MindMap Gallery 07Risk management processes, systems and methods
The 23-year club strategy and risk management process include: 1 Gather initial information for risk management 2. Conduct risk assessment 3. Develop a risk management strategy ·4Propose and implement risk management solutions ,5.Supervision and improvement of risk management
Edited at 2023-06-08 23:54:16El cáncer de pulmón es un tumor maligno que se origina en la mucosa bronquial o las glándulas de los pulmones. Es uno de los tumores malignos con mayor morbilidad y mortalidad y mayor amenaza para la salud y la vida humana.
La diabetes es una enfermedad crónica con hiperglucemia como signo principal. Es causada principalmente por una disminución en la secreción de insulina causada por una disfunción de las células de los islotes pancreáticos, o porque el cuerpo es insensible a la acción de la insulina (es decir, resistencia a la insulina), o ambas cosas. la glucosa en la sangre es ineficaz para ser utilizada y almacenada.
El sistema digestivo es uno de los nueve sistemas principales del cuerpo humano y es el principal responsable de la ingesta, digestión, absorción y excreción de los alimentos. Consta de dos partes principales: el tracto digestivo y las glándulas digestivas.
El cáncer de pulmón es un tumor maligno que se origina en la mucosa bronquial o las glándulas de los pulmones. Es uno de los tumores malignos con mayor morbilidad y mortalidad y mayor amenaza para la salud y la vida humana.
La diabetes es una enfermedad crónica con hiperglucemia como signo principal. Es causada principalmente por una disminución en la secreción de insulina causada por una disfunción de las células de los islotes pancreáticos, o porque el cuerpo es insensible a la acción de la insulina (es decir, resistencia a la insulina), o ambas cosas. la glucosa en la sangre es ineficaz para ser utilizada y almacenada.
El sistema digestivo es uno de los nueve sistemas principales del cuerpo humano y es el principal responsable de la ingesta, digestión, absorción y excreción de los alimentos. Consta de dos partes principales: el tracto digestivo y las glándulas digestivas.
Risk management processes, systems and methods
risk management process
1. Collect initial information for risk management
It is necessary to extensively and continuously collect internal and external initial information related to the enterprise's risks and risk management, including historical data and future forecasts.
The division of responsibilities for collecting initial information should be assigned to relevant functional departments and business units.
2. Conduct risk assessment
step
Risk identification
Find out whether and what risks exist in each business unit, various important business activities and important business processes of the enterprise. Risk type
Risk Analysis
Clearly define and describe the identified risks and their characteristics, and analyze and describe the likelihood of risk occurrence and the conditions under which the risk occurs. Possibility of risk occurrence
Risk Assessment
The degree of impact on the company's achievement of goals, the value of risks, etc. influence level
Methods and applications
How to implement
Qualitative and quantitative methods should be combined for risk identification, analysis, and evaluation.
Risk analysis should include analysis of the relationship between risks so that risks can be managed in a unified and centralized manner from a risk strategy perspective.
Draw a risk coordinate map, compare various risks, and initially determine the order and strategy for managing various risks.
who will implement
Risk assessment should be implemented by relevant functional departments and business units of the enterprise organization, or intermediaries with strong professional capabilities can also be hired.
Dynamic supervision
Enterprises should implement dynamic management of risk management information.
3. Develop a risk management strategy
Risk preferences and risk tolerances are uniformly determined based on different business characteristics.
4. Propose and implement risk management solutions
External solution: outsourcing
Internal Solutions: Operation of the Risk Management System
5. Supervision and improvement of risk management
Enterprises should focus on major risks, major events and major decisions, important management and business processes, supervise the implementation of initial risk management information, risk assessments, risk management strategies and risk management solutions, and based on the problems discovered through supervision and Improve risk management measures in the face of new risk factors.
Supervision method
Stress testing, return testing, walk-through testing, risk control self-assessment
Division of responsibilities for supervision and improvement
Relevant departments and business units of the enterprise
Self-examination and inspection of risk management work should be carried out regularly, and reports should be submitted to the enterprise risk management functional department in a timely manner.
Enterprise risk management function
Regularly inspect the risk management situation of each department, evaluate risk management solutions across departments and business units, and report to the general manager of the enterprise or the senior management personnel entrusted by him to be in charge of risk management work.
