SlideShare a Scribd company logo
BBA 4226, Risk Management 1
Course Learning Outcomes for Unit II
Upon completion of this unit, students should be able to:
1. Examine the elements of the risk management process.
1.1 Illustrate the use of the risk management process.
2. Analyze the parameters used to categorize risks.
2.1 Categorize risks based on specific parameters.
Course/Unit
Learning Outcomes
Learning Activity
1.1 Unit II Scholarly Activity
2.1
Chapter 3 reading
Unit lesson
Unit II Scholarly Activity
Reading Assignment
Chapter 3:
Risk
Unit Lesson
We live in interesting and uncertain times, and they are only
going to become more complex and risky as the
future unfolds. Individuals and organizations must adapt to an
increasingly uncertain environment in order to
identify, mitigate, and survive potential damaging risks. Often,
when we think of corporate risks, we think of
natural disasters (e.g., earthquakes and tornados) or even man-
made disasters (e.g., fires or attacks such as
the one on September 11, 2001, an oil spill such as the one
caused by BP in the Gulf of Mexico, or
information technology (IT) security breaches). Yet, we tend to
forget man-made disasters such as the
financial crisis of 2008, which is considered one of the worst
global financial crises of all time because of its
ripple effect around the world. We also tend to overlook
disruptions in the supply chain of corporations that
could be equally distressing to a company’s survival. Because
of the interconnectedness of the world, an
interruption of supplies in one side of the world can have very
disruptive and lasting negative effects in
another side.
In today’s economy, many risks have an effect around the
world. Thus, it is critical that corporations and
governments implement risk management strategies. First,
however, let’s start with defining what risks are all
about.
Risk
Risk is defined as the probability and consequence of not
achieving a specific goal. As an example, can the
project be completed within budget? Risk is the probability of
loss or the expectation of an unfavorable
outcome as a result of a particular action. Risk is really a
measure of future uncertainties or the combination
of an event occurring and the consequences of that event.
Newsome (2014) noted that there are different
standards of risk definitions but settled on risks as the
“changes, effects, and consequences” of an event’s
potential returns (p. 25). Thus, risk is associated with all future
adverse outcomes of an action.
UNIT II STUDY GUIDE
Risk
BBA 4226, Risk Management 2
UNIT x STUDY GUIDE
Title
A good description of risks facilitates the understanding,
identification, and analysis of risks (Newsome, 2014).
A detailed risk definition and description is the first step to
identifying risks. An example of a structured
standardized version of risk description is depicted in Table 3.2
on page 29 of your textbook.
Components of Risk
Risks have three main components: 1) A future cause (yet to
take place), that if corrected prevents a probable
consequence from occurring, 2) risk as a probability of a
potential undesirable event occurring, and 3) the
consequence of the potential future event. A future (not yet
identifiable) root cause is the main reason for the
presence of risk. Risks should not be confused with issues; if a
root cause has already been identified in the
past tense, then it has already occurred. Therefore, it is an issue
to be resolved, but it is not a risk.
Risks are undesirable occurrences that have not yet taken place.
Newsome (2014) provides a formula for risk
that mathematically is represented as risk being the product of
probability (p) and return (R) or consequence,
giving us risk as risk = p x R. Depending on the definition of
risk, another well-known conceptual risk
representation can be defined as a function of uncertainty and
loss (damage) denoted by the equation risk =
(event, uncertainty, damage). Therefore, as uncertainty and
damage increase, so does risk.
Another element of risk is the cause of risk. The presence or
absence of something introduces or causes a
risk. The awareness of the hazard (something) minimizes the
danger of it. As an example, a pothole in the
road presents a greater danger to the unware driver than the
driver who is aware of the hole’s existence and
drives around it. This leads to another conceptual equation of
