |
20160196515 | DETECTING BUSINESS ANOMALIES UTILIZING INFORMATION VELOCITY AND OTHER PARAMETERS USING STATISTICAL ANALYSIS | 07-07-2016 |
20160196516 | METHODS AND APPARATUS FOR ANALYSIS OF STRUCTURED AND UNSTRUCTURED DATA FOR GOVERNANCE, RISK, AND COMPLIANCE | 07-07-2016 |
20160196517 | ENGINE, SYSTEM AND METHOD OF PROVIDING AUTOMATED RISK MITIGATION | 07-07-2016 |
20160203425 | Supply Chain Risk Mitigation System | 07-14-2016 |
20160253607 | Risk Measure-Based Decision Support Tool For Reservoir Development | 09-01-2016 |
20160379144 | INFORMATION PROCESSING SYSTEM AND FAILURE PREDICTION MODEL ADOPTION DETERMINING METHOD - An information processing system includes at least one information processing apparatus. The information processing system includes a provisional cost calculator configured to apply failure history information to a failure prediction model to provisionally calculate a cost of the failure prediction model, the failure history information expressing failure history of at least one electronic device in which a failure has occurred, the failure prediction model including a symptom detection method for detecting a symptom of a failure to occur in the electronic device in association with a preventive action for preventing the failure to occur in the electronic device; and an adoption determiner configured to determine to adopt the failure prediction model by which a profit can be obtained, based on a result of the provisional calculation. | 12-29-2016 |
20170236077 | RELATIONSHIPS AMONG TECHNOLOGY ASSETS AND SERVICES AND THE ENTITIES RESPONSIBLE FOR THEM | 08-17-2017 |
20170236078 | NON-INTRUSIVE TECHNIQUES FOR DISCOVERING AND USING ORGANIZATIONALRELATIONSHIPS | 08-17-2017 |
20170236080 | SYSTEMS, STRUCTURES, AND PROCESSES FOR INTERCONNECTED DEVICES AND RISK MANAGEMENT | 08-17-2017 |
20170236234 | RISK MANAGEMENT METHOD AND SYSTEM FOR A LAND TRANSPORATION SYSTEM | 08-17-2017 |
20180025302 | Computer-Implemented Engineering Review of Energy Consumption By Equipment | 01-25-2018 |
20190147376 | METHODS AND SYSTEMS FOR RISK DATA GENERATION AND MANAGEMENT | 05-16-2019 |
20190147377 | SYSTEM AND METHOD FOR PROCESSING INFORMATION AND MENTORING PEOPLE | 05-16-2019 |
20190147379 | RISK ASSESSMENT AND MITIGATION PLANNING, SYSTEMS AND METHODS | 05-16-2019 |
20220138645 | METHOD AND SYSTEM FOR FACILITATING SYSTEMATIC ESCALATION OF AN EVENT IN AN ORGANIZATIONAL HIERARCHY - Disclosed herein is method and system for facilitating systematic escalation of information related to an event in an organizational hierarchy. The system extracts organization data pertaining to plurality of events from plurality of data sources associated with an organization. Each of the plurality of events is categorized into a category of plurality of categories. For each event belonging to each category a criticality score is assigned based on the content of each event. Each category is also assigned a criticality threshold. Once, it has been determined that the event must be escalated, the system determines one or more entities involved in the event. The system then identifies first point of contact from the organizational hierarchy database to whom the event must be escalated. Post escalating to the first point of contact, the system monitors for predefined time-period, a resolve status of the event. | 05-05-2022 |
20220138646 | DATA PROCESSING SYSTEMS AND METHODS FOR BUNDLED PRIVACY POLICIES - Data processing systems and methods, according to various embodiments, are adapted for determining an applicable privacy policy based on various criteria associated with a user and the associated product or service. User and product criteria may be obtained automatically and/or based on user input and analyzed by a privacy policy rules engine to determine the applicable policy. Text from the applicable policy can then be presented to the user. A default policy can be used when no particular applicable policy can be identified using by the rules engine. Policies may be ranked or prioritized so that a policy can be selected in the event the rules engine identifies two, conflicting policies based on the criteria. | 05-05-2022 |