SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 650
Abstract—Many of risks occur during the human resource
management. During the time of recruitment and post-recruitment,
HR needs to predict the events where risks occur of which decision
can be made like selection, strategic planning, and training. These
criteria vary between conditions ranging from sociology, health
condition, degree of uncertainty, avoidance, and sequence of actions
as a matrix in Bayesian decision model. The Bayesian decision-
making (DM) framework includes risk identification, decision
choices, outcomes of decisions, and described losses from HR risk.
In this paper, the weighted risk management is developed from the
existing context of HR risks. The weighted risk will be evaluated in
term of losses and the mathematical modeling of the decision making
scheme is made.
Keywords—bayesian decision-making framework, expected
losses,human resources risk management, weighted risk management
factor.
I. INTRODUCTION
VER theyears, it is very common to apply risk
management to HR process. Many frameworks have
been developed including decision making scheme. Thus,
bayesian decision analysis is one of practical tools starting by
identified the problems where the corresponding DM takes a
single reward, i.e., a financial one or a result of chosen act. It
is very important for HR analysis to understand the risk assets
to indicate problems to make a decision on strategic planning
and risks, operational risks, financial risks, hazard risks.
Normally, risk management has four stages: Plan-Do-Check-
Act (PDCA). In this paper we consider the similar
methodology aspect for HR management [1], it can be
depicted as Table I.
TABLE I
FIVE –STAGE METHODOLOGY OF HR MANAGEMENT
Stage Description Procedures
1 Preparation
A. Setting the objectives of HR risk
management
B.Formation of the HR risk
management team
2 Analysis
A. Qualitative analysis of HR risks
B. Quantitive analysis of HR risks
3 Planning
A. Elaboration of a plan of
measures to manage HR risks
Assoc. Prof. Dr. S. Somkhuarnpanit. is now with King Mongkut’s Institute
of Technology (KMITL), Bangkok, Thailand. (phone: +6681-348-9830; e-
mail: suripo@kmitl.ac.th).
Honghernmai S. is with the Electrical Engineering Department, King
Mongkut’s Institute of Technology (KMITL), Bangkok, Thailand, and
working at UInfo Co., ltd. expecting to develop the ML platform for decision
making (e-mail: honghernmai.s@gmail.com).
B. Development of a budget for
HR risk management
C. Identification of funding sources
for human resources management
D. Documenting the management of
HR risks
4 Organization
Implementation of action plan for
management of HR risks is carried
out.
5 Control
A. Assessment of the effectiveness
of human resources management
B. Operational control over HR
risks of the organization
C. Revision and updating of the HR
risk assessment system
As a result from the above methodology we can find that
there is a HR risk level as indicated in Table II can be shown
from the least significant HR management system to the most
significant negative impact, i.e. losses on the activities of HR
of the entire organization.
TABLE II
PROFILE OF HR RISKS
Number HR risks HR risk level
1
Ineffective HR
management system
0.80
2
Leaving of “narrow”
specialists
0.76
3
Unfavorable socio-
psychological climate in
the team
0.72
4
Lack of a staff
motivation program
0.72
5 Intellectual risks 0.71
6
Lack of incentive to
retain staff
0.70
7
Lack of career
progression
0.70
8
Inefficient functional
division of liabilities and
responsibilities for
personnel management
0.70
9
Leaving of senior
management
0.68
10
An employee’s
assessment based not on
the performance
0.66
11
Lack of allocation of
posts, from which the
most dangerous threats of
information, property,
intellectual and other
security can come
0.61
H. Sriphanphet, Assoc. Prof. Dr. S. Somkhuarnpanit
Bayesian Decision-Making with Weighted Risk
Management for Human Resource Management
O
RESEARCH ARTICLE OPEN ACCESS
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 651
12
Lack of activities aimed
to motivate the loyalty of
employees to the
organization
0.60
13
Subjectivity of methods
of personnel business
evaluation
0.60
14
Irrational structure of the
organization
0.60
15
Dismissed of employees
after passing training
program
0.60
16
Inefficient functional
division of liabilities and
responsibilities for
personal management
0.60
17 Risks of unreliability 0.56
18
Non-compliance of
training objectives with
the needs of the
organization
0.55
19
Lack of regulation of
personnel security
function
0.54
20
Unbalanced gender, age
and educational groups
of staff
0.52
21
Low qualification level
and quality of intellectual
potential of the
organization
0.52
22
Absence of conclusions
of business evaluation,
management decisions
0.51
23
Absence of conditions
