Guide to Optimal Operational Risk and BASEL II

by ;
Edition: 1st
Format: Hardcover
Pub. Date: 2005-11-01
Publisher(s): Auerbach Public
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $145.00

Buy New

Usually Ships in 5-7 Business Days
$144.86

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:180 Days access
Downloadable:180 Days
$51.48
Online:365 Days access
Downloadable:365 Days
$60.84
Online:1825 Days access
Downloadable:Lifetime Access
$93.59
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$51.48*

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Guide to Optimal Operational Risk and Basel II presents the key aspects of operational risk management that are also aligned with the Basel II requirements. This volume provides detailed guidance for the design and implementation of an efficient operational risk management system. It contains all elements of assessment, including operational risk identification, measurement, modeling, and monitoring analysis, along with evaluation analysis and the estimation of capital requirements.The authors also address the managing and controlling of operational risks including operational risk profiling, risk optimization, cost & optimal resource allocation, decision-making, and design of optimal risk policies.Divided into four parts, this book begins by introducing the idea of operational risks and how they affect financial organizations. This section also focuses on the main aspects of managing operational risks. The second part focuses on the requirements of an operational risk management framework according to the Basel II Accord. The third part focuses on all stages of operational risk assessment, and the fourth part focuses on the control and management stages. All of these stages combine to implement efficient and optimal operational risk management systems.

