SlideShare a Scribd company logo
1 of 17
MANAGING SPECIALIZED
RISK
MANAGING PROPERTY RISK
• AVOIDING PROPERTY RISK
- Risk control measures that may be applied in the management of property risks
include risk avoidance and risk reduction
-The opportunities for avoiding property risks is limited by the organization’s need
for assets required to achieve its objectives
-The organization requires assets to achieve its goals and while the cost of risk
associated with these assets can be reduced, it can rarely avoided
• NONINSURANCE TRANSFERS
-Under the terms of a lease, represent a common method of managing property
risks
For example:
At termination of this lease, lessee shall return the property to the lessor in the
same condition as at the commencement of the lease, natural wear and tear only
expected
-By agreeing to return the premises in the same condition as the commencement
of the lease, the lessee has, in effect, taken on the risk of damage from all perils.
-Note that negligence is not a consideration. If the property is damaged or
destroyed by any cause-other than normal wear and tear-the lessee become
responsible for restoration.
-Responsibility for insuring the property (or otherwise financing the risk of
damage) is shifted from the lessor to the lessee
• FIRE PREVENTION AND LOSS CONTROL
- Analyzing fire hazards
-Factors in fire losses
-Fire insurance Rating Systems
-Housekeeping
-Automatic Sprinkler System
• RISK CONTROL MEASURES FOR OTHER PERILS
-Windstorm and hail-Obvious strategy of locating away from areas with frequent
severe storms, wind-resistive structure s represent the most effective strategy.
Buildings with large areas of glass or inadequately anchored roof surfacing are
more susceptible to wind-storm damage than structures without these
vulnerabilities
-Explosions-include combustion explosions from the ignition of gases, dust, or
other explosive materials or from pressure devices. Can use automatic fire
extinguishing system or explosion suppressions equipment
-Water damage-inspection and maintenance of plumbing system and roofs,
windows, and doors as the control measures. Also can be protect by coverings and
by skidding. Skidding means the storage of property on wooden pallets or skids.
-Vandalism and Malicious Mischief-committed by children and young adult areas
with large populations of children. Can avoid with security personnel and
perimeter security as an effective loss control measures
-Earthquake-avoid with earthquake-prone areas and also another way is with
earthquake-resistant construction
-Boiler Explosion and Machinery Hazards-Always do the inspection and
maintenance and insures under a boiler and machinery policy by qualified
insurance company engineers to determine their operating condition and to be
sure that such equipment meets the engineering requirements of the insurer.
-Salvage Operations-Salvage refer to the residual value of property that has been
damaged. Salvaging is the cost of saving property from loss, during and after the
occurrence of damage. Salvage operations include separating and putting under
damaged property in order, inventorying, reconditioning, and selling the salvage.
• PROPERTY RISK FINANCING
-Refer to the insurance coverage that is available to the risk manager when dealing
with property exposures. Can be in direct, which consists of the loss of the asset
itself and indirect, which results from loss of use of the asset
-Fire insurance is the standard policy for insuring most types of business property.
-Fire coverage is provided for:
a) Building
b) Personal Property
c) Personal Property of Others
MANAGING CRIME RISK
• No one knows exactly how much business organization loses to crime each year
• Happen maybe because do not have a good record and inventory management
and does not realize how much merchandise is unaccounted for.
-CRIMES AGAINST BUSINESS-are classified according to the perpetrator as
employee crime and nonemployee crime(burglary, robbery, shoplifting, forgery
and bad cheque)
-LOSS CONTROL AND CRIME-because criminal acts of people, techniques aimed at
preventing criminal loss are effective in two respects, first they make criminal acts
more difficult for those who are inclined to commit such acts and by making the
acts more difficult, loss prevention and control measures discourage attempts by
criminals
Employee Crime
• The Deterrence Factors
• Employee Dishonesty Loss Control
• Selection of Employees
• Internal control
• Cash Control Procedures
• Disbursement Procedures
• Accounts Receivable and Sales Procedures
• Procedures for Purchasing, Receiving, and Accounts Payable
• Audits
• Prosecution of Dishonest Employees
Nonemployee Crime Loss
• Much nonemployee crime is “crime of opportunity”
-Barriers
-Burglar Alarm System
-Types of Alarm System
-Alarm Transmission Lines
-Nighttime Security
-Holdup alarm systems
-Cash Handling
-Safe Security
-Merchandise Security (Shoplifting)
-Other physical security measures( guards, use of dogs for Asset Protection, Closed-
circuit Television and Computer Security)
MANAGING THE E-RISKS
• The risk associated with e-mail, electronic fraud, and system penetration requires
special attention.