aimed to increase the
loyalty of employees
0.51
24
Low qualification level
and quality of intellectual
potential of the
organization
0.51
25
Presence of conflicts,
labour disputes, caused
by the conflict of
interests of employees
and the employer
0.49
26
Lack of incentive for
employees to make
proactive proposals to
improve the security of
the organization
0.49
27 Socio-psychological risks 0.48
28
Lack of regulation of
working hours and
overtime work
0.48
29 Economic risks 0.48
30
Irrational modes of work
and leisure time
0.39
31 Moral risks 0.33
32 Biological risks 0.24
Then, we apply the risk matrix level of one to three: low,
medium, highas shown in Table III, and multiply by the HR
risk level from Table II, we can derive multiplication as
expected losses as indicated in Table IV. Noted that from the
above models the risk level shown in risk matrix in Table III
can be subcategorized into Strategic Risk (SR1-3),
Operational Risk (OP1-3), Financial Risk (FR1-3), Hazard
Risk (HZ1-3) [3]. For information technology department
more risks can be included such as Technology Risk.
TABLE III
RISK MATRIX OF THREE LEVEL
PROBABILITY
IMPACT
CASE STUDY
A female employee is hired with business evaluation, and
she has expressed interested and satisfaction upon arrival with
the help of her co-worker for floor tour (no HR organization
training plan only HR policy training upon arrival as discussed
with her colleague), the psychological climate in the team is
that they prefer female with satisfaction to work with the team,
but evaluation is based on former male specialist who has ISO
certification, whilst she has an expired knowledge of CCNA
(with basic network concept) certification which is not really
applied to the role as standardized information security officer.
She can bring her own devices and also working on available
resources at the office. The team found she has experiences
and required educational background, but no certification
(naïve to middle specialist in ISO). She has come up with new
risk management proposal (with operation risk of level 1) plan
to self-evaluation on her first week as a risk management
officer given task and information from male supervisor.
Thus, given expected losses in following table,
TABLE IV
EXAMBLE OF EXPECTED LOSSES
Number Description Expected Losses(li)
1 SR1 0.80
2 OP1(with certification) 0.76
3 OP2
1.44
5 SR1 0.71
11 HZ1 0.61
20 SR1 0.52
22 FR1 0.51
26 OP1 0.49
29 FR2(trained, optional) 0.96
The definition in the International Organization for
Standardization (ISO) 31000 risk management standard is that
‘a risk is the effect of uncertainty on objectives’ [8], [9]. The
ISO guide also emphasizes that a risk may be positive,
negative or a deviation from the expected and that risk often
LOWMEDIUM
HIGH
LOW MEDIUM HIGH
1
1
1
1
2
2
1
2
3
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 652
becomes visible in an event, a change in circumstances or a
consequence.
II. BAYESIAN DECISION MAKING MODEL
There are several methods of decision making such as
binary search tree but in this paper we would consider only
one methodology, Bayesian DM. As we understand that [2].
NOTATION 1Let D is the decision space denoted as the
space of all possible decisions of that could be chosen by the
DM and the space of all possible outcomes or states of nature
. We could define that at each choosing decision, 	 ∈ and
for each possible outcome ∈ ∅. We can give that at any loss
which can be written in form of ( , ) and probability mass
function as indicated in Table II in form of ( ).
If the spaces D and are finite of respective dimensions r
and n then ( ) is a vector of n probabilities, whilst
{ ( , ): 	 , ∅} can be specified as an m x n matrix all of
whose components are real numbers. Given that both D = {d1,
d2,.....,dr} and ∅ = { , , … , }	are finite sets then the losses
{ , = , : = 1,2, … , = 1,2 … } can be illustrated as
a table called a decision table and shown below.
Consequently,
States of Nature
	⋯ 				⋯
, 	 , ⋯ , 		⋯ ,
, 	 , ⋯ , 		⋯ ,
Decisions ⋮⋱ ⋮
, 	 , ⋯ , 		⋯ ,
⋮ ⋱ ⋮
# #, 	 #, ⋯ #, 		⋯ #,
To calculate the expected payoff, or equivalently, minimize
the function
$( ) =	% ( , ) ( )
&'∅
where($( )denotes her expected payoff.
III. STUDY THE FEMALE CASE
Practically [2], we use expected loss, ( , ) to calculate the
total loss $( ) as a summation of losses. For examples, from
table IV from the case study, it can be evaluated that if there is
two decisions to make whether she would be trained to have
certain certifications,d1, or to evaluate as a new specialist at
the end of trial period with or without certification.
Second decision is d2 is to NO TRAINING period for her new
role as new specialists in her field than existing required
certification, i.e. her role need CCNA for basic roles to make a
plan to audit for risk management policy for IT, but she also
