By Topic

Causal networks for risk and compliance: Methodology and application

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $33
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)

This paper presents a statistical approach to quantitatively measure the current exposure of a company to failures and defects in product quality or to compliance to government regulations. This approach is based on causal networks, which have previously been applied to other fields, such as systems maintenance and reliability. Causal networks allow analysts to causally explain the values of variables (an explanatory approach), to assess the effect of interventions on the structure of the data-generating process, and to evaluate “what-if” scenarios, that is, alternative methods or policies (an exploratory approach). Building the causal structure raises some challenges. In particular, there is no automated way to collect the needed data. We present a methodology for model selection and probability elicitation based on expert knowledge. We apply the proposed approach to the case of pharmaceutical manufacturing processes. The use of such networks allows for a more rigorous comparison of practices across different manufacturing sites, creates the opportunity for risk remediation, and allows us to evaluate alternative methods and approaches.

Note: The Institute of Electrical and Electronics Engineers, Incorporated is distributing this Article with permission of the International Business Machines Corporation (IBM) who is the exclusive owner. The recipient of this Article may not assign, sublicense, lease, rent or otherwise transfer, reproduce, prepare derivative works, publicly display or perform, or distribute the Article.  

Published in:

IBM Journal of Research and Development  (Volume:54 ,  Issue: 3 )