Corporate internal audit department
The risk management work of each functional department (including the risk management functional department) should be supervised and evaluated at least once a year, and the supervision and evaluation report should be submitted to the board of directors or the risk management committee and audit committee under the board of directors.
risk management system
Risk management organizational function system
Standardized corporate governance structure (board of directors)
Review and submit the annual corporate comprehensive risk management work report to the general meeting of shareholders;
Determine the overall corporate risk management objectives, risk preferences, and risk tolerance, and approve risk management strategies and major risk management solutions;
Understand and master the major risks faced by the enterprise and its risk management status, and make decisions to effectively control risks;
Approving judgment standards or mechanisms for major decisions, major risks, major events and important business processes;
Approve risk assessment reports for major decisions;
Approve the risk management supervision and evaluation audit report submitted by the internal audit department;
Approving the risk management organizational structure and its responsibilities plan;
Approve risk management measures to correct and deal with any risky decisions made by any organization or individual that exceed the risk management system;
Supervise the cultivation of enterprise risk management culture;
Approve or decide on other major matters related to comprehensive risk management.
second line of defense
risk management committee
Submit a comprehensive risk management annual report;
Review risk management strategies and major risk management solutions;
Review the judgment standards for major decisions, major risks, major events and important business processes;
Review risk assessment reports for major decisions;
Review the comprehensive risk management supervision and evaluation audit report submitted by the internal audit department;
Review the risk management organizational structure and its responsibilities plan;
Handle other matters related to comprehensive risk management authorized by the board of directors.
Risk management function department
Study and propose a comprehensive risk management work report;
Research and propose judgment standards and mechanisms for major decisions, major risks, major events and important business processes across functional departments;
Research and propose risk assessment reports for major cross-functional decisions;
Research and propose risk management treatments and cross-functional major risk management solutions;
Responsible for evaluating the effectiveness of comprehensive risk management and researching and proposing improvement plans for comprehensive risk management;
Responsible for organizing and establishing risk management information systems;
Responsible for organizing and coordinating the daily work of comprehensive risk management;
Responsible for guiding and supervising relevant functional departments, business units and holding subsidiaries to carry out comprehensive risk management work;
Handle other related work of risk management.
third line of defense
The Audit Committee
The internal audit department is responsible to the audit committee, and the audit committee is responsible to the board of directors;
In terms of risk management, the internal audit department is mainly responsible for researching and proposing a comprehensive risk management supervision and evaluation system, formulating relevant supervision and evaluation systems, carrying out supervision and evaluation, and issuing supervision and evaluation audit reports;
Meet regularly with external and internal auditors without management attendance;
If differences of opinion among members of the audit committee cannot be reconciled internally, they should be submitted to the board of directors for resolution;
The audit committee should review its authority and effectiveness every year and report to the board of directors on necessary personnel changes;
One of the main activities of the audit committee is to verify compliance with external reporting;
It helps to maintain the independence of internal audit and review the status, scope of functions, technical capabilities, and professional responsibilities of internal audit in the organization.
first line of defense
Other functional departments and business units of the enterprise
risk management strategy
Overall positioning and role of risk management strategy
Overall positioning: connecting the past and the next, reducing the possibility of strategic implementation errors, overall strategy, and guiding the overall situation.
Role: Ensure the realization of the company's business objectives, connect the company's overall business strategy and operational activities, and guide all risk management activities of the company.
Components of a Risk Management Strategy
Determine risk appetite and risk tolerance
Risk appetite and risk tolerance are developed for the company's material risks;
Risk appetite for major risks is a major corporate decision and should be determined by the board of directors.
Factors to consider: individual risks, interrelationships, overall shape, industry factors
risk measurement
The key lies in quantification: risk preference can only be qualitative, but risk tolerance must be quantitative.
risk measurement method
Maximum possible loss: refers to the maximum loss that may be caused after a risk event occurs (generally used when the probability of occurrence cannot be judged or there is no need to judge the probability);
Probability value: refers to the probability of a risk event occurring or causing a loss;
Expected value: Probability weighted average, which combines the two methods of probability and maximum loss;
Volatility: reflects the degree of dispersion of data;
Value at risk: refers to the maximum loss that is expected to occur within a given time period and a given confidence interval under normal market conditions; Advantages: Universal, intuitive, and flexible; Disadvantages: small applicable risk range, strict data requirements, difficult calculations, and powerless against fat-tail effects.
