Well Come to The Science and Tech.

Wednesday, 22 June 2016

QUALITATIVE ANALYSIS OF BUSINESS DYNAMICS MADE EASY BY VENSIM

System Dynamics Modeling is powerful tool to find about system's non linear behaviour over time using stock and flow, internal feedback loops and time delays. It is a computer-aided approach to policy analysis and design. It applies to dynamic problems arising in complex social, managerial, economic, or ecological systems, literally any dynamic systems characterized by interdependence, mutual interaction, information feedback, and circular causality. It qualitatively highlights multiple aspects and behaviour of system which may be ignored or unnoticed in planning and designing. It allows to see the picture of future for such system designs.

We would like our readers to become familiar with this powerful tool of qualitative analysis by introducing example scenarios. European ATM system will be analysed and using features of Vensim we will show how can we cater the vulnerabilities in both systems. These are just examples, the software can be utilized in numerous possible fields.
European ATM case will be analysed using system dynamics modeling, finding the relationship and behavior of multiple factors or variable involved in the design. First the system model will be designed in accordance with the given conditions and then system would be simulated to show the resutls with different inputs and variations in the variables and factors. The stock and flow, time delay and feedback loop for problem and solution of complex system would be simulated using Vensim simulation tool. The resultant graphical information for each simulation will be attached to indicate the behavior of system as per requirement. 
Modeling System Dynamics for European Case:
We will develop a problem archetype showing that when the burden of proof is on customers the intention to contain fraudulent transactions to exert pressure on the customers will cause bank complacency, negligence of security in the first place and ultimately more fraudulent transactions as the security vulnerabilities are exploited by malicious agents.
Now we identify the problem archetype as one of the four types (underachievement, relative achievement, out of control, relative control).
Given that the European banks had opted for the model of putting the burden of proof on the customers, suggest a solution link to fix the vulnerabilities in the ATMs.
Figure attached here indicate the Problem and Solution archetypes for above mentioned problem.
For previously described European ATM case we rely on intended consequence (IC) and the unintended consequence (UC) – in other words, it implements the full problem archetype. It is required to simulate the models so as to learn how the key variables behave over time and to inspect the models’ variables and their relations in order to understand and explain the structure of the models. Finally to discuss critically the models’ assumptions. Then we enhance the system dynamics model of the problem archetype by implementing a solution loop. In other words,we are asked to implement a system dynamics model of the solution archetype.
European ATM Case (IC) Model:

Fig. 3 shows the system dynamics model that expresses the intended consequence of the bank’s action, i.e. putting the burden of proof on the customer if (s)he claims that a fraudulent transaction has happened. Since the model ignores the unintended consequences, you can think of it as what would happen in an ideal world where the only possible fraud would occur from some bank customers. In other words, one ignores that there may be professional crooks ready to exploit the vulnerabilities of the ATMs. We are required to perform following tasks as a solution to the given problem:
1. to simulate the models so as to learn how the key variables behave over time; 
The simulation requires to generate a feedback link from the flow ‘’cumulated frauds’’ to the stock ‘’customer’s fraud rate’’. The simulation are without any professional crooks involvement which will be done in next simulation. Setting the parameters or key variables with following values, following graph dispalys the final result.
  • Initial fraud rate: 15 Frauds per month
  • Bank’s perception time: 1 Month
  • Bank’s acceptable fraud rate: 1 Fraud per month
The effect of change in above mentioned variables is positively corelated. Increase in values of these factors result in rise of vertical scale. Bank’s acceptable fraud rate is less effective in this regards as compared to other two. The graph clearly indicates that the cumulated frauds are increasing with the passage of time, hence within 2 years time they reach upto 8000 almost.
2. to inspect the models’ variables and their relations  in order to understand the model;
Name
Type
Equation
Unit
Initial customer’s fraud rate
Constant
10
Fraud per month
Customer’s fraud rate
Auxiliary
Initial fraud rate + (Cumulated frauds/Rate of change of customer’s fraud rate)
Fraud per month
Cumulated frauds
Level
Customer’s fraud rate
Fraud
Perceived customer’s fraud rate
Auxiliary
(Initial Customer’s fraud rate + Customer’s fraud rate)/Bank’s perception time
Fraud per month
Bank’s perception time
Constant
1
Month
Fractional deviation from acceptable fraud rate
Auxiliary
Perceived Cutomer’s fraud rate – Bank’s acceptable fraud rate
Fraud per month
Bank’s acceptable fraud rate
Constant
1
Fraud per month
Time to change rate of change
Auxiliary
Fractional deviation from acceptable fraud rate
Month
Effect of burden of proof on cutomers
Auxiliary
Rate of change of customer’s fraud rate/Time to change rate of change
Dmnl
Rate of change for customer’s fraud rate
Level
5
Fraud per month