need ISO knowledge and certification. Consecutively, we get
the total losses of 5.84 out of 24, given that LOW loss is
evaluated between 1x0.5 to 1x1 of each asset out of eight
assets as shown in Table IV.
Example 1 A female employee is recruited with evaluation
of ) = 1: pass evaluation;) = 2: NOT pass evaluation, and
to*: recruit specialist or *̅: NOT recruit new personnel from
business evaluation model, the associated costs and
probabilities are given below. Since the risk level is at 5.84
out of 24 from eight assets, i.e., she would pass the evaluation
period from the measurement but using Bayesian DM with
nine assets tells, under optimal action the amount we expect to
spend is
$ = 125- + 187.5(1 − -) = 187.5 − 62.5-
where- is probability where A is occur
1 − -is probability where*̅ is occur
From the example given, we can concluded that as of $ =
[123, 187.5] the situation * and *̅ will occur, respectively.
We have,
, = 6.80
, = 7.56
, = 6.32
, = 7.08
In form of loss matrix,
( ) = 6
6.80 7.56
6.32 7.08
7
with - = 0.8. Finally we get the result of
$( ) = 21.66048
She will pass the evaluation and with NO FURTHER
recruitment as the lower limit is not reached.
IV. EVALUATION OF DM MODEL
More evaluation, e.g. job satisfaction can be measured
and find the mean values [4] this decision making scheme.
Moreover, it can be management by Quality Assurance
method as well like doing p-test, t-test, etc. relating to
hypothesis relations. However, it is not included in this
paper.
V.SOME PROBLEMENCOUNTERS
Usually, error evaluation in decision-making scheme is
encountered to indicate the accuracy of decision-making to
find better training set in machine learning. This will also
correspond with self-evaluation for improved decision-making
framework [11].
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 653
VI. CONCLUSION
Loss experience is one of the topics in risk management of
which in this context we made use of it as one of important
factors in decision making [9] and scorecard may be of use as
well in the process [10].This also includes in performance
evaluation. Table V depicted risk description needs for HR
evaluation.
TABLE V
RISK DESCRIPTION IN HR RISK MANAGEMENT
Number Description Category
1 Name or title of risk SR, OP, FR, HZ
2 Scope of risk SR, OP, FR, HZ
3 Nature of risk SR, OP, FR, HZ
4 Stakeholders SR, OP, FR
5 Risk evaluation SR, OP, FR, HZ
6 Loss experience SR, OP, FR, HZ
7
Risk Tolerance, appetite
or attitude
SR, OP, FR, HZ
8
Risk response, treatment,
and controls
SR, OP, FR, HZ
9
Potential for risk
improvement
SR, OP, FR, HZ
10
Strategy and policy
Development
SR, OP, FR, HZ
More research can be on the improvement and multi-
dimension with Bayesian DM framework. Many risk
description may be involved than the loss alone with weighted
risks. Correlation between each risk factors may be evaluated
to identify the problem solving for business continuity
management.
REFERENCES
[1] E. Mitrofanova, “Human Resource Risk Management in Organization:
Methodology Aspect,” in Advances in Economics, Business and
Management Research, vol. 38, TTIESS 2017.
[2] J. Q. Smith, Bayesian Decision Analysis: Principles and Practice.
University of Warwick, Coventry, UK, 2000.
[3] K. Becker, “A risk perspective on human resource management: A
review and directions for future research”, Human Resource
Management Review, 26(2), pp. 149-165, 2016.
[4] P. Nie, “What Chinese worker values: An analysis of Job Satisfaction,
Job Satisfactions, and Labour Turnover in China”, IZA DP No. 10963,
August 2017.
[5] M. Meyer, “Human Resources risk management: governing people risks
for improved performance: Opinion paper,” SA Journal of Human
Resource Management,9(1), pp. 1-12, 2011.
[6] ISO 31 000 International Standard: Risk management – Principles and
guidelines. Geneva: International Standards Organization, 2018
[7] ISO. Guide 73: Risk management — Vocabulary. Geneva: International
Standards Organization, 2009.
[8] Airmic, “A structured approach to Enterprise Risk Management (ERM)
and the requirements of ISO 31000”,2010.
[9] N.N.Taleb, The Black Swan: The Impact of the Highly Improbable.
London: Penguin Books, 2007.
[10]B. Heslop,” Why HR Governance Matters: Managing the HR Function for
Superior Performance,” New York City: Mercer Human Resource
Consulting.
[11] S.M. Fleming, ”Self-evaluation of decision-making: A general Bayesian
framework for metacognitive computation,”Princeton Neuroscience
Institute and Department of Psychology, Princeton University, New
York, USA, 2015.
H. Sriphanphet (2019) is currently working at Information Security
Departing and working towards ML for risk management analysis. She has
M.Eng.in Biomedical Electronics from KMITL in 2008 and B.Eng. Electrical
Engineering (Telecommunication) from SIIT, Thammasat University in 2001.
She has also theology paper submission in October, 2017.