Intuitive method: Expert opinion method (used when statistical data are insufficient or the results to be measured include people's preferences).
Difficulties in risk quantification: method errors, data, information systems, integrated management
Principles for determining risk management effectiveness standards
It should be aimed at the company's major risks and be able to reflect the current status of the company's major risk management;
It should be applied in the enterprise's risk assessment and adjusted at any time according to changes in risks;
It should be used to measure the operating effectiveness of the comprehensive risk management system.
Choose risk management strategy tools
Risk exposure: Unidentified risks may be immaterial
Risk avoidance: avoid, stop or quit, completely insulate
Risk transfer: insurance, non-insurance risk transfer, risk securitization
Risk transformation: does not reduce total risk (strategic adjustments, use of derivatives, such as relaxing credit standards for transactions, increasing accounts receivable, expanding sales)
Risk hedging: financial derivatives, diversified operations, various customer groups
Risk compensation: loss compensation (accrued reserves, contingency capital, transaction price plus risk premium)
Risk control: reduce losses and reduce probabilities
Resource allocation for risk management
Allocate resources to significant risks that require priority management.
Prioritize risk management
Risk management strategy review
Risk management strategies must be adjusted with changes in corporate operating conditions, changes in business strategies, and changes in the external environment.
Risk management measures
Risk management overview
Concept: Enterprises use financial means to implement risk management strategies. (Withdrawal of risk reserves, purchase of insurance, hedging, risk financing, etc.)
The necessity of risk financial management: Risk financial management is an important part of comprehensive risk management; risk financial management can target uncontrollable risks.
Features
1. It does not change the possibility of the risk occurring, nor does it change the degree of direct loss caused by the risk;
2. Risk financial management requires judging the pricing of risks, so the quantitative standards are high;
3. The scope of application does not include goodwill, etc., and it is difficult to eliminate losses caused by strategic mistakes;
4. It is highly technical and inherently risky, and improper use can easily cause heavy losses.
Principles and requirements for choosing risk financial strategies and plans
1. Consistent with the enterprise’s overall risk management strategy;
2. Match the nature of the risks faced by the enterprise;
3. Requirements for selecting risk financial management tools: qualification requirements, operability, legal and regulatory environment, familiarity with the enterprise, risk characteristics of risk financial management tools, etc. Different risk management methods may apply to the same risk;
4. Balance costs and benefits.
Main risk management measures
Loss incident management
loss financing
Anticipated loss financing: belongs to working capital;
Unexpected loss financing: belongs to risk capital.
Post-event management
venture capital
Risk capital is the capital required by a company to compensate for financial losses caused by risks, in addition to operating capital.
Risk capital is the amount of money required to bring the probability of a company's bankruptcy below a given level and therefore depends on the company's risk appetite.
emergency capital
A financing option, which may not be exercised, is a financial contract. Financing can be obtained if risks occur, but rights fees must be paid if no risks occur. (Such as letters of credit, revolving credit instruments, etc.)
Contingency capital is a financial contract that stipulates that a company has the right to raise equity or loans (or other paid-in capital items on the balance sheet) from a contingency capital provider within a certain period of time and upon the occurrence of a specified event. And pay fees to the capital provider on a time basis for this purpose. A specific event is called a triggering event.
Insurance
It is a traditional means of risk transfer. Insurable risks are pure risks, while opportunity risks are not insurable.
Professional self-insurance
A captive insurance company is an affiliate of a non-insurance company.
Advantages and Disadvantages
advantage
Reduce operating costs; improve company cash flow; guarantee more projects; fair rate levels; guarantee stability; direct reinsurance; improve service levels; reduce regulatory restrictions; foreign tax deductions and circulation transfers.
shortcoming
Increased internal management costs; increased capital investment; insufficient loss reserves; reduced availability of other insurance.
internal control system
COSO Committee Internal Control Framework
my country's internal control standard system
Five elements of internal control "Basic Standards for Enterprise Internal Control"
control environment
(1) Establish a standardized corporate governance structure and rules of procedure.
(2) The board of directors is responsible for the establishment, improvement and effective implementation of internal control. The Board of Supervisors supervises the establishment and implementation of internal controls by the Board of Directors. Managers are responsible for organizing and leading the daily operation of the enterprise's internal controls.