risk as risk = (hazard, safeguard). For this
course, we will use the broader more accepted definition of risk
as risk = (Probability of an event) times the
(Consequences of an event). This simplified equation evaluates
risk in terms of two distinct elements: 1) the
likelihood that an event will occur and 2) the consequences or
effect of the occurrence of the event.
Analysis of Probability and Consequence
An analysis of risk probability and the consequences of that risk
can be illustrated by estimating the likelihood
of each of the risks occurring in an event. Pinto (2016)
recommended that a risk impact analysis matrix be
used to identify risks prioritized according to the probability of
occurrence. The matrix, shown below, also
depicts the potential consequences of the event. Probability
combined with consequence can provide a better
sense of overall impact to a project.
CORE CONCEPTS
Risk as function of probability and consequence of an event
represented by the equation:
Risk = (Probability of Event) x (Consequences of Event)
BBA 4226, Risk Management 3
UNIT x STUDY GUIDE
Title
The fundamental reason to use a risk matrix is to develop a
better sense of urgency and priority when
addressing potential risk events. Further, a risk matrix helps in
identifying the types of risks that are more
relevant to the success of an endeavor. High risks, those falling
into the high probability and high
consequence quadrant combination, can then adequately be
given priority in the contingency planning when
executing a project. We will be covering the use and advantages
of using a risk matrix to mitigate risks in
future units.
Risks Identification
Most literature on risk management uses “risk analysis and risk
assessment” as an umbrella that includes
both risk identification and risk analysis. For this course, we
will first concentrate on the definition of risk. Risk
analysis helps in identifying and calculating the potential
consequences of risks, but before a risk can be
analyzed or assessed, it must be identified. The goal of risk
identification is to be able to answer the question:
“What can go wrong?” As an example, a given project risk
identification can be initiated by answering the
following questions:
supplier, operational employment, resources,
and dependencies?
th monitoring results, specifically
failures?
against expectations?
In most activities or projects, risk identification is the process
of examining each element to identify the
potential root causes. Risk identification should begin as early
as possible in any future activity and
throughout the lifecycle of any endeavor. As this course
progresses, we will review risk analysis and
assessment leading to the risk management process model
(RMPM).
Summary
As the course progresses, we will examine risks in more detail
along with qualitative and quantitative
techniques to assist us in the proper assessment of risks. Other
tools are available to calculate risk and its
elements, including the different combinations of probability
and consequence. While there are many
approaches on risk analysis, assessment, and mitigation, we will
concentrate on the business and general
concepts of risk management.
References
Newsome, B. (2014). A practical introduction to security and
risk management. Thousand Oaks, CA: Sage.
Pinto, J. K. (2016). Project management: Achieving competitive
advantage (4th ed.). Upper Saddle River, NJ:
Pearson.
Unit II Scholarly Activity
Risk Assessment
Complete the three parts of this assignment.
1. In the space provided below, please provide a description of
your business and your business’s specialty to provide and
introduction and context for the assignment. Your description
should consist of at least 100 words.
2. Using the table provided below, list at least eight risks with
which your business is faced, possible solutions for these risks,
the risk type (P=process, M=marketing, F=financial, H=human
resource, L=legal), and the risk impact to your business (L=low,
M= medium, H=high). Remember that some risks can be
applicable to more than one risk type.
Risk Description
Risk Type
Risk Impact
Potential Action for Improvement
3. Please explain, in a paper of at least 500 words, how you
determined whether each risk was low, medium, or high impact,
and include a more detailed plan for improvement.