a) E-MAIL RISK MANAGEMENT-it is widely recommended that the following policies to be
imposed:
-Prohibiting the downloading of offensive material
-Barring the sending of offensive e-mail
-Warning against the sending of commercially confidential material
-Ensuring that e-mails have a suitable disclaimer
-Providing their employees with a clear indication of the circumstances under which e-
mail will be monitored
-Making it clear that all e-mail attachments that originate from outside of the
organization should be scanned for viruses before opening
-Warning staff that e-mails are classified as documents and can be used in court law;
and
-Notifying staff that a breach of the e-mail policy may lead to disciplinary action and
possibility their dismissal
b) MANAGING THE FINANCIAL RISKS OF AN E-BUSINESS
-It is very important to know and to understand how online developments will
enhance profitability
-In a e-business venture, without thinking where the profits will come was one of
the principal reasons why so many dotcom company failed.
-First, it is essentials that the existing business processes are reviewed to
understand how online developments will enhance profitability
-Second, it is important to understand key drivers in the e-business.
-Third, a project plan for e-business should be developed
- Finally, once operational, it is essential that key performance indicators are
established that allow the organization to monitor the financial position.
c) DEVELOPING A RELIABLE INTERNET PRESENCE
- Organization needs to adopt the following strategies to ensure that they deliver
an end product that their customers will use
-Maintain a strategic perspective – helps to guard against over-commitment
-Never compromise on testing – failing to test internet applications thoroughly can
be highly damaging.
d) ONLINE FRAUD
-Need to recognize the warning signs and then check the sale to assess whether
there is deliberate attempt to defraud the company of its services. Example of
warning signs :
• Larger than normal orders
• Order containing more than one of the same items
• Urgent orders
• Shipping orders to an address other than the billing address
d) UNAUTHORIZED ACCESS
-very important to understand and manage the risk associated with unauthorized
access because the increasing connectivity with globalization
-must understand the threats, includes hackers, vendor/suppliers, ex-employees,
business rivals, foreign government agents, subcontractors and others
-to assess the motivations of the threat by analyzing why they would want to hack
your computers
-Strongly recommended:
* Administrative Security-establish basic rules for internet use and training
all staff
*Operational Security-underwriting the security of the organization’s system
and data
*Physical Security-creation of standards for all systems that are connected
with internet
*Other security measures-internal computer forensics
Managing Technical Risk
• Involve how to manage risks of bringing a new technology product to the market
• Few strategies for dealing with the combination of technical failure and market
failure when introducing new technology product:
- Obsolete Technology
-Innovative product development
Product Licensing
Product Collaboration
Product Pattern
Managing International Risk
• Transnational corporations have had to become better at managing the risk associated
with the environment, the exploitation of their workforce and their presence in
countries with poor human right or which are war-torn or corrupt
• More challenging than domestic firm
• There are 6 main categories to country risk
-Economic Risk
-Transfer Risk
-Exchange Risk
-location or neighborhood risk
-Sovereign risk
The risk that a foreign central bank will alter its foreign-exchange regulations thereby
significantly reducing or completely nulling the value of foreign-exchange contracts.
This is one of the many risks that an investor faces when holding forex contracts.
Additionally an investor is exposed to interest-rate risk, price risk and liquidity risk
amongst others
-Political Risk
• How depend very mush on the nature of the relationship the organization has with the
countries with which it trades
Crisis Management
• Threats may originate in the economic, environmental, socio-cultural and political
domains.
• Nowadays, there is growing concerns for terrorism and health threat.
• When these threats are realized, the existence of crisis management mechanism
provides the means to
-mitigate the impact of the loss
-contain the loss
-response and control the situation and effectively
-resolve or recover from the crisis situation
• A crisis situation involves:
-a threat to resources and people
-a loss of control
-visible and/or invisible effect on people, resources and organizations
Example of CRISIS
• The terrorist attacks of September 11 2011, resulting in the
loss of lives, the destruction of property and the failure of
companies left without physical offices, resources, employees
or stock.
• Some others related with the security of client data or the
image of a company that fails to deliver on promise, while
others attack the health and well-being of both employees
and clients, and even the very existence of a company or
organization