(3) An audit committee shall be established under the board of directors. The Audit Committee is responsible for reviewing the company’s internal controls and supervising the effective implementation of internal controls and Internal control self-evaluation, coordination of internal control audits and other related matters. The person in charge of the audit committee should have Appropriate independence, good professional ethics and professional competence.
Corporate governance structure: 1.General requirements 2. Division of labor 3. Audit Committee
(4) Set up internal institutions, clarify responsibilities and authorities, and assign rights and responsibilities to each responsible unit.
(5) Strengthen internal audit work and ensure the independence of the internal audit organization, staffing and work. The internal audit institution shall supervise and inspect the effectiveness of internal controls in conjunction with internal audit supervision. The internal audit institution shall report internal control deficiencies discovered during supervisory inspections in accordance with the enterprise's internal audit procedures; The company has the right to report directly to the board of directors, its audit committee and the board of supervisors any major deficiencies in internal control discovered during supervisory inspections.
Internal organization: 4.General requirements 5. Internal audit
(6) Formulate and implement human resources policies for sustainable development.
(7) Take professional ethics and professional competence as important criteria for selecting and hiring employees, and effectively strengthen employee training and Continue education and continuously improve the quality of employees.
(8) To strengthen cultural construction, directors, supervisors, managers and other senior managers should play a leading role in the construction of corporate culture. (company culture)
(9) Strengthen legal education and enhance the legal awareness of directors, supervisors, managers and other senior managers and employees.
6.7 Human Resources 8. Corporate culture construction 9. Legal education
risk assessment
(1) According to the set control objectives, collect relevant information comprehensively, systematically and continuously, and conduct risk assessment in a timely manner.
(2) Accurately identify internal risks and external risks related to achieving control objectives, and determine the corresponding risk tolerance. Risk tolerance is the risk limit that an enterprise can bear, including overall risk tolerance and acceptable risk levels at the business level.
(3) Identify internal risks.
(4) Identify external risks.
(5) Use a combination of qualitative and quantitative methods to analyze and rank the identified risks according to their likelihood of occurrence and their degree of impact, Determine the focus and priority risks for control.
(6) Based on the results of risk analysis and risk tolerance, weigh risks and benefits and determine risk response strategies.
(7) Comprehensive use of risk response strategies to achieve effective control of risks.
(8) Combined with different development stages and business expansion situations, continue to collect information related to risk changes, conduct risk identification and analysis, and timely adjust risk response strategies.
control activities
control measures
(1) Incompatible job separation control
Incompatible positions generally include: authorization and approval and business handling, business handling and accounting records, accounting records and property custody, business handling and audit inspection, authorization and approval and supervision and inspection, etc.
(2) Authorization approval control
Authorization approval means that when a unit handles various economic businesses, it must undergo authorization approval through prescribed procedures. Strictly control special authorization. Enterprises should implement a collective decision-making approval or joint signature system for major businesses and matters. No individual may make decisions alone or change decisions without authorization.
(3) Accounting system control
① Set up accounting institutions in accordance with the law and staff them with accounting practitioners; ② Establish a job responsibility system for accounting work, carry out a scientific and reasonable division of labor among accounting personnel, and enable them to supervise and restrict each other; ③Obtain and fill in original vouchers in accordance with regulations; ④ Design a good voucher format; ⑤ Number the vouchers consecutively; ⑥ Clarify the processing procedures for accounting vouchers, accounting books and financial accounting reports to ensure the authenticity and completeness of accounting information; ⑦ Clarify the responsibilities for the binding and storage procedures of vouchers; ⑧ Set up accounts reasonably, register accounting books, and perform double-entry accounting; ⑨ Prepare, submit and keep financial reports in accordance with the requirements of the Accounting Law and the national unified accounting standards system.
(4) Property protection control
Establish a daily property management system and a regular inventory system, and take measures such as property records, physical storage, regular inventory, and account verification to ensure property safety. Businesses should strictly limit access to and handling of property by unauthorized personnel.
(5) Budget control
Implement a comprehensive budget management system, clarify the responsibilities and authority of each responsible unit in budget management, standardize budget preparation, approval, release and execution procedures, and strengthen budget constraints.
(6) Operation analysis and control
Establish an operation analysis system, conduct regular operation analysis, discover existing problems, identify the causes in a timely manner and make improvements.
(7) Performance evaluation control
Establish and implement a performance appraisal system to conduct regular appraisals and objective evaluations of the performance of each responsible unit and all employees within the enterprise.