More Related Content

Similar to IJSRED-V2I5P55

A Risky Tomorrow beyond Traditional Human Resource Risk Management V1
A Risky Tomorrow beyond Traditional Human Resource Risk Management V1A Risky Tomorrow beyond Traditional Human Resource Risk Management V1
A Risky Tomorrow beyond Traditional Human Resource Risk Management V1
Matthew Bennett
 
BBA 4226, Risk Management 1 Course Learning Outcomes .docx
 BBA 4226, Risk Management 1 Course Learning Outcomes .docx BBA 4226, Risk Management 1 Course Learning Outcomes .docx
BBA 4226, Risk Management 1 Course Learning Outcomes .docx
aryan532920
 
Strengths And Methods Of Risk Analysis And Risk Management
Strengths And Methods Of Risk Analysis And Risk ManagementStrengths And Methods Of Risk Analysis And Risk Management
Strengths And Methods Of Risk Analysis And Risk Management
Nina Vazquez
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
MargenePurnell14
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
bagotjesusa
 

Similar to IJSRED-V2I5P55 (20)

A Risky Tomorrow beyond Traditional Human Resource Risk Management V1
A Risky Tomorrow beyond Traditional Human Resource Risk Management V1A Risky Tomorrow beyond Traditional Human Resource Risk Management V1
A Risky Tomorrow beyond Traditional Human Resource Risk Management V1
 
Security Risk Management Essay
Security Risk Management EssaySecurity Risk Management Essay
Security Risk Management Essay
 
Relative risk benchmarking enabling better decision making for managing infor...
Relative risk benchmarking enabling better decision making for managing infor...Relative risk benchmarking enabling better decision making for managing infor...
Relative risk benchmarking enabling better decision making for managing infor...
 
