| Literature DB >> 32021919 |
Apol Pribadi Subriadi1, Nina Fadilah Najwa1.
Abstract
FMEA is as a method for assessing IT risks. This research aimed to examine the consistency of both traditional FMEA and improved FMEA in IT risk assessment. Improved FMEA is the result of a synthesis framework to minimize consistency in traditional FMEA. Two sets of action research cycles (plan, act, observe, reflect) were applied in this research. Action Research 1 was used to examine and prove the consistency of traditional FMEA. On the other hand, Action Research 2 was applied to examine the consistency of improved FMEA. Tests were carried out by two different teams in the same case study. The consistency was observed in the gap of the RPN results in both teams, and the differences result in both action research cycles. Action Research 1 proved that traditional FMEA was not consistent. The gap in the amount of risk at a very high level was four risks. However, Action research 2 had the same amount of risk at a very high level. Based on the correlation test, the consistency of action research 1 was 0.848 (very large correlation), and the action research 2 was 0.937 (near-perfect correlation). The consistency of improved FMEA proved to be more consistent than traditional FMEA. The limitation of this study was memory issues because both action research cycles were carried out by the same team and with similar case studies. Further research is expected to compare traditional FMEA and improved FMEA in different case studies. The theoretical contribution was the improved FMEA synthesis based on limitations of traditional FMEA. The FMEA team may use Improved FMEA Framework.Entities:
Keywords: FMEA consistency; FMEA improvement; IT risk; Information management; Information security; Information systems; Information systems management; Information technology; Safety engineering; Systems engineering
Year: 2020 PMID: 32021919 PMCID: PMC6994836 DOI: 10.1016/j.heliyon.2020.e03161
Source DB: PubMed Journal: Heliyon ISSN: 2405-8440
Figure 1Traditional FMEA.
Figure 2RPN results of action research 1.
Figure 3Comparison of risk assessment in Severity parameters (Action Research 1).
Figure 4Comparison of risk assessment in Occurrence parameters (Action Research 1).
Figure 5Comparison of risk assessment in Detection parameters (Action Research 1).
Gap analysis.
| Factors | The Difference | |
|---|---|---|
| Parameters scale | The gap sequence of the IT risk measurement parameters was detection, severity, and occurrence. | The parameters scale could be limited to save time in assessing risk. It was also more effective in getting reliable measurement results. ( |
| People (FMEA Team) | Each action research assesses by two teams. The team 1 consisted of IT Practitioner, Section Chief, and Coordinators. The team 2 consisted of IT Practitioner, senior employees (operator), and coordinator. | This matter was already suitable for the results of research conducted by ( |
| Time Completion | The team 1 took a long time to measure risk compared to the team 2. | Risk assessment required estimated time and job division. ( |
| Training | Each team has got an explanation of how to use the FMEA method. The informant also attends the training which is held once a year. | Provide training on the use of the FMEA method to measure IT risk to the FMEA team ( |
| Knowledge | The case study had never been to assess an IT risk. The informant's educational background was not from the IT field. | |
| Failure History | The failure history factor was based on the informant's experience and knowledge. |
Alignment of weaknesses, causes, and recommendations.
| Weakness | Diagnose the possible caused | Recommendation Solution |
|---|---|---|
| The difficulties in finding risk potential root causes | Defining sources of threats that were not appropriate ( | |
| The difficulties in evaluating risk factor accurately | The many variations of scenarios that affect the identical RPN results. ( | |
| Definition of scale criteria was not clear and doubtful | There was no specific procedure for determining the criteria scale ( | |
| The non-linear 1–10 priority scales | The team needs to think longer in determining the right scale because of the many considerations of the right numbers in the 1–10 scale. ( | |
| Subjectivity/human error, Bias | There was no guidance about team FMEA ( | |
| Time-consuming | There was no time limit on the IT risk assessment ( | |
| The importance level of parameters was the same | There was no value variable, which was the main key that might be used in the analysis ( | Severity and occurrence values were the |
| The RPN formulation | The formula was too simple because it considered the same level of importance. ( | |
| Duplicated/Identic RPN | A large number of variations in RPN values (max = 1000). ( |
Figure 6Improved FMEA model.
Improved FMEA document.
| Code | Critical Assets | (impact) | Potential Effect(s) of Failure | SEV | (threat) | Source of Threat | OCC | Current Compensanting Controls (Compensate Vulnerability) | RPN | |
|---|---|---|---|---|---|---|---|---|---|---|
| Preventive Control | Detective Control | |||||||||
| <asset code> | <asset name> | <final impact of failure/risk> | Severity of service/operational, media attention, regulation | Threat | Prevention | |||||
Significance of italics denotes that the team would choose one of these option (people, process or procedure).
Figure 7Severity scale criteria.
Figure 8Occurrence scale criteria.
Figure 9Risk level.
Figure 10Validation improved FMEA.
Figure 11RPN results of action research 2.
Figure 12Comparison of risk assessment in Severity parameters (Action Research 2).
Figure 13Comparison of risk assessment in Occurrence parameters (Action Research 2).
Figure 14Risk level action research.
Figure 15Scatter plot action research 1.
Figure 16Scatter plot action research 2.