Scenario Construction Via Cross Impact Prof. Victor A. Bañuls Management Department Pablo de Olavide University Seville, Spain

Slides:



Advertisements
Similar presentations
Real-Time Delphi as a Tool for Scenarios Building: a case report on an aeronautical firm Denis L. Balaguer José Eduardo de C. Bezerra Rodrigo C. da Silva.
Advertisements

Scenarios and their purpose. We can either stumble into the future and hope it turns out all right or we can try and shape it. To shape it, the first.
The Use and Impact of FTA Attila Havas and Ron Johnston Institute of Economics, Hungarian Academy of Sciences, and Australian Centre for Innovation Third.
Seyedehmehrnaz Mireslami, Mohammad Moshirpour, Behrouz H. Far Department of Electrical and Computer Engineering University of Calgary, Canada {smiresla,
Chapter 10 Dealing with Uncertainty Introduction ---exacerbated by regulatory & environmental uncertainty Restructuring of the electric industry,
Design of Experiments Lecture I
Econ 140 Lecture 81 Classical Regression II Lecture 8.
Introduction to Research Methodology
20 th International Conference on Efficiency, Cost, Optimization, Simulation and Environmental Impact of Energy Systems Padova, Italy, June 2007.
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 4: Modeling Decision Processes Decision Support Systems in the.
POWER SYSTEM DYNAMIC SECURITY ASSESSMENT – A.H.M.A.Rahim, S.K.Chakravarthy Department of Electrical Engineering K.F. University of Petroleum and Minerals.
The Delphi Technique: A Tool For Long Range Travel and Tourism Planning Chapter 39 Research Methodologies.
1 The Delphi Method and Marketplaces (original 1975 reference book about Delphi on my website) Murray Turoff
Simulation.
The Hacking Game: Cross-Impact Analysis Tool
STATISTICS Statistics refers to a set of techniques that are used to transform raw data into useful information.
Scenario Construction Via Cross Impact Prof. Victor A. Bañuls Management Department Pablo de Olavide University Seville, Spain
MR2300: MARKETING RESEARCH PAUL TILLEY Unit 10: Basic Data Analysis.
Linear Regression Example Data
Research Methods in MIS Dr. Deepak Khazanchi. Objectives for the Course Identify Problem Areas Conduct Interview Do Library Research Develop Theoretical.
The Research Process. Purposes of Research  Exploration gaining some familiarity with a topic, discovering some of its main dimensions, and possibly.
Chapter 14 Risk and Uncertainty Managerial Economics: Economic Tools for Today’s Decision Makers, 4/e By Paul Keat and Philip Young.
The Academy of Public administration under the President of the Republic of Uzbekistan APPLICATION MODERN INFORMATION AND COMMUNICATION TECHNOLOGY IN DECISION.
Module 3: Business Information Systems
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
«Enhance of ship safety based on maintenance strategies by applying of Analytic Hierarchy Process» DAGKINIS IOANNIS, Dr. NIKITAKOS NIKITAS University of.
2009 Mathematics Standards of Learning Training Institutes Algebra II Virginia Department of Education.
GEODETIC INSTITUTE LEIBNIZ UNIVERSITY OF HANNOVER GERMANY Ingo Neumann and Hansjörg Kutterer The probability of type I and type II errors in imprecise.
Impact of business environment on poverty reduction Gessye Ginelle Safou-Mat American University School of International Service.
Dr. István Fekete: The Role of Integrated Risk Management in Organizations April11th, Budapest.
Incident Response Mechanism for Chemical Facilities By Stephen Fortier and Greg Shaw George Washington University, Institute for Crisis, Disaster and Risk.
1 Validation & Verification Chapter VALIDATION & VERIFICATION Very Difficult Very Important Conceptually distinct, but performed simultaneously.
1 Study on a Cost Model for RedIRIS September 2008.