Building Risk Tolerance into the Program Plan and Schedule
Building Risk Tolerance into the Program Plan and ScheduleBuilding Risk Tolerance into the Program Plan and Schedule
Building Risk Tolerance into the Program Plan and Schedule
 
Pm 0016 –project risk management
Pm 0016 –project risk managementPm 0016 –project risk management
Pm 0016 –project risk management
 
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITY
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITYRISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITY
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITY
 
IS Project Risk Management: Risk Factors in IS Project Management
IS Project Risk Management:  Risk Factors in IS Project ManagementIS Project Risk Management:  Risk Factors in IS Project Management
IS Project Risk Management: Risk Factors in IS Project Management
 
Dj24712716
Dj24712716Dj24712716
Dj24712716
 
Pm0016 –project risk management
Pm0016 –project risk managementPm0016 –project risk management
Pm0016 –project risk management
 
BBA 4226, Risk Management 1 Course Learning Outcomes .docx
 BBA 4226, Risk Management 1 Course Learning Outcomes .docx BBA 4226, Risk Management 1 Course Learning Outcomes .docx
BBA 4226, Risk Management 1 Course Learning Outcomes .docx
 
Strengths And Methods Of Risk Analysis And Risk Management
Strengths And Methods Of Risk Analysis And Risk ManagementStrengths And Methods Of Risk Analysis And Risk Management
Strengths And Methods Of Risk Analysis And Risk Management
 
Answer the quetions.docx
Answer the quetions.docxAnswer the quetions.docx
Answer the quetions.docx
 
Answer the quetions.docx
Answer the quetions.docxAnswer the quetions.docx
Answer the quetions.docx
 
project risk management
project risk managementproject risk management
project risk management
 
Risk management of the performance measurement baseline
Risk management of the performance measurement baselineRisk management of the performance measurement baseline
Risk management of the performance measurement baseline
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
 
Minimization of Risks in Construction projects
Minimization of Risks in Construction projectsMinimization of Risks in Construction projects
Minimization of Risks in Construction projects
 
Case study in Enterprise Risk Management
Case study in Enterprise Risk ManagementCase study in Enterprise Risk Management
Case study in Enterprise Risk Management
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)
 

More from IJSRED

BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
IJSRED
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
IJSRED
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
IJSRED
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
IJSRED
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
IJSRED
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
IJSRED
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
IJSRED
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
IJSRED
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
IJSRED
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
IJSRED
 

More from IJSRED (20)

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
 

Recently uploaded

一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
A
 
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
mikehavy0
 

Recently uploaded (20)

Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
Databricks Generative AI Fundamentals .pdf
Databricks Generative AI Fundamentals  .pdfDatabricks Generative AI Fundamentals  .pdf
Databricks Generative AI Fundamentals .pdf
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
 
DBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptxDBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptx
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Databricks Generative AI FoundationCertified.pdf
Databricks Generative AI FoundationCertified.pdfDatabricks Generative AI FoundationCertified.pdf
Databricks Generative AI FoundationCertified.pdf
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
 