(8) Enterprises should comprehensively use control measures based on internal control objectives, combined with risk response strategies, to implement effective control over various businesses and matters.
(9) Enterprises should establish a major risk early warning mechanism and an emergency response mechanism, clarify risk early warning standards, and ensure that emergencies are handled promptly and properly.
Information and communication
(1) Establish an information and communication system, clarify the collection, processing and transmission procedures of internal control-related information, ensure timely communication of information, and promote the effective operation of internal control.
(2) Reasonably screen, check, and integrate the various internal and external information collected to improve the usefulness of the information.
(3) Communicate and feedback internal control-related information within the enterprise and between the enterprise and the outside world. Important information should be communicated to the board of directors, supervisory board and management in a timely manner.
(4) Use information technology to promote the integration and sharing of information and give full play to the role of information technology in information and communication.
(5) Establish an anti-fraud mechanism and adhere to the principle of equal emphasis on punishment and prevention, focusing on prevention ① Embezzle or misappropriate corporate assets without authorization or use other illegal methods to obtain improper benefits; ② False records, misleading statements or major omissions in financial accounting reports and information disclosure; ③Abuse of power by directors, supervisors, managers and other senior managers; ④ Relevant institutions or personnel collude to commit fraud.
(6) Establish a reporting and complaint system and a whistleblower protection system. The reporting and complaint system and whistleblower protection system should be communicated to all employees in a timely manner.
monitor
(1) Develop an internal control and supervision system to clarify the responsibilities and authority of the internal audit institution and other internal institutions in internal supervision. Daily supervision: routine and continuous supervision and inspection; Special supervision: targeted supervision and inspection of one or certain aspects of internal control. The scope and frequency of special supervision should be determined based on the results of risk assessment and the effectiveness of daily supervision.
(2) Develop internal control defect identification standards, which include design defects and operational defects; For major deficiencies discovered during internal supervision, the relevant responsible units or responsible persons shall be held accountable.
(3) Regularly conduct self-evaluation of the effectiveness of internal control and issue an internal control self-evaluation report. ① The internal audit department or specialized agency can be authorized to be responsible for the specific organization and implementation of internal control evaluation; ② Internal control deficiencies are divided into major deficiencies, important deficiencies and general deficiencies according to their degree of impact; ③Major defects shall be finally determined by the board of directors.
(4) Properly preserve relevant records or materials during the establishment and implementation of internal controls to ensure the verifiability of the establishment and implementation of internal controls.
Risk management information system (omitted)
Risk management techniques and methods (4 3 4)
Qualitative
Brainstorming
Meaning: Organize small face-to-face meetings of experts.
Scope of application: Give full play to expert opinions in the risk identification stage and conduct qualitative analysis of risks.
advantage
1) Stimulates the imagination of experts and helps discover new risks and new solutions;
2) Involvement of major stakeholders facilitates comprehensive communication;
3) Fast and easy to carry out.
limitation
1) Participants may lack the necessary technology or knowledge to make effective suggestions;
2) The implementation process of the brainstorming method and the opinions put forward by participants are easily scattered, making it difficult to ensure comprehensiveness;
3) Special circumstances may arise during group discussions, causing some people with important opinions to remain silent while others become the protagonist of the discussion.
Delphi method
Meaning: The Delphi method is also known as the expert opinion method. Experts express their opinions individually and anonymously. At the same time, as the process progresses, they have the opportunity to understand the opinions of other experts.
advantage
1) Because opinions are anonymous, experts are more likely to express unpopular opinions;
2) All opinions have the same weight to prevent the opinions of important people from dominating;
3) Experts do not have to gather in one place at one time, making it easier to implement;
4) The final opinions formed by experts are widely representative.
limitation
1) The opinions of authoritative people will inevitably affect the opinions of others;
2) Some experts may be unwilling to express opinions that are different from others due to human feelings;
3) Some experts may be unwilling to modify their original opinions out of pride;
4) The process is complicated and takes a long time, which is the main shortcoming of the Delphi method.
flowchart analysis
Meaning: Investigate and analyze each stage and link of the process one by one to discover potential risks.
advantage
It is clear, easy to operate, and the larger the organization, the more complex the process, and the more superior it can be.
limitation
The effectiveness of this method depends on the level of expertise of the professional.
risk assessment diagram
Meaning: Plot risks on a graph according to their likelihood and severity. (risk coordinate chart)
advantage
Simple qualitative method, intuitive and clear.
limitation
1) Subjective judgments need to be made on risk importance level standards, risk occurrence likelihood, consequence severity, etc., which may affect the accuracy of use;
2) Risk importance levels are determined through mutual comparison, so the importance level of the overall risk cannot be obtained through mathematical operations;
3) If it is necessary to further explore the causes of risks, this method is too simple and lacks empirical proof and data support.
