Risk Management Is The Identification, Evaluation, and Prioritization of
Risk Management Is The Identification, Evaluation, and Prioritization of
31000 as the effect of uncertainty on objectives) followed by coordinated and economical application
of resources to minimize, monitor, and control the probability or impact of unfortunate events[1] or to
maximize the realization of opportunities.
Risks can come from various sources including uncertainty in financial markets, threats from project
failures (at any phase in design, development, production, or sustainment life-cycles), legal liabilities,
credit risk, accidents, natural causes and disasters, deliberate attack from an adversary, or events of
uncertain or unpredictable root-cause. There are two types of events i.e. negative events can be
classified as risks while positive events are classified as opportunities. Several risk
management standards have been developed including the Project Management Institute,
the National Institute of Standards and Technology, actuarial societies, and ISO
standards.[2][3] Methods, definitions and goals vary widely according to whether the risk management
method is in the context of project management, security, engineering, industrial processes, financial
portfolios, actuarial assessments, or public health and safety.
Strategies to manage threats (uncertainties with negative consequences) typically include avoiding
the threat, reducing the negative effect or probability of the threat, transferring all or part of the threat
to another party, and even retaining some or all of the potential or actual consequences of a
particular threat, and the opposites for opportunities (uncertain future states with benefits).
Certain aspects of many of the risk management standards have come under criticism for having no
measurable improvement on risk; whereas the confidence in estimates and decisions seem to
increase.[1] For example, one study found that one in six IT projects were "black swans" with gigantic
overruns (cost overruns averaged 200%, and schedule overruns 70%).[4]
Contents
1Introduction
o 1.1Method
o 1.2Principles
2Process
o 2.1Establishing the context
o 2.2Identification
o 2.3Assessment
3Risk options
o 3.1Potential risk treatments
o 3.2Risk management plan
o 3.3Implementation
o 3.4Review and evaluation of the plan
4Limitations
5Areas
o 5.1Enterprise
o 5.2Enterprise Security
o 5.3Medical device
o 5.4Project management
o 5.5Megaprojects (infrastructure)
o 5.6Natural disasters
o 5.7Wilderness
o 5.8Information technology
o 5.9Petroleum and natural gas
o 5.10Pharmaceutical sector
6Risk communication
7See also
8References
9External links
Introduction[edit]
A widely used vocabulary for risk management is defined by ISO Guide 73:2009, "Risk
management. Vocabulary."[2]
In ideal risk management, a prioritization process is followed whereby the risks with the greatest loss
(or impact) and the greatest probability of occurring are handled first, and risks with lower probability
of occurrence and lower loss are handled in descending order. In practice the process of assessing
overall risk can be difficult, and balancing resources used to mitigate between risks with a high
probability of occurrence but lower loss versus a risk with high loss but lower probability of
occurrence can often be mishandled.
Intangible risk management identifies a new type of a risk that has a 100% probability of occurring
but is ignored by the organization due to a lack of identification ability. For example, when deficient
knowledge is applied to a situation, a knowledge risk materializes. Relationship risk appears when
ineffective collaboration occurs. Process-engagement risk may be an issue when ineffective
operational procedures are applied. These risks directly reduce the productivity of knowledge
workers, decrease cost-effectiveness, profitability, service, quality, reputation, brand value, and
earnings quality. Intangible risk management allows risk management to create immediate value
from the identification and reduction of risks that reduce productivity.
Risk management also faces difficulties in allocating resources. This is the idea of opportunity cost.
Resources spent on risk management could have been spent on more profitable activities. Again,
ideal risk management minimizes spending (or manpower or other resources) and also minimizes
the negative effects of risks.
According to the definition to the risk, the risk is the possibility that an event will occur and adversely
affect the achievement of an objective. Therefore, risk itself has the uncertainty. Risk management
such as COSO ERM, can help managers have a good control for their risk. Each company may
have different internal control components, which leads to different outcomes. For example, the
framework for ERM components includes Internal Environment, Objective Setting, Event
Identification, Risk Assessment, Risk Response, Control Activities, Information and Communication,
and Monitoring.
Method[edit]
For the most part, these methods consist of the following elements, performed, more or less, in the
following order.
create value – resources expended to mitigate risk should be less than the consequence of
inaction
be an integral part of organizational processes
be part of decision making process
explicitly address uncertainty and assumptions
be a systematic and structured process
be based on the best available information
be tailorable
take human factors into account
be transparent and inclusive
be dynamic, iterative and responsive to change
be capable of continual improvement and enhancement
be continually or periodically re-assessed
Process[edit]
According to the standard ISO 31000 "Risk management – Principles and guidelines on
implementation,"[3] the process of risk management consists of several steps as follows:
Source analysis[6] – Risk sources may be internal or external to the system that is the target of
risk management (use mitigation instead of management since by its own definition risk deals
with factors of decision-making that cannot be managed).
Examples of risk sources are: stakeholders of a project, employees of a company or the weather
over an airport.
Problem analysis[citation needed] – Risks are related to identified threats. For example: the threat of
losing money, the threat of abuse of confidential information or the threat of human errors,
accidents and casualties. The threats may exist with various entities, most important with
shareholders, customers and legislative bodies such as the government.
When either source or problem is known, the events that a source may trigger or the events that can
lead to a problem can be investigated. For example: stakeholders withdrawing during a project may
endanger funding of the project; confidential information may be stolen by employees even within a
closed network; lightning striking an aircraft during takeoff may make all people on board immediate
casualties.