More Related Content

What's hot

Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)rafeeqameen
 
Risk & Risk Management
Risk & Risk ManagementRisk & Risk Management
Risk & Risk Managementansula
 
risk management
risk managementrisk management
risk managementQue Tomeyz
 
Rejda chapter 1 slides risk and its treatment
Rejda chapter 1 slides   risk and its treatmentRejda chapter 1 slides   risk and its treatment
Rejda chapter 1 slides risk and its treatmentnlmccready
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptaminrahman34
 
Crisis & Risk Management for Companies Training by University of Alexandria
Crisis & Risk Management for Companies Training by University of AlexandriaCrisis & Risk Management for Companies Training by University of Alexandria
Crisis & Risk Management for Companies Training by University of AlexandriaAtlantic Training, LLC.
 
Risk Management
Risk ManagementRisk Management
Risk ManagementShahan Ullah
 
RisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNT
RisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNTRisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNT
RisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNTSonu Sah
 
Corporate Risk Management
Corporate Risk ManagementCorporate Risk Management
Corporate Risk ManagementShravan Bhumkar
 
Risk mangement
Risk mangementRisk mangement
Risk mangementcollege
 
Equity - Types of Risk
Equity - Types of RiskEquity - Types of Risk
Equity - Types of Riskflame2011
 
Chapter 1 - Risk Management - 2nd Semester - M.Com - Bangalore University
Chapter 1 - Risk Management - 2nd Semester - M.Com - Bangalore UniversityChapter 1 - Risk Management - 2nd Semester - M.Com - Bangalore University
Chapter 1 - Risk Management - 2nd Semester - M.Com - Bangalore UniversitySwaminath Sam
 
Risk terminologies
Risk terminologiesRisk terminologies
Risk terminologiesAnand kumar
 
Risk Management in Business
Risk Management in BusinessRisk Management in Business
Risk Management in Businesspaperpublications3
 

What's hot (19)

Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
 
Risk financing
Risk financingRisk financing
Risk financing
 
Risk & Risk Management
Risk & Risk ManagementRisk & Risk Management
Risk & Risk Management
 
risk management
risk managementrisk management
risk management
 
Rejda chapter 1 slides risk and its treatment
Rejda chapter 1 slides   risk and its treatmentRejda chapter 1 slides   risk and its treatment
Rejda chapter 1 slides risk and its treatment
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
Unit 1 rmi
Unit 1 rmiUnit 1 rmi
Unit 1 rmi
 
Types of-risk
Types of-riskTypes of-risk
Types of-risk
 
Crisis & Risk Management for Companies Training by University of Alexandria
Crisis & Risk Management for Companies Training by University of AlexandriaCrisis & Risk Management for Companies Training by University of Alexandria
Crisis & Risk Management for Companies Training by University of Alexandria
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
RisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNT
RisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNTRisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNT
RisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNT
 
Corporate Risk Management
Corporate Risk ManagementCorporate Risk Management
Corporate Risk Management
 
risk.ppt
risk.pptrisk.ppt
risk.ppt
 
Risk mangement
Risk mangementRisk mangement
Risk mangement
 
Equity - Types of Risk
Equity - Types of RiskEquity - Types of Risk
Equity - Types of Risk
 
Chapter 1 - Risk Management - 2nd Semester - M.Com - Bangalore University
Chapter 1 - Risk Management - 2nd Semester - M.Com - Bangalore UniversityChapter 1 - Risk Management - 2nd Semester - M.Com - Bangalore University
Chapter 1 - Risk Management - 2nd Semester - M.Com - Bangalore University
 
Risk terminologies
Risk terminologiesRisk terminologies
Risk terminologies
 
Risk Management in Business
Risk Management in BusinessRisk Management in Business
Risk Management in Business
 
Residual risk financing
Residual risk financingResidual risk financing
Residual risk financing
 

Viewers also liked

L5 fpe3203 23_march_2015-1
L5 fpe3203 23_march_2015-1L5 fpe3203 23_march_2015-1
L5 fpe3203 23_march_2015-1Rione Drevale
 
Water science l3 available soil water 150912ed
Water science l3 available soil water 150912edWater science l3 available soil water 150912ed
Water science l3 available soil water 150912edRione Drevale
 
Fpt 3163 water_science_chapter_4_level_survey
Fpt 3163 water_science_chapter_4_level_surveyFpt 3163 water_science_chapter_4_level_survey
Fpt 3163 water_science_chapter_4_level_surveyRione Drevale
 
Intrapreneur 1
Intrapreneur 1Intrapreneur 1
Intrapreneur 1Rione Drevale
 
Silibus algebra.doc
Silibus algebra.docSilibus algebra.doc
Silibus algebra.docRione Drevale
 