IJSRED-V2I5P55

  • 1. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 650 Abstract—Many of risks occur during the human resource management. During the time of recruitment and post-recruitment, HR needs to predict the events where risks occur of which decision can be made like selection, strategic planning, and training. These criteria vary between conditions ranging from sociology, health condition, degree of uncertainty, avoidance, and sequence of actions as a matrix in Bayesian decision model. The Bayesian decision- making (DM) framework includes risk identification, decision choices, outcomes of decisions, and described losses from HR risk. In this paper, the weighted risk management is developed from the existing context of HR risks. The weighted risk will be evaluated in term of losses and the mathematical modeling of the decision making scheme is made. Keywords—bayesian decision-making framework, expected losses,human resources risk management, weighted risk management factor. I. INTRODUCTION VER theyears, it is very common to apply risk management to HR process. Many frameworks have been developed including decision making scheme. Thus, bayesian decision analysis is one of practical tools starting by identified the problems where the corresponding DM takes a single reward, i.e., a financial one or a result of chosen act. It is very important for HR analysis to understand the risk assets to indicate problems to make a decision on strategic planning and risks, operational risks, financial risks, hazard risks. Normally, risk management has four stages: Plan-Do-Check- Act (PDCA). In this paper we consider the similar methodology aspect for HR management [1], it can be depicted as Table I. TABLE I FIVE –STAGE METHODOLOGY OF HR MANAGEMENT Stage Description Procedures 1 Preparation A. Setting the objectives of HR risk management B.Formation of the HR risk management team 2 Analysis A. Qualitative analysis of HR risks B. Quantitive analysis of HR risks 3 Planning A. Elaboration of a plan of measures to manage HR risks Assoc. Prof. Dr. S. Somkhuarnpanit. is now with King Mongkut’s Institute of Technology (KMITL), Bangkok, Thailand. (phone: +6681-348-9830; e- mail: suripo@kmitl.ac.th). Honghernmai S. is with the Electrical Engineering Department, King Mongkut’s Institute of Technology (KMITL), Bangkok, Thailand, and working at UInfo Co., ltd. expecting to develop the ML platform for decision making (e-mail: honghernmai.s@gmail.com). B. Development of a budget for HR risk management C. Identification of funding sources for human resources management D. Documenting the management of HR risks 4 Organization Implementation of action plan for management of HR risks is carried out. 5 Control A. Assessment of the effectiveness of human resources management B. Operational control over HR risks of the organization C. Revision and updating of the HR risk assessment system As a result from the above methodology we can find that there is a HR risk level as indicated in Table II can be shown from the least significant HR management system to the most significant negative impact, i.e. losses on the activities of HR of the entire organization. TABLE II PROFILE OF HR RISKS Number HR risks HR risk level 1 Ineffective HR management system 0.80 2 Leaving of “narrow” specialists 0.76 3 Unfavorable socio- psychological climate in the team 0.72 4 Lack of a staff motivation program 0.72 5 Intellectual risks 0.71 6 Lack of incentive to retain staff 0.70 7 Lack of career progression 0.70 8 Inefficient functional division of liabilities and responsibilities for personnel management 0.70 9 Leaving of senior management 0.68 10 An employee’s assessment based not on the performance 0.66 11 Lack of allocation of posts, from which the most dangerous threats of information, property, intellectual and other security can come 0.61 H. Sriphanphet, Assoc. Prof. Dr. S. Somkhuarnpanit Bayesian Decision-Making with Weighted Risk Management for Human Resource Management O RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 651 12 Lack of activities aimed to motivate the loyalty of employees to the organization 0.60 13 Subjectivity of methods of personnel business evaluation 0.60 14 Irrational structure of the organization 0.60 15 Dismissed of employees after passing training program 0.60 16 Inefficient functional division of liabilities and responsibilities for personal management 0.60 17 Risks of unreliability 0.56 18 Non-compliance of training objectives with the needs of the organization 0.55 19 Lack of regulation of personnel security function 0.54 20 Unbalanced gender, age and educational groups of staff 0.52 21 Low qualification level and quality of intellectual potential of the organization 0.52 22 Absence of conclusions of business evaluation, management decisions 0.51 23 Absence of conditions