Table of Contents

Preface xv
Acknowledgments xxv
About the Authors xxvii
Part I Operational Risk and Its Management
Operational Risks in Financial Organizations
1(1)
Main Aspects of Operational Risk Management
1(2)
Operational Risks in Financial Organizations
3(40)
Introduction
3(4)
Operational Risks in Financial Organizations
7(11)
Defining Operational Risks
8(2)
Existence of Operational Risks in Financial Organizations
10(2)
Organization
12(1)
Processes and Policies
13(1)
Systems and Technology
13(1)
People
14(1)
External Events
15(2)
Interactions between Operational Risks
17(1)
Characteristics of Operational Risks
18(3)
Operational Risk Event Types
21(5)
Employee Risks in Banking Organizations
26(5)
Operational Risks and IT
31(8)
IT Security
36(3)
Summary
39(1)
References
40(3)
Main Aspects of Operational Risk Management
43(48)
Introduction
43(2)
Main Aspects of Operational Risk Management
45(16)
Operational Risk Management Best Practices
48(1)
Setting Policies
49(2)
Operational Risk Identification
51(1)
Business Processes
52(1)
Operational Risk Measurement
52(1)
Operational Risk Evaluation and Optimization Analysis
53(1)
Economic Capital
54(1)
Reporting
54(2)
Exposure Management
56(1)
Top-Down versus Bottom-Up Operational Risk Management Approaches
56(3)
Value Added in Managing Operational Risks
59(2)
Operational Risk Management Framework
61(2)
Quantification of Operational Risks
63(7)
Loss Events
67(1)
Operational Risk Data
68(2)
Testing and Verification
70(5)
Operational Risk Management Audits
71(1)
Operational Risk Management Reviews
72(1)
Operational Risk Management Back Testing and Stress Testing
73(2)
Enterprisewide Risk Management
75(1)
Operational Risk Management Concerns
76(4)
Business Continuity Planning
78(1)
Customer Complaints
78(1)
Outsourcing
79(1)
Money Laundering
79(1)
Fraud
79(1)
Settlement Risk
79(1)
Communication
80(1)
Key Players and Elements for Implementing Effective Operational Risk Management
80(5)
Summary
85(2)
References
87(2)
Part II Operational Risk and Basel II
Operational Risk in Basel II
89(1)
Advanced Measurement Approach
89(2)
Operational Risk in Basel II
91(42)
Introduction
91(2)
The 1988 Basel Accord versus the Basel II Accord
93(4)
Operational Risk Management According to Basel II
97(5)
Main Objectives, Key Drivers, and Benefits of Basel II
99(3)
The Three Pillars of Basel II
102(1)
Pillar 1: Minimum Capital Requirements
103(7)
Measurement Approaches for Operational Risks
104(1)
The Basic Indicator Approach
104(1)
The Standardized Approach
105(3)
The Alternative Standardized Approach (ASA)
108(1)
Advanced Measurement Approach
108(1)
Qualifying Criteria for Operational Risk Capital Calculation
109(1)
Basic Indicator Approach
109(1)
Standardized Approach
109(1)
Advanced Measurement Approach
110(1)
Factors in Selecting an Approach
110(1)
Supervisory Review Process
110(4)
The Supervisory Assessment
111(3)
Enhanced Disclosure --- Market Discipline
114(3)
Qualitative and Quantitative Disclosures
115(2)
The Ten Principles of Basel II
117(11)
Appropriate Risk Management Environment
117(2)
Risk Management
119(1)
Role of Supervisors
119(1)
Role of Disclosure
119(1)
Principle 1
119(2)
Principle 2
121(1)
Principle 3
121(2)
Principle 4
123(1)
Principle 5
124(1)
Principle 6
125(1)
Principle 7
126(1)
Principle 8
126(1)
Principle 9
127(1)
Principle 10
127(1)
The Pillars' Action Points
128(1)
Pillar 1: Capital Requirement --- Action Points
128(1)
Pillar 2: Supervisory Review --- Action Points
128(1)
Pillar 3: Market Discipline --- Action Points
129(1)
Summary
129(1)
References
130(3)
Advanced Measurement Approach
133(34)
Introduction
133(1)
Advanced Measurement Approach
134(3)
AMA Measuring System
137(6)
Quantitative Standards of the AMA
137(2)
Internal Measurement Approaches (IMAs)
139(1)
Loss Distribution Approaches (LDAs)
140(1)
Scorecard Approaches
141(2)
AMA Framework
143(6)
Elements of an AMA Framework
145(1)
Internal Operational Risk Loss Event Data
145(2)
Relevant External Operational Risk Loss Event Data
147(1)
Scenario Analysis
148(1)
Supervisory Standards of the AMA
149(1)
Qualifying Criteria for Risk Capital Calculation
150(3)
Use of Insurance under the AMA
153(5)
Summary
158(1)
References
159(2)
Part III Frameworks for Designing Efficient Operational Risk Assessment
Operational Risk Identification, Measurement, Modeling, and Monitoring Analysis
161(1)
Operational Risk Assessment via Evaluation Analysis
161(6)