Ch emistry 100-spring_2012_course outline
Ch emistry 100-spring_2012_course outlineCh emistry 100-spring_2012_course outline
Ch emistry 100-spring_2012_course outlineRione Drevale
 
Calculus b2 course info
Calculus b2 course infoCalculus b2 course info
Calculus b2 course infoRione Drevale
 
Biochemistry and algebra
Biochemistry and algebraBiochemistry and algebra
Biochemistry and algebraRione Drevale
 
Bft 1023-biodiversity-sep2012
Bft 1023-biodiversity-sep2012Bft 1023-biodiversity-sep2012
Bft 1023-biodiversity-sep2012Rione Drevale
 
W1 intro plant_tc
W1 intro plant_tcW1 intro plant_tc
W1 intro plant_tcRione Drevale
 
Ch 12.2 income statement1
Ch 12.2 income statement1Ch 12.2 income statement1
Ch 12.2 income statement1Rione Drevale
 
Strategic entrepreneurship tempelate
Strategic entrepreneurship tempelateStrategic entrepreneurship tempelate
Strategic entrepreneurship tempelateRione Drevale
 
L3 amp l4_fpe3203
L3 amp l4_fpe3203L3 amp l4_fpe3203
L3 amp l4_fpe3203Rione Drevale
 
Risk management chpt 3 and 9
Risk management chpt  3 and 9Risk management chpt  3 and 9
Risk management chpt 3 and 9Rione Drevale
 
Banana acclimatization
Banana acclimatizationBanana acclimatization
Banana acclimatizationRione Drevale
 
Silibus kalkulus
Silibus kalkulusSilibus kalkulus
Silibus kalkulusRione Drevale
 

Viewers also liked (20)

L5 fpe3203 23_march_2015-1
L5 fpe3203 23_march_2015-1L5 fpe3203 23_march_2015-1
L5 fpe3203 23_march_2015-1
 
Water science l3 available soil water 150912ed
Water science l3 available soil water 150912edWater science l3 available soil water 150912ed
Water science l3 available soil water 150912ed
 
Fpt 3163 water_science_chapter_4_level_survey
Fpt 3163 water_science_chapter_4_level_surveyFpt 3163 water_science_chapter_4_level_survey
Fpt 3163 water_science_chapter_4_level_survey
 
Ch 10 budget
Ch 10 budgetCh 10 budget
Ch 10 budget
 
Intrapreneur 1
Intrapreneur 1Intrapreneur 1
Intrapreneur 1
 
Silibus algebra.doc
Silibus algebra.docSilibus algebra.doc
Silibus algebra.doc
 
Biodiversity
BiodiversityBiodiversity
Biodiversity
 
L2 fpe3203
L2 fpe3203L2 fpe3203
L2 fpe3203
 
Ch emistry 100-spring_2012_course outline
Ch emistry 100-spring_2012_course outlineCh emistry 100-spring_2012_course outline
Ch emistry 100-spring_2012_course outline
 
Calculus b2 course info
Calculus b2 course infoCalculus b2 course info
Calculus b2 course info
 
Biochemistry and algebra
Biochemistry and algebraBiochemistry and algebra
Biochemistry and algebra
 
Bft 1023-biodiversity-sep2012
Bft 1023-biodiversity-sep2012Bft 1023-biodiversity-sep2012
Bft 1023-biodiversity-sep2012
 
W1 intro plant_tc
W1 intro plant_tcW1 intro plant_tc
W1 intro plant_tc
 
Ch 12.2 income statement1
Ch 12.2 income statement1Ch 12.2 income statement1
Ch 12.2 income statement1
 
Strategic entrepreneurship tempelate
Strategic entrepreneurship tempelateStrategic entrepreneurship tempelate
Strategic entrepreneurship tempelate
 
Arntzen
ArntzenArntzen
Arntzen
 
L3 amp l4_fpe3203
L3 amp l4_fpe3203L3 amp l4_fpe3203
L3 amp l4_fpe3203
 
Risk management chpt 3 and 9
Risk management chpt  3 and 9Risk management chpt  3 and 9
Risk management chpt 3 and 9
 
Banana acclimatization
Banana acclimatizationBanana acclimatization
Banana acclimatization
 