More Related Content

Similar to BBA 4226, Risk Management 1 Course Learning Outcomes .docx

Module 1 - Introduction to Risk Management.pdf
Module 1 - Introduction to Risk Management.pdfModule 1 - Introduction to Risk Management.pdf
Module 1 - Introduction to Risk Management.pdf
marjondimafilis
 
Risk
Risk Risk
Project Risk Management Handbook
Project Risk Management HandbookProject Risk Management Handbook
Project Risk Management Handbook
Daniel Ackermann
 
Risk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesRisk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction Industries
IRJET Journal
 
Risk management
Risk managementRisk management
Risk management
Emad Nassar
 
HSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptHSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.ppt
GkMechanical
 
1 This document was originally created on 26th May 2009 .docx
1 This document was originally created on 26th May 2009 .docx1 This document was originally created on 26th May 2009 .docx
1 This document was originally created on 26th May 2009 .docx
karisariddell
 
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docxAbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
ransayo
 
Risk Matrix.docx
Risk Matrix.docxRisk Matrix.docx
Risk Matrix.docx
Shivani54174
 
Risk Management 1 (2)
Risk Management 1 (2)Risk Management 1 (2)
Risk Management Essay
Risk Management EssayRisk Management Essay
11 risk management
11 risk management11 risk management
11 risk management
Waseem Siddique
 
Adopting the Quadratic Mean Process to Quantify the Qualitative Risk Analysis
Adopting the Quadratic Mean Process to Quantify the Qualitative Risk AnalysisAdopting the Quadratic Mean Process to Quantify the Qualitative Risk Analysis
Adopting the Quadratic Mean Process to Quantify the Qualitative Risk Analysis
Ricardo Viana Vargas
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K Sinha
Pankaj K Sinha
 
Risk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationRisk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix Presentation
Usama Saeed
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
Russell Taylor BEng CEng FAPM FIET
 
Comprehensive Overview Of Risk Management
Comprehensive Overview Of Risk ManagementComprehensive Overview Of Risk Management
Comprehensive Overview Of Risk Management
Andrew Valenti
 
Risk Assessment.pptx
Risk Assessment.pptxRisk Assessment.pptx
Risk Assessment.pptx
Divyesh Jha
 
Risk Management
Risk ManagementRisk Management
Risk Management
Kathleen Abubo
 
Project Management - Risk management
Project Management - Risk managementProject Management - Risk management
Project Management - Risk management
Maria Gomez
 

Similar to BBA 4226, Risk Management 1 Course Learning Outcomes .docx (20)

Module 1 - Introduction to Risk Management.pdf
Module 1 - Introduction to Risk Management.pdfModule 1 - Introduction to Risk Management.pdf
Module 1 - Introduction to Risk Management.pdf
 
Risk
Risk Risk
Risk
 
Project Risk Management Handbook
Project Risk Management HandbookProject Risk Management Handbook
Project Risk Management Handbook
 
Risk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesRisk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction Industries
 
Risk management
Risk managementRisk management
Risk management
 
HSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptHSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.ppt
 
1 This document was originally created on 26th May 2009 .docx
1 This document was originally created on 26th May 2009 .docx1 This document was originally created on 26th May 2009 .docx
1 This document was originally created on 26th May 2009 .docx
 
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docxAbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
 
Risk Matrix.docx
Risk Matrix.docxRisk Matrix.docx
Risk Matrix.docx
 
Risk Management 1 (2)
Risk Management 1 (2)Risk Management 1 (2)
Risk Management 1 (2)
 
Risk Management Essay
Risk Management EssayRisk Management Essay
Risk Management Essay
 
11 risk management
11 risk management11 risk management
11 risk management
 
Adopting the Quadratic Mean Process to Quantify the Qualitative Risk Analysis
Adopting the Quadratic Mean Process to Quantify the Qualitative Risk AnalysisAdopting the Quadratic Mean Process to Quantify the Qualitative Risk Analysis
Adopting the Quadratic Mean Process to Quantify the Qualitative Risk Analysis
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K Sinha
 
Risk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationRisk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix Presentation
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Comprehensive Overview Of Risk Management
Comprehensive Overview Of Risk ManagementComprehensive Overview Of Risk Management
Comprehensive Overview Of Risk Management
 
Risk Assessment.pptx
Risk Assessment.pptxRisk Assessment.pptx
Risk Assessment.pptx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Project Management - Risk management
Project Management - Risk managementProject Management - Risk management
Project Management - Risk management
 

More from aryan532920

According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxAccording to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
aryan532920
 
According to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxAccording to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docx
aryan532920
 
According to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxAccording to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docx
aryan532920
 
According to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docxAccording to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docx
aryan532920
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
aryan532920
 
According to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docxAccording to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docx
aryan532920
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docx
aryan532920
 
According to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docxAccording to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docx
aryan532920
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docx
aryan532920
 