Efficient Operational Risk Assessment, Control, and Management
161(3)
Key Elements of Efficient Operational Risk Assessment
164(3)
Operational Risk Identification, Measurement, Modeling, and Monitoring Analysis
167(46)
Introduction
167(1)
Operational Risk Identification
168(2)
Operational Risk and Operations Process Mapping
170(1)
Operational Risk and Performance Measurements
170(21)
Qualitative Performance
174(1)
Quantitative Performance
174(1)
Defining Key Performance Indicators for Operations
174(2)
Qualitative Operational Risks
176(1)
Quantitative Operational Risks
176(1)
Defining Key Operational Risk Indicators
176(6)
Constructing Functions for KRIs
182(1)
Constructing the Matrix of KRIs
183(2)
Tracking and Monitoring Operational Risk and Performance Information
185(1)
Minimizing Assumptions
186(1)
The Matrix of Measurements
186(2)
The Matrix of Causes, Events, and Consequences
188(1)
Losses from Causes, Events, and Consequences
188(3)
Operational Risk Modeling
191(6)
Efficient Operational Risk Modeling through Correlation Analysis
191(6)
Operational Risk Monitoring
197(14)
Efficient Operational Risks Monitoring through Correlation Analysis
197(1)
Mapping the Operational and Operational Risks Topography
198(5)
Thresholds in Monitoring Systems
203(1)
Mapping the Correlations between the Operations and Risks
204(5)
Essential Guides for Operational Risk Monitoring Management
209(2)
Summary
211(1)
References
212(1)
Operational Risk Assessment via Evaluation Analysis
213(64)
Introduction
213(2)
Operational Risk Evaluation Analysis
215(1)
Evaluating the Degree of Significance and Actual Values of Operational Risks
216(6)
Significance Value of a Cause
216(1)
Actual Value of a Cause
217(1)
Levels of Acceptance for Causes
218(1)
Significance Value of an Event
218(2)
Actual Value of an Event
220(1)
Levels of Acceptance for Events
220(1)
Significance Value of a Consequence
220(1)
Actual Value of a Consequence
221(1)
Levels of Acceptance for Consequences
222(1)
Measurements Values and Scales for Causes, Events, and Consequences
222(1)
Data Normalization
223(1)
Estimating the Significance and Actual Value of an Operation
224(1)
Beta Point for an Operational Risk or an Operation
225(2)
Estimating the Significance and Actual Value of a Beta
225(2)
Illustrating the Significance and Actual Values
227(1)
Cluster Analysis as a Tool in the Evaluation Process
228(3)
Definition of Clusters for Operational Risk and Affected Operations
229(1)
Data Used for Clustering Analysis
230(1)
Clustering Approaches in Operational Risk
231(7)
Fuzzy C-Means Clustering Approach
233(1)
Inner-Product Norms
234(2)
Extensions of the Fuzzy C-Means Algorithm Using Fuzzy Covariance Matrix
236(1)
Determination of the Number of Clusters
237(1)
Normalization in Clustering Analysis
238(1)
Equilibrium Identification Analysis for Operational Risk Management
238(2)
Trend Analysis for Operational Risk
240(4)
Trend Accumulation for the Operational Risks and Affected Operations
241(3)
Evaluating the Severity of Operational Risks and Affected Operations
244(6)
Distribution Analysis
244(1)
Mountain Surface Evaluation (MSE) Methodology
245(2)
Resulting Views from Distribution Analysis
247(3)
Estimating and Evaluating Economic Capital Reserves
250(5)
Unexpected Losses Relating to People
251(3)
Unexpected Losses Related to Systems
254(1)
Unexpected Losses Related to Processes
254(1)
Identifying Potential Losses
255(6)
Defining Potential Losses
255(1)
Potential Losses from Influences of Direct Operational Risks
256(1)
Potential Losses from Indirect Operational Risk Influences
257(1)
Representing Unexpected Performances
258(2)
Estimation of the Economic Capital of Operational Risks Using the Operational VaR
260(1)
Extreme Value Theory to Operational Risk
261(1)
Extreme Value Theory Approaches
261(6)
Block Maxima Approach
263(1)
Peaks over Threshold (POT) Approach
264(1)
Semi-parametric POT
264(1)
Unconditional Parametric POT
265(1)
Conditional Parametric Approach
266(1)
Summary
267(4)
References
271(2)
Part IV Frameworks for Designing and Implementing Efficient Operational Risk Control and Management Systems
Operational Risk Profiling
273(1)
Operational Risk Optimization
273(1)
Framework for Decision Making and Designing Optimal Risk Policies
273(4)
Controlling and Managing Operational Risks
274(3)
Operational Risk Profiling
277(36)
Introduction
277(1)
Operational Risk Profiling
278(1)
Defining the Value of Operational Risk Probability