Silibus kalkulus
Silibus kalkulusSilibus kalkulus
Silibus kalkulus
 

Similar to Managing specialized risk_14

TOPIC 3.ppt
TOPIC 3.pptTOPIC 3.ppt
TOPIC 3.pptFaroqOmar1
 
Rm 05
Rm 05Rm 05
Rm 05tomkacy
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
 
Rm 05-v2
Rm 05-v2Rm 05-v2
Rm 05-v2tomkacy
 
Political Risk Assesment-Lecture-02(Helen Deresky)
Political Risk Assesment-Lecture-02(Helen Deresky)Political Risk Assesment-Lecture-02(Helen Deresky)
Political Risk Assesment-Lecture-02(Helen Deresky)Shifur Rahman
 
Insurance Risk
Insurance RiskInsurance Risk
Insurance RiskHafeez Farooq
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk managementG3 intelligence Ltd
 
CONCEPT OF RISK AND UNCERTAINITY.pptx
CONCEPT OF RISK AND UNCERTAINITY.pptxCONCEPT OF RISK AND UNCERTAINITY.pptx
CONCEPT OF RISK AND UNCERTAINITY.pptxobediBwambale1
 
Financial Risk Management & Methodologies.pptx
Financial Risk Management & Methodologies.pptxFinancial Risk Management & Methodologies.pptx
Financial Risk Management & Methodologies.pptxVedansh Bokolia
 
Safety and risk
Safety and riskSafety and risk
Safety and riskSKS
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Chinatu Uzuegbu
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
Risk-benefit analysis
Risk-benefit analysisRisk-benefit analysis
Risk-benefit analysisSKS
 
Introduction to risk management for economic
Introduction to risk management for economicIntroduction to risk management for economic
Introduction to risk management for economicCaamirCusmaanCaamir
 
Ir s 1_2_1_kovacs
Ir s 1_2_1_kovacsIr s 1_2_1_kovacs
Ir s 1_2_1_kovacsStefan Kovacs
 
My_notes_part1.pdf
My_notes_part1.pdfMy_notes_part1.pdf
My_notes_part1.pdfPhilLopez4
 

Similar to Managing specialized risk_14 (20)

TOPIC 3.ppt
TOPIC 3.pptTOPIC 3.ppt
TOPIC 3.ppt
 
Rm 05
Rm 05Rm 05
Rm 05
 
Business risks ok
Business risks okBusiness risks ok
Business risks ok
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
Rm 05-v2
Rm 05-v2Rm 05-v2
Rm 05-v2
 
Political Risk Assesment-Lecture-02(Helen Deresky)
Political Risk Assesment-Lecture-02(Helen Deresky)Political Risk Assesment-Lecture-02(Helen Deresky)
Political Risk Assesment-Lecture-02(Helen Deresky)
 
business risk
business riskbusiness risk
business risk
 
Insurance Risk
Insurance RiskInsurance Risk
Insurance Risk
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
 
Risk Management System
Risk Management System Risk Management System
Risk Management System
 
CONCEPT OF RISK AND UNCERTAINITY.pptx
CONCEPT OF RISK AND UNCERTAINITY.pptxCONCEPT OF RISK AND UNCERTAINITY.pptx
CONCEPT OF RISK AND UNCERTAINITY.pptx
 
Financial Risk Management & Methodologies.pptx
Financial Risk Management & Methodologies.pptxFinancial Risk Management & Methodologies.pptx
Financial Risk Management & Methodologies.pptx
 
Safety and risk
Safety and riskSafety and risk
Safety and risk
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
Risk-benefit analysis
Risk-benefit analysisRisk-benefit analysis
Risk-benefit analysis
 
Introduction to risk management for economic
Introduction to risk management for economicIntroduction to risk management for economic
Introduction to risk management for economic
 
Ir s 1_2_1_kovacs
Ir s 1_2_1_kovacsIr s 1_2_1_kovacs
Ir s 1_2_1_kovacs
 
Risk control types Slides
Risk control types SlidesRisk control types Slides
Risk control types Slides
 
My_notes_part1.pdf
My_notes_part1.pdfMy_notes_part1.pdf
My_notes_part1.pdf
 

More from Rione Drevale

Risk financing
Risk financingRisk financing
Risk financingRione Drevale
 
Sign and symptoms in crops
Sign and symptoms in cropsSign and symptoms in crops
Sign and symptoms in cropsRione Drevale
 
Chapter 4 risk
Chapter 4 riskChapter 4 risk
Chapter 4 riskRione Drevale
 
Agricultural technology upscaling_1
Agricultural technology upscaling_1Agricultural technology upscaling_1
Agricultural technology upscaling_1Rione Drevale
 