3. to explain the structure of the models; 
Variable
Variable explanation
bank's acceptable fraud rate
The bank accepts this low fraud rate as "acceptable" in the sense that enforcing a lower fraud rate would be too costly (the return on investment would be too low). Consider this as the bank's residual risk.
cumulated frauds 
Cumulated frauds are result of initial customer’s fraud over time.
customers' fraud rate
No of frauds per month
effect of burden of proof on customer
It is the stock for rate of change of customer’s fraud rate.
fractional deviation from acceptable fraud rate
Depends on percieved customers fraud rate and banks acceptable fraud rate
initial customers' fraud rate
Initially assumed frauds per month
rate of change for customers' fraud rate
Change in no of fruads occuring in a month
time to chng rate of change
Rate of change in frauds is defined while it is the time to change it.
Perceived customer’s fraud rate
How much fruads encountered in a month as percieved by the customer
Bank’s perception time
It is the time defined for percieving frauds in months

4. to discuss critically the models’ assumptions;
The model is designed using Vensim simulation tool to study the system dynamics and non linear behaviour over time for the given problem. European ATM problem is thus analysed deeply to see the future behaviour based on proposed solution. This model depicts the problem archetype Intended Consequence. Multiple factors playing role in the ATM system are indicated by arrows to show their internal relation. Beauty of Vensim design is that it delivers beyond the hypothetical approach. The variables or the real life factors involved in are connected with mathematical equations and thus the quantitative results for different inputs is achievable while we simulate the design. This is one particular problem archetype design that shows the result in form of graphical information. There could be several designs other than this for the same problem and also solution designs. Factors involved in the whole model could also be different but it is one approach to analyze the given scenario and a way to move for the sultion based on qualitative analysis and quantiatively assumed values.
European ATM Case (IC-UC) Case:

Fig.5 shows the system dynamics model that expresses the intended consequence of the bank’s action, i.e. putting the burden of proof on the customer if (s)he claims that a fraudulent transaction has happened, as well as the unintended consequence of launching a fraud epidemic in that professional crooks exploit the vulnerabilities of the ATMs. The crooks thrive, since the bank’s antifraud measures will be directed towards the bank’s customers (who have the quite impossible task to prove that they did not commit the fraud themselves). We are required to perform the following tasts, as a solution to the given problem:
1. to simulate the models so as to learn how the key variables behave over time; 
The simulation performed above is now added with professional crooks involvement to make it more real life scenario. It is now more vulnerable to threats. Key variable are slightly changed from above simulation plus the following additional key variable vlaues are set;
Crook’s perception time of ATM security: 1 Month
Bank’s acceptable fraud rate: 1 Fraud per month
Unit factor: 1 Dmnl
Bank’s perception time: 1 Month
Initial fraud rate: 10 Fraud per month
With these parameters set, are variable in simulation to find effect on resultant graph, the following graph is found;