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxAccording to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
aryan532920
 
According to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docxAccording to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docx
aryan532920
 
According to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docxAccording to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docx
aryan532920
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
aryan532920
 
According to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docxAccording to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docx
aryan532920
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docx
aryan532920
 
According to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docxAccording to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docx
aryan532920
 
According to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docxAccording to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docx
aryan532920
 
According to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docxAccording to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docx
aryan532920
 
According to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docxAccording to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docx
aryan532920
 
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxAccording to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
aryan532920
 

More from aryan532920 (20)

According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxAccording to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
 
According to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxAccording to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docx
 
According to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxAccording to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docx
 
According to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docxAccording to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docx
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
 
According to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docxAccording to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docx
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docx
 
According to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docxAccording to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docx
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docx
 
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxAccording to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
 
According to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docxAccording to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docx
 
According to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docxAccording to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docx
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
 
According to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docxAccording to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docx
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docx
 
According to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docxAccording to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docx
 
According to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docxAccording to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docx
 
According to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docxAccording to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docx
 
According to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docxAccording to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docx
 
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxAccording to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
 

Recently uploaded

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

BBA 4226, Risk Management 1 Course Learning Outcomes .docx

  • 1. BBA 4226, Risk Management 1 Course Learning Outcomes for Unit II Upon completion of this unit, students should be able to: 1. Examine the elements of the risk management process. 1.1 Illustrate the use of the risk management process. 2. Analyze the parameters used to categorize risks. 2.1 Categorize risks based on specific parameters. Course/Unit Learning Outcomes Learning Activity 1.1 Unit II Scholarly Activity 2.1 Chapter 3 reading Unit lesson Unit II Scholarly Activity Reading Assignment
  • 2. Chapter 3: Risk Unit Lesson We live in interesting and uncertain times, and they are only going to become more complex and risky as the future unfolds. Individuals and organizations must adapt to an increasingly uncertain environment in order to identify, mitigate, and survive potential damaging risks. Often, when we think of corporate risks, we think of natural disasters (e.g., earthquakes and tornados) or even man- made disasters (e.g., fires or attacks such as the one on September 11, 2001, an oil spill such as the one caused by BP in the Gulf of Mexico, or information technology (IT) security breaches). Yet, we tend to forget man-made disasters such as the financial crisis of 2008, which is considered one of the worst global financial crises of all time because of its ripple effect around the world. We also tend to overlook disruptions in the supply chain of corporations that could be equally distressing to a company’s survival. Because of the interconnectedness of the world, an interruption of supplies in one side of the world can have very disruptive and lasting negative effects in another side. In today’s economy, many risks have an effect around the world. Thus, it is critical that corporations and governments implement risk management strategies. First, however, let’s start with defining what risks are all about.
  • 3. Risk Risk is defined as the probability and consequence of not achieving a specific goal. As an example, can the project be completed within budget? Risk is the probability of loss or the expectation of an unfavorable outcome as a result of a particular action. Risk is really a measure of future uncertainties or the combination of an event occurring and the consequences of that event. Newsome (2014) noted that there are different standards of risk definitions but settled on risks as the “changes, effects, and consequences” of an event’s potential returns (p. 25). Thus, risk is associated with all future adverse outcomes of an action. UNIT II STUDY GUIDE Risk BBA 4226, Risk Management 2 UNIT x STUDY GUIDE Title A good description of risks facilitates the understanding, identification, and analysis of risks (Newsome, 2014). A detailed risk definition and description is the first step to identifying risks. An example of a structured standardized version of risk description is depicted in Table 3.2