Water science l2 cwr final full ed
Water science l2 cwr final full edWater science l2 cwr final full ed
Water science l2 cwr final full edRione Drevale
 
W2 lab design_new2
W2 lab design_new2W2 lab design_new2
W2 lab design_new2Rione Drevale
 
Chapter 4 risk
Chapter 4 riskChapter 4 risk
Chapter 4 riskRione Drevale
 
Chapter 1 risk management
Chapter 1 risk managementChapter 1 risk management
Chapter 1 risk managementRione Drevale
 
Fpt 2093 soil_science_week_14_soil_fertility_evaluation
Fpt 2093 soil_science_week_14_soil_fertility_evaluationFpt 2093 soil_science_week_14_soil_fertility_evaluation
Fpt 2093 soil_science_week_14_soil_fertility_evaluationRione Drevale
 
Fpt 2093 soil_science_week_13_plant_nutrition
Fpt 2093 soil_science_week_13_plant_nutritionFpt 2093 soil_science_week_13_plant_nutrition
Fpt 2093 soil_science_week_13_plant_nutritionRione Drevale
 
Fpt 2093 soil_science_week_10_soil_taxonomy
Fpt 2093 soil_science_week_10_soil_taxonomyFpt 2093 soil_science_week_10_soil_taxonomy
Fpt 2093 soil_science_week_10_soil_taxonomyRione Drevale
 
Fpt 2093 soil_science_week_6_factors_amp_processes_of_soil_formation
Fpt 2093 soil_science_week_6_factors_amp_processes_of_soil_formationFpt 2093 soil_science_week_6_factors_amp_processes_of_soil_formation
Fpt 2093 soil_science_week_6_factors_amp_processes_of_soil_formationRione Drevale
 
Week 3 agrotourism
Week 3   agrotourismWeek 3   agrotourism
Week 3 agrotourismRione Drevale
 
Week 1 agribusiness and entrepreneurship
Week 1 agribusiness and entrepreneurshipWeek 1 agribusiness and entrepreneurship
Week 1 agribusiness and entrepreneurshipRione Drevale
 
Processing manufacturing-on-animal
Processing manufacturing-on-animalProcessing manufacturing-on-animal
Processing manufacturing-on-animalRione Drevale
 

More from Rione Drevale (17)

Risk financing
Risk financingRisk financing
Risk financing
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Sign and symptoms in crops
Sign and symptoms in cropsSign and symptoms in crops
Sign and symptoms in crops
 
Chapter 4 risk
Chapter 4 riskChapter 4 risk
Chapter 4 risk
 
Agricultural technology upscaling_1
Agricultural technology upscaling_1Agricultural technology upscaling_1
Agricultural technology upscaling_1
 
Water science l2 cwr final full ed
Water science l2 cwr final full edWater science l2 cwr final full ed
Water science l2 cwr final full ed
 
W2 lab design_new2
W2 lab design_new2W2 lab design_new2
W2 lab design_new2
 
Chapter 4 risk
Chapter 4 riskChapter 4 risk
Chapter 4 risk
 
Chapter 1 risk management
Chapter 1 risk managementChapter 1 risk management
Chapter 1 risk management
 
Fpt 2093 soil_science_week_14_soil_fertility_evaluation
Fpt 2093 soil_science_week_14_soil_fertility_evaluationFpt 2093 soil_science_week_14_soil_fertility_evaluation
Fpt 2093 soil_science_week_14_soil_fertility_evaluation
 
Fpt 2093 soil_science_week_13_plant_nutrition
Fpt 2093 soil_science_week_13_plant_nutritionFpt 2093 soil_science_week_13_plant_nutrition
Fpt 2093 soil_science_week_13_plant_nutrition
 
Fpt 2093 soil_science_week_10_soil_taxonomy
Fpt 2093 soil_science_week_10_soil_taxonomyFpt 2093 soil_science_week_10_soil_taxonomy
Fpt 2093 soil_science_week_10_soil_taxonomy
 
Fpt 2093 soil_science_week_6_factors_amp_processes_of_soil_formation
Fpt 2093 soil_science_week_6_factors_amp_processes_of_soil_formationFpt 2093 soil_science_week_6_factors_amp_processes_of_soil_formation
Fpt 2093 soil_science_week_6_factors_amp_processes_of_soil_formation
 