EQT 373 Chapter 3 Simple Linear Regression. EQT 373 Learning Objectives In this chapter, you learn: How to use regression analysis to predict the value.
Chapter 2 Risk Measurement and Metrics. Measuring the Outcomes of Uncertainty and Risk Risk is a consequence of uncertainty. Although they are connected,
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Advancing foresight methodology through networked conversations Ted Fuller Peter De Smedt Dale Rothman European Science Foundation COllaboration in Science.
MAINTENANCE STRATEGY SELECTION BASED ON HYBRID AHP-GP MODEL SUZANA SAVIĆ GORAN JANAĆKOVIĆ MIOMIR STANKOVIĆ University of Niš, Faculty of Occupational Safety.
MBA7025_01.ppt/Jan 13, 2015/Page 1 Georgia State University - Confidential MBA 7025 Statistical Business Analysis Introduction - Why Business Analysis.
MGS3100_01.ppt/Aug 25, 2015/Page 1 Georgia State University - Confidential MGS 3100 Business Analysis Introduction - Why Business Analysis Aug 25 and 26,
Lucian Voinea Visualizing the Evolution of Code The Visual Code Navigator (VCN) Nunspeet,
MBA7020_01.ppt/June 13, 2005/Page 1 Georgia State University - Confidential MBA 7020 Business Analysis Foundations Introduction - Why Business Analysis.
METODE PENELITIAN AKUNTANSI. Tugas Tugas Telaah Tugas Riset.
Environment analysis has 3 basic objectives-  Under taking of current & potential changes.  Should provide inputs for strategic decision making.  Rich.
1 3. M ODELING U NCERTAINTY IN C ONSTRUCTION Objective: To develop an understanding of the impact of uncertainty on the performance of a project, and to.
Lecture 2d: Performance Comparison. Quality of Measurement Characteristics of a measurement tool (timer) Accuracy: Absolute difference of a measured value.
Intelligent Database Systems Lab Presenter : BEI-YI JIANG Authors : GUENAEL CABANES, YOUNES BENNANI, DOMINIQUE FRESNEAU ELSEVIER Improving the Quality.
Risk Analysis in Capital Budgeting. Nature of Risk Risk exists because of the inability of the decision-maker to make perfect forecasts. the risk associated.
Privacy Protection in Social Networks Instructor: Assoc. Prof. Dr. DANG Tran Khanh Present : Bui Tien Duc Lam Van Dai Nguyen Viet Dang.
QUANTITATIVE TECHNIQUES
Research Word has a broad spectrum of meanings –“Research this topic on ….” –“Years of research has produced a new ….”
World Futures Studies Federation (WFSF) 19. World Conference Creating objective evaluations, or the possibilities of similarity analysis Pitlik, L., Pető.
The article written by Boyarshinova Vera Scientific adviser: Eltyshev Denis THE USE OF NEURO-FUZZY MODELS FOR INTEGRATED ASSESSMENT OF THE CONDITIONS OF.
A fault tree – Based Bayesian network construction for the failure rate assessment of a complex system 46th ESReDA Seminar May 29-30, 2014, Politecnico.
REC Savannah, Febr. 22, 2006 Title Outlier Detection in Geodetic Applications with respect to Observation Imprecision Ingo Neumann and Hansjörg.
P5 : Advanced Performance Management. B1: External Influences on Organisational Performance B1. Changing business environment B2. Impact of external factors.
15 Inferential Statistics.
21st Mediterranean Conference on Control and Automation
DEPARTMENT OF HUMAN AND SOCIAL CIENCES APPLIED LINGUISTICS IN ENGLISH CAREER    “THE INFLUENCE OF TEACHER’S ATTITUDES AND BELIEFS INTO TECHNOLOGY-RELATED.
COmbining Probable TRAjectories — COPTRA
Fault Tree Analysis Based on Dynamic Uncertain Causality Graph
Stochastic Activity Networks
Discrete Event Simulation - 4
Jonathan Frez, Nelson Baloian, Jose A. Pino, Gustavo Zurita
Jonathan Frez, Nelson Baloian, Jose A. Pino, Gustavo Zurita
The Use and Impact of FTA
Statistical Thinking and Applications
Chapter Nine: Using Statistics to Answer Questions
Planning process in river basin management
Introduction to Decision Sciences
Presentation transcript:

Scenario Construction Via Cross Impact Prof. Victor A. Bañuls Management Department Pablo de Olavide University Seville, Spain Web: The Network Nation and Beyond A Festschrift in Honor of Starr Roxanne Hiltz and Murray Turoff Distinguished Prof. Murray Turoff Information Systems Department New Jersey Institute of Technology Newark NJ, USA Web: NJIT – October 2007

Index Research motivations Methodological background Basics of the CIM-ISM Generating scenarios Conclusions

Research motivations Why do we need scenarios? –Strategic decision making (policy, business, etc.) compromise resources in the long term. –We need to think about what will happen tomorrow before acting today. –A scenario is a tool for managing the uncertainty of the future. –Our proposal is aimed at contributing to this goal.

Research motivations What is the aim of our proposal? –Helping decision makers to manage the uncertainty. How? –Structuring and sharing the beliefs and the knowledge of the people involved in decision making. But… how can we do that? –By the structural analysis of the impacts between the atomic events that are relevant to the decision-making problem.

Methodological background Cross-Impact Method –Events cannot be analyzed in a isolated way. –Alternative cross-impact approach (Turoff, 1972): Inferring impacts between events based on experts’ hypothesis about their occurrence (or not).

Methodological background n n GiGi n C 43 +/- Impacts between events in the model Impacts of the events not included in the model Cross-Impact Matrix

Methodological background Interpretive structural modeling –Taking as an input the impacts obtained with the CIM, this methodology will help us to: Making hypotheses about the occurrence or not of the set of events and analyzed them (to generate scenarios). Detecting and analyzing the key drivers (critical events).

Methodological background Occurring eventsNon-Occurring events Key drivers Scenario

Methodological background PiPi S ij R ij C ij GiGi CIM EiEi Events Set of probabilities (isolated and conditional) Cross-Impact Matrix Input Output Cross-Impact Method

Methodological background PiPi S ij R ij C ij GiGi CIM ISM Scenarios EiEi Events Set of probabilities (isolated and conditional) Cross-Impact Matrix Cross-Impact Method Interpretive Structural modeling Input Output

Basics of the CIM-ISM Starting point – Cross-Impact Matrix (Turoff 1972 paper example).

Basics of the CIM-ISM OVP OVP OVP OVP OVP OVP OVP OVP OVP OVP GiGi Cross-Impact Matrix

Basics of the CIM-ISM Starting point – Cross-Impact Matrix (Turoff 1972 paper example). Transforming the Cross-Impact matrix –Transition Matrix (square and positive matrix).

Basics of the CIM-ISM Occurring eventsNon occurring events Occurring events + c ij - c ij Non occurring events - c ij + c ij Transforming the Cross-Impact Matrix

Basics of the CIM-ISM Starting point – Cross-Impact Matrix (Turoff 1972 paper example). Transforming the Cross-Impact matrix –Transition Matrix (square and positive matrix). Transforming the Transition Matrix –Adjacency Matrix (taking an arbitrary C ij value (0.85)).

Basics of the CIM-ISM Starting point – Cross-Impact Matrix (Turoff 1972 paper example). Transforming the Cross-Impact matrix –Transition Matrix (square and positive matrix). Transforming the Transition Matrix –Adjacency Matrix (taking an arbitrary C ij value (0.85)). –Connection Matrix (adding the Identity Matrix).

Basics of the CIM-ISM Starting point – Cross-Impact Matrix (Turoff 1972 paper example). Transforming the Cross-Impact matrix –Transition Matrix (square and positive matrix). Transforming the Transition Matrix –Adjacency Matrix (taking an arbitrary C ij value (0.85)). –Connection Matrix (adding the Identity Matrix). –Reachability Matrix (powering until it is stable).

Basics of the CIM-ISM Scenario Generation –Determining antecedent and succedent sets –Obtaining the graphical scenario (using graph theory)

Basics of the CIM-ISM Scenario Generation –Determining antecedent and succedent sets. –Obtaining the graphical scenario (using graph theory). Interpretation of the scenario –Analyzing key drivers. –Analyzing the set of probabilities.

Basics of the CIM-ISM LEVEL 1 LEVEL 5 LEVEL 4 LEVEL 2 LEVEL Scenario Occurring eventsNon-Occurring events P 9 =0.1 Key drivers Why 0.85? And event 3?

Generating scenarios Sensitivity Analysis –Studying the C ij distribution.