  • 4. on page 29 of your textbook. Components of Risk Risks have three main components: 1) A future cause (yet to take place), that if corrected prevents a probable consequence from occurring, 2) risk as a probability of a potential undesirable event occurring, and 3) the consequence of the potential future event. A future (not yet identifiable) root cause is the main reason for the presence of risk. Risks should not be confused with issues; if a root cause has already been identified in the past tense, then it has already occurred. Therefore, it is an issue to be resolved, but it is not a risk. Risks are undesirable occurrences that have not yet taken place. Newsome (2014) provides a formula for risk that mathematically is represented as risk being the product of probability (p) and return (R) or consequence, giving us risk as risk = p x R. Depending on the definition of risk, another well-known conceptual risk representation can be defined as a function of uncertainty and loss (damage) denoted by the equation risk = (event, uncertainty, damage). Therefore, as uncertainty and damage increase, so does risk. Another element of risk is the cause of risk. The presence or absence of something introduces or causes a risk. The awareness of the hazard (something) minimizes the danger of it. As an example, a pothole in the road presents a greater danger to the unware driver than the driver who is aware of the hole’s existence and drives around it. This leads to another conceptual equation of risk as risk = (hazard, safeguard). For this course, we will use the broader more accepted definition of risk as risk = (Probability of an event) times the
  • 5. (Consequences of an event). This simplified equation evaluates risk in terms of two distinct elements: 1) the likelihood that an event will occur and 2) the consequences or effect of the occurrence of the event. Analysis of Probability and Consequence An analysis of risk probability and the consequences of that risk can be illustrated by estimating the likelihood of each of the risks occurring in an event. Pinto (2016) recommended that a risk impact analysis matrix be used to identify risks prioritized according to the probability of occurrence. The matrix, shown below, also depicts the potential consequences of the event. Probability combined with consequence can provide a better sense of overall impact to a project. CORE CONCEPTS Risk as function of probability and consequence of an event represented by the equation: Risk = (Probability of Event) x (Consequences of Event) BBA 4226, Risk Management 3 UNIT x STUDY GUIDE Title
  • 6. The fundamental reason to use a risk matrix is to develop a better sense of urgency and priority when addressing potential risk events. Further, a risk matrix helps in identifying the types of risks that are more relevant to the success of an endeavor. High risks, those falling into the high probability and high consequence quadrant combination, can then adequately be given priority in the contingency planning when executing a project. We will be covering the use and advantages of using a risk matrix to mitigate risks in future units. Risks Identification Most literature on risk management uses “risk analysis and risk assessment” as an umbrella that includes both risk identification and risk analysis. For this course, we will first concentrate on the definition of risk. Risk analysis helps in identifying and calculating the potential consequences of risks, but before a risk can be analyzed or assessed, it must be identified. The goal of risk identification is to be able to answer the question: “What can go wrong?” As an example, a given project risk identification can be initiated by answering the following questions: supplier, operational employment, resources, and dependencies? th monitoring results, specifically failures?
  • 7. against expectations? In most activities or projects, risk identification is the process of examining each element to identify the potential root causes. Risk identification should begin as early as possible in any future activity and throughout the lifecycle of any endeavor. As this course progresses, we will review risk analysis and assessment leading to the risk management process model (RMPM). Summary As the course progresses, we will examine risks in more detail along with qualitative and quantitative techniques to assist us in the proper assessment of risks. Other tools are available to calculate risk and its elements, including the different combinations of probability and consequence. While there are many approaches on risk analysis, assessment, and mitigation, we will concentrate on the business and general concepts of risk management. References Newsome, B. (2014). A practical introduction to security and risk management. Thousand Oaks, CA: Sage. Pinto, J. K. (2016). Project management: Achieving competitive advantage (4th ed.). Upper Saddle River, NJ: Pearson.
  • 8. Unit II Scholarly Activity Risk Assessment Complete the three parts of this assignment. 1. In the space provided below, please provide a description of your business and your business’s specialty to provide and introduction and context for the assignment. Your description should consist of at least 100 words. 2. Using the table provided below, list at least eight risks with which your business is faced, possible solutions for these risks, the risk type (P=process, M=marketing, F=financial, H=human
  • 9. resource, L=legal), and the risk impact to your business (L=low, M= medium, H=high). Remember that some risks can be applicable to more than one risk type. Risk Description Risk Type Risk Impact Potential Action for Improvement
  • 10. 3. Please explain, in a paper of at least 500 words, how you determined whether each risk was low, medium, or high impact, and include a more detailed plan for improvement.