Week 3 agrotourism
Week 3   agrotourismWeek 3   agrotourism
Week 3 agrotourism
 
Week 1 agribusiness and entrepreneurship
Week 1 agribusiness and entrepreneurshipWeek 1 agribusiness and entrepreneurship
Week 1 agribusiness and entrepreneurship
 
Supply chain
Supply chainSupply chain
Supply chain
 
Processing manufacturing-on-animal
Processing manufacturing-on-animalProcessing manufacturing-on-animal
Processing manufacturing-on-animal
 

Recently uploaded

Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Recently uploaded (20)

Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

Managing specialized risk_14

  • 2. MANAGING PROPERTY RISK • AVOIDING PROPERTY RISK - Risk control measures that may be applied in the management of property risks include risk avoidance and risk reduction -The opportunities for avoiding property risks is limited by the organization’s need for assets required to achieve its objectives -The organization requires assets to achieve its goals and while the cost of risk associated with these assets can be reduced, it can rarely avoided • NONINSURANCE TRANSFERS -Under the terms of a lease, represent a common method of managing property risks For example: At termination of this lease, lessee shall return the property to the lessor in the same condition as at the commencement of the lease, natural wear and tear only expected
  • 3. -By agreeing to return the premises in the same condition as the commencement of the lease, the lessee has, in effect, taken on the risk of damage from all perils. -Note that negligence is not a consideration. If the property is damaged or destroyed by any cause-other than normal wear and tear-the lessee become responsible for restoration. -Responsibility for insuring the property (or otherwise financing the risk of damage) is shifted from the lessor to the lessee • FIRE PREVENTION AND LOSS CONTROL - Analyzing fire hazards -Factors in fire losses -Fire insurance Rating Systems -Housekeeping -Automatic Sprinkler System
  • 4. • RISK CONTROL MEASURES FOR OTHER PERILS -Windstorm and hail-Obvious strategy of locating away from areas with frequent severe storms, wind-resistive structure s represent the most effective strategy. Buildings with large areas of glass or inadequately anchored roof surfacing are more susceptible to wind-storm damage than structures without these vulnerabilities -Explosions-include combustion explosions from the ignition of gases, dust, or other explosive materials or from pressure devices. Can use automatic fire extinguishing system or explosion suppressions equipment -Water damage-inspection and maintenance of plumbing system and roofs, windows, and doors as the control measures. Also can be protect by coverings and by skidding. Skidding means the storage of property on wooden pallets or skids.
  • 5. -Vandalism and Malicious Mischief-committed by children and young adult areas with large populations of children. Can avoid with security personnel and perimeter security as an effective loss control measures -Earthquake-avoid with earthquake-prone areas and also another way is with earthquake-resistant construction -Boiler Explosion and Machinery Hazards-Always do the inspection and maintenance and insures under a boiler and machinery policy by qualified insurance company engineers to determine their operating condition and to be sure that such equipment meets the engineering requirements of the insurer. -Salvage Operations-Salvage refer to the residual value of property that has been damaged. Salvaging is the cost of saving property from loss, during and after the occurrence of damage. Salvage operations include separating and putting under damaged property in order, inventorying, reconditioning, and selling the salvage.
  • 6. • PROPERTY RISK FINANCING -Refer to the insurance coverage that is available to the risk manager when dealing with property exposures. Can be in direct, which consists of the loss of the asset itself and indirect, which results from loss of use of the asset -Fire insurance is the standard policy for insuring most types of business property. -Fire coverage is provided for: a) Building b) Personal Property c) Personal Property of Others
  • 7. MANAGING CRIME RISK • No one knows exactly how much business organization loses to crime each year • Happen maybe because do not have a good record and inventory management and does not realize how much merchandise is unaccounted for. -CRIMES AGAINST BUSINESS-are classified according to the perpetrator as employee crime and nonemployee crime(burglary, robbery, shoplifting, forgery and bad cheque) -LOSS CONTROL AND CRIME-because criminal acts of people, techniques aimed at preventing criminal loss are effective in two respects, first they make criminal acts more difficult for those who are inclined to commit such acts and by making the acts more difficult, loss prevention and control measures discourage attempts by criminals
  • 8. Employee Crime • The Deterrence Factors • Employee Dishonesty Loss Control • Selection of Employees • Internal control • Cash Control Procedures • Disbursement Procedures • Accounts Receivable and Sales Procedures • Procedures for Purchasing, Receiving, and Accounts Payable • Audits • Prosecution of Dishonest Employees
  • 9. Nonemployee Crime Loss • Much nonemployee crime is “crime of opportunity” -Barriers -Burglar Alarm System -Types of Alarm System -Alarm Transmission Lines -Nighttime Security -Holdup alarm systems -Cash Handling -Safe Security -Merchandise Security (Shoplifting) -Other physical security measures( guards, use of dogs for Asset Protection, Closed- circuit Television and Computer Security)