The chosen method of identifying risks may depend on culture, industry practice and compliance.
The identification methods are formed by templates or the development of templates for identifying
source, problem or event. Common risk identification methods are:
Objectives-based risk identification[citation needed] – Organizations and project teams have objectives.
Any event that may endanger achieving an objective partly or completely is identified as risk.
Scenario-based risk identification – In scenario analysis different scenarios are created. The
scenarios may be the alternative ways to achieve an objective, or an analysis of the interaction
of forces in, for example, a market or battle. Any event that triggers an undesired scenario
alternative is identified as risk – see Futures Studies for methodology used by Futurists.
Taxonomy-based risk identification – The taxonomy in taxonomy-based risk identification is a
breakdown of possible risk sources. Based on the taxonomy and knowledge of best practices, a
questionnaire is compiled. The answers to the questions reveal risks.[7]
Common-risk checking[8] – In several industries, lists with known risks are available. Each risk in
the list can be checked for application to a particular situation.[9]
Risk charting[10] – This method combines the above approaches by listing resources at risk,
threats to those resources, modifying factors which may increase or decrease the risk and
consequences it is wished to avoid. Creating a matrix under these headings enables a variety of
approaches. One can begin with resources and consider the threats they are exposed to and the
consequences of each. Alternatively one can start with the threats and examine which resources
they would affect, or one can begin with the consequences and determine which combination of
threats and resources would be involved to bring them about.
Assessment[edit]
Main article: Risk assessment
Once risks have been identified, they must then be assessed as to their potential severity of impact
(generally a negative impact, such as damage or loss) and to the probability of occurrence. These
quantities can be either simple to measure, in the case of the value of a lost building, or impossible
to know for sure in the case of an unlikely event, the probability of occurrence of which is unknown.
Therefore, in the assessment process it is critical to make the best educated decisions in order to
properly prioritize the implementation of the risk management plan.
Even a short-term positive improvement can have long-term negative impacts. Take the "turnpike"
example. A highway is widened to allow more traffic. More traffic capacity leads to greater
development in the areas surrounding the improved traffic capacity. Over time, traffic thereby
increases to fill available capacity. Turnpikes thereby need to be expanded in a seemingly endless
cycles. There are many other engineering examples where expanded capacity (to do any function) is
soon filled by increased demand. Since expansion comes at a cost, the resulting growth could
become unsustainable without forecasting and management.
The fundamental difficulty in risk assessment is determining the rate of occurrence since statistical
information is not available on all kinds of past incidents and is particularly scanty in the case of
catastrophic events, simply because of their infrequency. Furthermore, evaluating the severity of the
consequences (impact) is often quite difficult for intangible assets. Asset valuation is another
question that needs to be addressed. Thus, best educated opinions and available statistics are the
primary sources of information. Nevertheless, risk assessment should produce such information for
senior executives of the organization that the primary risks are easy to understand and that the risk
management decisions may be prioritized within overall company goals. Thus, there have been
several theories and attempts to quantify risks. Numerous different risk formulae exist, but perhaps
the most widely accepted formula for risk quantification is: "Rate (or probability) of occurrence
multiplied by the impact of the event equals risk magnitude."[vague]
Risk options[edit]
Risk mitigation measures are usually formulated according to one or more of the following major risk
options, which are:
1. Design a new business process with adequate built-in risk control and containment
measures from the start.
2. Periodically re-assess risks that are accepted in ongoing processes as a normal feature of
business operations and modify mitigation measures.
3. Transfer risks to an external agency (e.g. an insurance company)
4. Avoid risks altogether (e.g. by closing down a particular high-risk business area)
Later research[11] has shown that the financial benefits of risk management are less dependent on
the formula used but are more dependent on the frequency and how risk assessment is performed.
In business it is imperative to be able to present the findings of risk assessments in financial, market,
or schedule terms. Robert Courtney Jr. (IBM, 1970) proposed a formula for presenting risks in
financial terms. The Courtney formula was accepted as the official risk analysis method for the US
governmental agencies. The formula proposes calculation of ALE (annualized loss expectancy) and
compares the expected loss value to the security control implementation costs (cost-benefit
analysis).
Implementation[edit]
Implementation follows all of the planned methods for mitigating the effect of the risks. Purchase
insurance policies for the risks that it has been decided to transferred to an insurer, avoid all risks
that can be avoided without sacrificing the entity's goals, reduce others, and retain the rest.
1. to evaluate whether the previously selected security controls are still applicable and effective
2. to evaluate the possible risk level changes in the business environment. For example,
information risks are a good example of rapidly changing business environment.
Limitations[edit]
Prioritizing the risk management processes too highly could keep an organization from ever
completing a project or even getting started. This is especially true if other work is suspended until
the risk management process is considered complete.
It is also important to keep in mind the distinction between risk and uncertainty. Risk can be
measured by impacts × probability.
If risks are improperly assessed and prioritized, time can be wasted in dealing with risk of losses that
are not likely to occur. Spending too much time assessing and managing unlikely risks can divert
resources that could be used more profitably. Unlikely events do occur but if the risk is unlikely
enough to occur it may be better to simply retain the risk and deal with the result if the loss does in
fact occur. Qualitative risk assessment is subjective and lacks consistency. The primary justification
for a formal risk assessment process is legal and bureaucratic.