Percentile Percentile Percentile Percentile Percentile Percentile Percentile Percentile Percentile Generating scenarios Normal distribution with a reliability of 99% (using K-S test)

LEVEL 2 LEVEL 1 LEVEL Generating scenarios Percentile Percentile Percentile Percentile Percentile Percentile Percentile Percentile Percentile

LEVEL 2 LEVEL 1 LEVEL 3 LEVEL Generating scenarios Percentile Percentile Percentile Percentile Percentile Percentile Percentile Percentile Percentile

LEVEL 1 LEVEL 5 LEVEL 4 LEVEL 2 LEVEL Generating scenarios Percentile Percentile Percentile Percentile Percentile Percentile Percentile Percentile Percentile

LEVEL 2 LEVEL 1 LEVEL Generating scenarios Percentile Percentile Percentile Percentile Percentile Percentile Percentile Percentile Percentile

Generating scenarios Sensitivity Analysis –Studying the C ij distribution Solving the forecasted scenario –Determining the limit of the forecasted scenario

LEVEL 2 LEVEL Limit = |0.4975| Forecasted Scenario Generating scenarios

-1,-6,2,4,5,7,1038,9 -1,-6,2,4,5,7,10OPV00 31,99OPV0 8,911,530OPV G'G'-9,78-0,70-9,56 Cross-Impact Matrix for the Forecasted Scenario Generating scenarios

Sensitivity Analysis –Studying the C ij distribution. Solving the forecasted scenario –Determining the limit of the forecasted scenario. Solving the alternative scenarios –Determining the limit of the alternative scenarios.

Generating scenarios Sensitivity Analysis –Studying the C ij distribution. Solving the forecasted scenario –Determining the limit of the forecasted scenario. Solving the alternative scenarios –Determining the limit of the alternative scenarios. Interpretation of results –Analyzing the information included in each scenario.

Forecasted Scenario Alternative Scenario I Alternative Scenario II Alternative Scenario III Limits (|  |, |0.4975|) (|0.4975|, |0.3804|)(|0.3804|, |0.2318|)(|0.2318|, 0) Interval of reliability c ij sum EventPiPi Clusters of Events 10.5AAAA 20.3BBBA 30.6BBBB 40.5BBBB 50.4BABA 60.3ABA 70.6BBB 80.2BAB 90.1BBB 100.6BBBA Generating scenarios

Forecasted Scenario Alternative Scenario I Alternative Scenario II Alternative Scenario III Limits (|  |, |0.4975|) (|0.4975|, |0.3804|)(|0.3804|, |0.2318|)(|0.2318|, 0) Interval of reliability c ij sum EventPiPi Clusters of Events 10.5AAAA 20.3BBBA 30.6BBBB 40.5BBBB 50.4BABA 60.3ABA 70.6BBB 80.2BAB 90.1BBB 100.6BBBA Generating scenarios

Forecasted Scenario Alternative Scenario I Alternative Scenario II Alternative Scenario III Limits (|  |, |0.4975|) (|0.4975|, |0.3804|)(|0.3804|, |0.2318|)(|0.2318|, 0) Interval of reliability c ij sum EventPiPi Clusters of Events 10.5AAAA 20.3BBBA 30.6BBBB 40.5BBBB 50.4BABA 60.3ABA 70.6BBB 80.2BAB ? 0.1BBB 100.6BBBA Generating scenarios

Forecasted Scenario Alternative Scenario I Alternative Scenario II Alternative Scenario III Limits (|  |, |0.4975|) (|0.4975|, |0.3804|)(|0.3804|, |0.2318|)(|0.2318|, 0) Interval of reliability c ij sum EventPiPi Clusters of Events 10.5AAAA 20.3BBBA 30.6BBBB 40.5BBBB 50.4BABA ?0.3ABA ?0.6BBB ?0.2BAB 90.1BBB 100.6BBBA Generating scenarios

Conclusions Aims of the model –Handle complex systems. –Obtain a set of plausible snapshots of the future. –Analyze interaction between events. –Detect critical events. Application areas –Technology Foresight. –Strategic Management. –Policy Analysis. –Emergency Response. –Etc…

Conclusions Strong points –A strong theoretical background of the techniques on which the authors proposal in based. –The possibility of working with large sets of events. –Tools for analyzing the key drivers of the scenarios. –Specific software is not needed for making the calculations. –A graphic output that gives a clear representation about the forecast. –It is strongly compatible with other techniques such as the Delphi or multicriteria methods.

Conclusions Limitations –We cannot kwon the probability of occurrence of a specific scenario if it is not an output of the model. –The estimation of the occurrence or non-occurrence estimation of the scenarios needs the interpretation of the key drivers and sometimes it would be difficult if there is a probability of occurrence close to 0.5.

Scenario Construction Via Cross Impact Prof. Victor A. Bañuls Management Department Pablo de Olavide University Seville, Spain Web: Distinguished Prof. Murray Turoff Information Systems Department New Jersey Institute of Technology Newark NJ, USA Web: Thank you for your attention!