aimed to increase the loyalty of employees 0.51 24 Low qualification level and quality of intellectual potential of the organization 0.51 25 Presence of conflicts, labour disputes, caused by the conflict of interests of employees and the employer 0.49 26 Lack of incentive for employees to make proactive proposals to improve the security of the organization 0.49 27 Socio-psychological risks 0.48 28 Lack of regulation of working hours and overtime work 0.48 29 Economic risks 0.48 30 Irrational modes of work and leisure time 0.39 31 Moral risks 0.33 32 Biological risks 0.24 Then, we apply the risk matrix level of one to three: low, medium, highas shown in Table III, and multiply by the HR risk level from Table II, we can derive multiplication as expected losses as indicated in Table IV. Noted that from the above models the risk level shown in risk matrix in Table III can be subcategorized into Strategic Risk (SR1-3), Operational Risk (OP1-3), Financial Risk (FR1-3), Hazard Risk (HZ1-3) [3]. For information technology department more risks can be included such as Technology Risk. TABLE III RISK MATRIX OF THREE LEVEL PROBABILITY IMPACT CASE STUDY A female employee is hired with business evaluation, and she has expressed interested and satisfaction upon arrival with the help of her co-worker for floor tour (no HR organization training plan only HR policy training upon arrival as discussed with her colleague), the psychological climate in the team is that they prefer female with satisfaction to work with the team, but evaluation is based on former male specialist who has ISO certification, whilst she has an expired knowledge of CCNA (with basic network concept) certification which is not really applied to the role as standardized information security officer. She can bring her own devices and also working on available resources at the office. The team found she has experiences and required educational background, but no certification (naïve to middle specialist in ISO). She has come up with new risk management proposal (with operation risk of level 1) plan to self-evaluation on her first week as a risk management officer given task and information from male supervisor. Thus, given expected losses in following table, TABLE IV EXAMBLE OF EXPECTED LOSSES Number Description Expected Losses(li) 1 SR1 0.80 2 OP1(with certification) 0.76 3 OP2 1.44 5 SR1 0.71 11 HZ1 0.61 20 SR1 0.52 22 FR1 0.51 26 OP1 0.49 29 FR2(trained, optional) 0.96 The definition in the International Organization for Standardization (ISO) 31000 risk management standard is that ‘a risk is the effect of uncertainty on objectives’ [8], [9]. The ISO guide also emphasizes that a risk may be positive, negative or a deviation from the expected and that risk often LOWMEDIUM HIGH LOW MEDIUM HIGH 1 1 1 1 2 2 1 2 3
  • 3. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 652 becomes visible in an event, a change in circumstances or a consequence. II. BAYESIAN DECISION MAKING MODEL There are several methods of decision making such as binary search tree but in this paper we would consider only one methodology, Bayesian DM. As we understand that [2]. NOTATION 1Let D is the decision space denoted as the space of all possible decisions of that could be chosen by the DM and the space of all possible outcomes or states of nature . We could define that at each choosing decision, ∈ and for each possible outcome ∈ ∅. We can give that at any loss which can be written in form of ( , ) and probability mass function as indicated in Table II in form of ( ). If the spaces D and are finite of respective dimensions r and n then ( ) is a vector of n probabilities, whilst { ( , ): , ∅} can be specified as an m x n matrix all of whose components are real numbers. Given that both D = {d1, d2,.....,dr} and ∅ = { , , … , } are finite sets then the losses { , = , : = 1,2, … , = 1,2 … } can be illustrated as a table called a decision table and shown below. Consequently, States of Nature ⋯ ⋯ , , ⋯ , ⋯ , , , ⋯ , ⋯ , Decisions ⋮⋱ ⋮ , , ⋯ , ⋯ , ⋮ ⋱ ⋮ # #, #, ⋯ #, ⋯ #, To calculate the expected payoff, or equivalently, minimize the function $( ) = % ( , ) ( ) &'∅ where($( )denotes her expected payoff. III. STUDY THE FEMALE CASE Practically [2], we use expected loss, ( , ) to calculate the total loss $( ) as a summation of losses. For examples, from table IV from the case study, it can be evaluated that if there is two decisions to make whether she would be trained to have certain certifications,d1, or to evaluate as a new specialist at the end of trial period with or without certification. Second decision is d2 is to NO TRAINING period for her new role as new specialists in her field than existing required certification, i.e. her role need CCNA for basic roles to make a plan to audit for risk management policy for IT, but she also need ISO knowledge