  • 10. MANAGING THE E-RISKS • The risk associated with e-mail, electronic fraud, and system penetration requires special attention. a) E-MAIL RISK MANAGEMENT-it is widely recommended that the following policies to be imposed: -Prohibiting the downloading of offensive material -Barring the sending of offensive e-mail -Warning against the sending of commercially confidential material -Ensuring that e-mails have a suitable disclaimer -Providing their employees with a clear indication of the circumstances under which e- mail will be monitored -Making it clear that all e-mail attachments that originate from outside of the organization should be scanned for viruses before opening -Warning staff that e-mails are classified as documents and can be used in court law; and -Notifying staff that a breach of the e-mail policy may lead to disciplinary action and possibility their dismissal
  • 11. b) MANAGING THE FINANCIAL RISKS OF AN E-BUSINESS -It is very important to know and to understand how online developments will enhance profitability -In a e-business venture, without thinking where the profits will come was one of the principal reasons why so many dotcom company failed. -First, it is essentials that the existing business processes are reviewed to understand how online developments will enhance profitability -Second, it is important to understand key drivers in the e-business. -Third, a project plan for e-business should be developed - Finally, once operational, it is essential that key performance indicators are established that allow the organization to monitor the financial position.
  • 12. c) DEVELOPING A RELIABLE INTERNET PRESENCE - Organization needs to adopt the following strategies to ensure that they deliver an end product that their customers will use -Maintain a strategic perspective – helps to guard against over-commitment -Never compromise on testing – failing to test internet applications thoroughly can be highly damaging. d) ONLINE FRAUD -Need to recognize the warning signs and then check the sale to assess whether there is deliberate attempt to defraud the company of its services. Example of warning signs : • Larger than normal orders • Order containing more than one of the same items • Urgent orders • Shipping orders to an address other than the billing address
  • 13. d) UNAUTHORIZED ACCESS -very important to understand and manage the risk associated with unauthorized access because the increasing connectivity with globalization -must understand the threats, includes hackers, vendor/suppliers, ex-employees, business rivals, foreign government agents, subcontractors and others -to assess the motivations of the threat by analyzing why they would want to hack your computers -Strongly recommended: * Administrative Security-establish basic rules for internet use and training all staff *Operational Security-underwriting the security of the organization’s system and data *Physical Security-creation of standards for all systems that are connected with internet *Other security measures-internal computer forensics
  • 14. Managing Technical Risk • Involve how to manage risks of bringing a new technology product to the market • Few strategies for dealing with the combination of technical failure and market failure when introducing new technology product: - Obsolete Technology -Innovative product development Product Licensing Product Collaboration Product Pattern
  • 15. Managing International Risk • Transnational corporations have had to become better at managing the risk associated with the environment, the exploitation of their workforce and their presence in countries with poor human right or which are war-torn or corrupt • More challenging than domestic firm • There are 6 main categories to country risk -Economic Risk -Transfer Risk -Exchange Risk -location or neighborhood risk -Sovereign risk The risk that a foreign central bank will alter its foreign-exchange regulations thereby significantly reducing or completely nulling the value of foreign-exchange contracts. This is one of the many risks that an investor faces when holding forex contracts. Additionally an investor is exposed to interest-rate risk, price risk and liquidity risk amongst others -Political Risk • How depend very mush on the nature of the relationship the organization has with the countries with which it trades
  • 16. Crisis Management • Threats may originate in the economic, environmental, socio-cultural and political domains. • Nowadays, there is growing concerns for terrorism and health threat. • When these threats are realized, the existence of crisis management mechanism provides the means to -mitigate the impact of the loss -contain the loss -response and control the situation and effectively -resolve or recover from the crisis situation • A crisis situation involves: -a threat to resources and people -a loss of control -visible and/or invisible effect on people, resources and organizations
  • 17. Example of CRISIS • The terrorist attacks of September 11 2011, resulting in the loss of lives, the destruction of property and the failure of companies left without physical offices, resources, employees or stock. • Some others related with the security of client data or the image of a company that fails to deliver on promise, while others attack the health and well-being of both employees and clients, and even the very existence of a company or organization