Fig 6 shows the graph that depicts the comparison analysis of ‘’customer’s fraud’’ and ‘’ crook’s fraud’’. Both show almost similar result. . The graph clearly indicates that the cumulated frauds are increasing with the passage of time, hence within 2 years time they reach upto 6000 almost.
2. to inspect the models’ variables and their relations  in order to understand the model;
Undermentioned variables and equations are additional to the previous simulation. The ATM security factors and crook’s involvement has resulted in these additional variables and equations to final simulation.
Name
Type
Equation
Unit
Crook’s fraud rate
Auxiliary
Crook’s perception time of ATM security – ATM security
Fraud per month
Crook’s perception time of ATM security
Constant
1
Month
ATM security
Level
5
Fraud
ATM security obsolescence
Auxiliary
ATM security – Security obsolescence time
Dmnl
Security obsolescense time
Auxiliary
Bank’s complacency
Dmnl
Bank’s complacency
Auxiliary
Effect of burden of proof on customer/Unit factor
Month
Unti Factor
Constant
1
Dmnl per month

3. to explain the structure of the models; 
Variable
Variable explanation
ATM security 
ATM Security is the factor to mitigate the threats in terms of customer’s fraud and crook’s frauds.
ATM security obsolescence 
ATM security no longer wanted, even though it is still in good working order.
bank's complacency 
Bank’s self satisfaction about it being secure. This factor results in vulnerabilities and hence more chances of frauds.
crooks' fraud rate 
Crook’s fraus occuring in a unit time, set as month.
Crooks' perception time of ATM security
This is how a crook percieves about ATM security in terms of perception time whereas perception time is some one’s own perception of duration of indefinite and continuous unfolding of events.
unit factor
This factor, with the value 1 Dmnl/Month, is used the make the variable "bank's complacency" dimensionless
Security obsolescence time
Time for security to becom obsolescence

4. to discuss critically the models’ assumptions.
In the previous model, customer’s involvement in fraudulant transactions for European ATM case was highlighted. While in this model we study the crook’s involvement in fraudulant transactions as well and see the behavour of graph on cumulated frauds variable.This include unintended consequnce. Crook’s fraud is taking effect on the basis of vulnerabilities in the form of security obsolescense, bank’s complacency and ATM security obsolescence. Thus the cumulated fraud shown in graph has two traces by including customer and crook. Multiple key variables can be changed while running the simulation to see the effect on model. A general qualitative analysis would result in favour of designed model. In the following section we would work for solution loop and suggest the solution archetype simulation model.
Extending Simulation Model:
So far the problem archetype are designed on the basis of System Modeling using Vensim to find out the results of our assumptions based on different factors in the form of graphical results. Now it is time to design the solution archetype or solution loop that will deliver the final solution to the problem under discussion. This will let us know how the customer’s frauds and crook’s frauds can be dealt. Although it is clear from previous drawings and simulations that the ATM security need to be improved but the final solution model is as follows:

As shown in fig.7, the solution loop is between ‘’cumulated frauds’’ and ‘’ATM security’’ whereas ‘’cumulated frauds’’ are combined consequence of both customer’s fraud and crook’s fraud. This solution loop emphasize on the variable ‘’Bank’s spending to fix vulnerabilities’’. Greater this factor would result in improved ATM security and hence reduce the threats of all sorts of frauds.
It required to modify ‘’ATM security’’ flow with following equation to take the effect;
ATM security = Bank’s spending to fix vulnurabilities x (ATM security – ATM security obsolescence)
Solution Graph:

System modeling helps in analyzing future statistics of any given scenarion in advance. Fig.8 shows the resulted graph of final solution model simulation for European ATM case. It is combined result of intended consequence, unintended consequence and solution case. The blue coloured graph line is showing the effect of ‘’Bank’s spending for vulnerabilities’’. Customer’s frauds and crook’s frauds in the system are inceasing with passage of time highlighted with red and green lines respectively. The blue line proves our solution loop has the effect to reduce fradulant transaction by introducing Bank’s attention in the form of Bank’s spending for vulnerabilities by improving ATM security.
                                                    ----------------------------------------------------------------
''Copy the following link to your browser's URL to download Vensim for your system.''
Vensim Download.

Watch the video for details about Vensim, how does it work?

No comments:

Post a Comment