and certification. Consecutively, we get the total losses of 5.84 out of 24, given that LOW loss is evaluated between 1x0.5 to 1x1 of each asset out of eight assets as shown in Table IV. Example 1 A female employee is recruited with evaluation of ) = 1: pass evaluation;) = 2: NOT pass evaluation, and to*: recruit specialist or *̅: NOT recruit new personnel from business evaluation model, the associated costs and probabilities are given below. Since the risk level is at 5.84 out of 24 from eight assets, i.e., she would pass the evaluation period from the measurement but using Bayesian DM with nine assets tells, under optimal action the amount we expect to spend is $ = 125- + 187.5(1 − -) = 187.5 − 62.5- where- is probability where A is occur 1 − -is probability where*̅ is occur From the example given, we can concluded that as of $ = [123, 187.5] the situation * and *̅ will occur, respectively. We have, , = 6.80 , = 7.56 , = 6.32 , = 7.08 In form of loss matrix, ( ) = 6 6.80 7.56 6.32 7.08 7 with - = 0.8. Finally we get the result of $( ) = 21.66048 She will pass the evaluation and with NO FURTHER recruitment as the lower limit is not reached. IV. EVALUATION OF DM MODEL More evaluation, e.g. job satisfaction can be measured and find the mean values [4] this decision making scheme. Moreover, it can be management by Quality Assurance method as well like doing p-test, t-test, etc. relating to hypothesis relations. However, it is not included in this paper. V.SOME PROBLEMENCOUNTERS Usually, error evaluation in decision-making scheme is encountered to indicate the accuracy of decision-making to find better training set in machine learning. This will also correspond with self-evaluation for improved decision-making framework [11].
  • 4. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 653 VI. CONCLUSION Loss experience is one of the topics in risk management of which in this context we made use of it as one of important factors in decision making [9] and scorecard may be of use as well in the process [10].This also includes in performance evaluation. Table V depicted risk description needs for HR evaluation. TABLE V RISK DESCRIPTION IN HR RISK MANAGEMENT Number Description Category 1 Name or title of risk SR, OP, FR, HZ 2 Scope of risk SR, OP, FR, HZ 3 Nature of risk SR, OP, FR, HZ 4 Stakeholders SR, OP, FR 5 Risk evaluation SR, OP, FR, HZ 6 Loss experience SR, OP, FR, HZ 7 Risk Tolerance, appetite or attitude SR, OP, FR, HZ 8 Risk response, treatment, and controls SR, OP, FR, HZ 9 Potential for risk improvement SR, OP, FR, HZ 10 Strategy and policy Development SR, OP, FR, HZ More research can be on the improvement and multi- dimension with Bayesian DM framework. Many risk description may be involved than the loss alone with weighted risks. Correlation between each risk factors may be evaluated to identify the problem solving for business continuity management. REFERENCES [1] E. Mitrofanova, “Human Resource Risk Management in Organization: Methodology Aspect,” in Advances in Economics, Business and Management Research, vol. 38, TTIESS 2017. [2] J. Q. Smith, Bayesian Decision Analysis: Principles and Practice. University of Warwick, Coventry, UK, 2000. [3] K. Becker, “A risk perspective on human resource management: A review and directions for future research”, Human Resource Management Review, 26(2), pp. 149-165, 2016. [4] P. Nie, “What Chinese worker values: An analysis of Job Satisfaction, Job Satisfactions, and Labour Turnover in China”, IZA DP No. 10963, August 2017. [5] M. Meyer, “Human Resources risk management: governing people risks for improved performance: Opinion paper,” SA Journal of Human Resource Management,9(1), pp. 1-12, 2011. [6] ISO 31 000 International Standard: Risk management – Principles and guidelines. Geneva: International Standards Organization, 2018 [7] ISO. Guide 73: Risk management — Vocabulary. Geneva: International Standards Organization, 2009. [8] Airmic, “A structured approach to Enterprise Risk Management (ERM) and the requirements of ISO 31000”,2010. [9] N.N.Taleb, The Black Swan: The Impact of the Highly Improbable. London: Penguin Books, 2007. [10]B. Heslop,” Why HR Governance Matters: Managing the HR Function for Superior Performance,” New York City: Mercer Human Resource Consulting. [11] S.M. Fleming, ”Self-evaluation of decision-making: A general Bayesian framework for metacognitive computation,”Princeton Neuroscience Institute and Department of Psychology, Princeton University, New York, USA, 2015. H. Sriphanphet (2019) is currently working at Information Security Departing and working towards ML for risk management analysis. She has M.Eng.in Biomedical Electronics from KMITL in 2008 and B.Eng. Electrical Engineering (Telecommunication) from SIIT, Thammasat University in 2001. She has also theology paper submission in October, 2017.