279(3)
Operational Risk Probability
280(2)
Defining the Value of Operational Risk Impact
282(6)
Operational Risk Impact
284(1)
Impact Initiated from Operational Risk Cause
284(2)
Impact Initiated from Operational Risk Events
286(1)
Impact Initiated from Operational Risk Consequences
287(1)
The Exposure of Operations to Operational Risks
288(1)
The Operational Risk Profiling Matrix
289(1)
Operational Risk Probability, Impact, and Exposure Analysis
290(4)
Values for Monitoring the Operational Risk Profile
293(1)
Aspects for Consideration in Operational Risk Profiling
293(1)
Dividing the Risk Profile
293(1)
Defining the Elements of Risk Profiling Analysis
294(1)
Controllable Zones and Distribution Tails
294(1)
Modeling and Monitoring the Operational Risk Profile
294(1)
Clustering Analysis in Risk Profiling Analysis
295(3)
Mountain Surfaces in Operational Risk Profiling
295(1)
Centroids of Operational Risk Profiling Clusters
296(1)
Projection of Cluster Centers and Variances
296(1)
Fuzzy Set Theory and Membership Functions
297(1)
Advanced Approaches for Decision Making Using Risk Profiling Analysis
298(3)
Representations of Operational Risk Profile
301(6)
Summary
307(5)
References
312(1)
Operational Risk Optimization
313(32)
Introduction
313(1)
Operational Risk Optimization
314(1)
Optimizing Operational Risks Based on Exposure-Correlation-Significant Analysis
315(4)
Optimization Techniques in Operational Risk Control and Management
319(12)
Derivative-Based Optimization Methods for Operational Risks
320(1)
Gradient-Based Optimization
321(1)
Steepest Descent Method
322(1)
Newton's Method
323(1)
Rules in Designing Risk Optimization Techniques
324(1)
Termination Rules for Optimization Algorithms
324(1)
In Summary
325(1)
Derivative-Free Optimization Methods
325(2)
In Summary
327(1)
The Resulting Optimal Matrix
327(1)
Illustrating the Optimal Values of Operational Risks
328(3)
Defining the Cost for Optimal Operational Risk Management
331(3)
Optimizing Resource Allocation for Operational Risk Management
334(3)
Illustrating the Optimal Allocation of Resources
336(1)
Unconstrained and Constrained Optimization Analysis
337(5)
Constraints to Modify Operational Risks Levels
341(1)
Tuning, Adaptation, and Robustness of Optimal Operational Risk Systems
342(1)
Summary
342(1)
References
343(2)
Framework for Decision Making and Designing Optimal Risk Policies
345(34)
Introduction
345(1)
Planning and Scheduling Operational Risk Actions and Policies
346(8)
Planning Activities
348(1)
Scheduling Actions and Policies for Operational Risks
348(1)
Operational Risk Research
348(1)
Operational Risk Acceptance
349(1)
Operational Risk Avoidance
349(1)
Operational Risk Transfer
350(1)
Operational Risk Mitigation
350(2)
Insurance as Operational Risk Mitigant
352(1)
Scenario Analysis
353(1)
Controlling Operational Risks
354(2)
Controlling Operational Risks for Prevention and Improvements
354(1)
Controlling Operational Risks after the Thresholds Have Been Activated
355(1)
Effective Communication to Control Operational Risks
355(1)
Internal Operational Risk Control
356(3)
Guidance for Internal Control
358(1)
Business Continuity or Contingency Planning through Optimization
359(9)
Business Impact Analysis
362(2)
Recovery Strategy Formulation
364(1)
What Is the Worst-Case Scenario?
364(1)
What Operations and People Are Essential, and When?
364(1)
Development of the Business Continuity Plan
365(1)
Establishment of Alternate Sites
366(1)
Testing, Maintenance, Updating, and Implementation of the BCP
366(1)
Thresholds in Designing Business Continuity Plans
367(1)
Time and Frequency of Threshold Activation
368(1)
Effectiveness of the Business Continuity Plan
368(1)
Operational Risk Reporting
368(5)
Main Aspects of an Operational Risk Management Report
371(1)
Levels of Operational Risks and Performances
372(1)
Operational Risk Trends
372(1)
Operational Risk Distribution
372(1)
Operational Risk Probability, Impact, and Exposure
372(1)
Optimal Values of Operational Risks
372(1)
Operational Risk Management Actions
373(1)
Ongoing Review of the Thresholds
373(1)
Reviews
373(1)
Decision and Dynamic Management
373(2)
Capturing New Operational Risk Successfully
374(1)
Operational Risk Review Meetings
374(1)
Operational Risk Knowledge Base
375(1)
Summary
375(1)
References
376(3)
Concluding Remarks
379(12)
Appendix 391(4)
Index 395

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.