Quantitative
Markov analysis
Meaning: Usually used to analyze repairable complex systems that exist in multiple states (including various degraded use states). (Probability of occurrence of various states)
advantage
Ability to calculate the probability of a system with repairability and multiple degraded states.
limitation
1) Whether it is a failure or maintenance, it is assumed that the probability of state change is fixed;
2) All events are statistically independent, so future states are independent of all past states, unless the two states are closely connected;
3) Need to understand the various probabilities of state changes;
4) The knowledge about matrix operations is relatively complex and difficult for non-professionals to understand.
decision tree method
Meaning: Use the principles of probability theory to analyze the expected returns of uncertain plans.
advantage
1) Provide a clear graphical explanation of the details of the decision-making problem;
2) Be able to calculate the optimal path to a situation.
limitation
1) Large decision trees may be too complex and difficult to communicate with others;
2) There may be a tendency to oversimplify the environment in order to be able to represent it in a tree diagram.
sensitivity analysis
Meaning: When various uncertain factors of a research project change to a certain extent, a method is used to calculate the rate of change and sensitivity of its main economic indicators. (tornado diagram)
advantage
Provide valuable reference information for decision makers; clearly indicate the direction for risk analysis; help enterprises formulate emergency plans.
limitation
1) The required data are often lacking and cannot provide reliable parameter changes;
2) The analysis uses formula calculations and does not consider the probability of changes in various uncertain factors in the future.
Qualitative Quantitative
scenario analysis
What it means: Simulate scenarios to anticipate how threats and opportunities might occur.
advantage
It can provide relatively accurate simulation results for situations that will not change much in the future.
limitation
1) When there is large uncertainty, simulating some scenarios may not be realistic enough;
2) There are high requirements for the validity of data and the ability of analysts and decision-makers to develop realistic scenarios;
3) As a decision-making tool, the scenarios used may lack a sufficient basis and the data may be random.
event tree analysis
What it means: A diagrammatic technique for representing mutually exclusive consequences after an initial event occurs.
advantage
1) ETA uses clear graphics to show potential scenarios after the initial matters analyzed and the impact of mitigating the success or failure of the system or function;
2) It explains timing, dependencies, and cumbersome domino effects;
3) It vividly embodies the sequence of events.
limitation
1) All potential initial events must be identified, and some important initial events may be missed;
2) The event tree only analyzes the success and failure status of a certain system, and does not consider delayed success or recovery matters;
3) Any path depends on what happened at previous branch points on the path.
statistical inference
meaning
·Forward projection is to infer the future based on historical experience and data.
·Backcasting is to connect unknown imaginary events and consequences with a known event and consequences, and attribute future risk events to the initial event that caused the risk event for which there is data, so as to evaluate and evaluate the risk. analyze.
·The side extrapolation method is to use data from similar projects to extrapolate.
advantage
1) Simple and easy to implement when the data is sufficient and reliable;
2) The results are highly accurate and have a wide range of applications.
limitation
1) Since the premises and environment of historical events have changed, they may not necessarily apply today or in the future;
2) The causal relationship of events is not considered, and sometimes expert or collective experience correction must be added to the processing of historical data.
Failure modes, effects and hazard analysis method
Meaning: Analyze each process one by one during the product design stage, find out potential failure modes and analyze the results, so as to take proactive measures.
Scope of application: It is suitable for qualitative or quantitative analysis of failure modes, effects and hazards, and can also provide data support for other risk identification methods.
advantage
1) Widely applicable to the analysis of failure modes of human equipment and systems as well as hardware, software and programs;
2) Identify component failure modes, their causes and impact on the system, and express them in a readable form;
3) Problems can be found in the early stages of design, thus avoiding expensive equipment modifications;
4) Identify individual failure modes to suit system safety needs.
limitation
1) Only a single failure mode can be identified, and multiple failure modes cannot be identified at the same time;
2) Unless fully controlled and focused, this method is time-consuming and expensive.