04 Risk identification and risk assessment (1) = risk identification Flashcards

1
Q

Risk management in a nutshell?

A
  1. Risk identification
  2. Risk assessment
  3. Risk handling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the general process of risk identification?

A

1.Scope
- set the limits of the risk identification process

2.Organization
- Who´s involved?
- compose the risk identification team

3.Identification (narrow scope)
- understand unit of analysis
- Use tools to identify risk

4.Documentation
- describe risks
- establish risk register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is high level done in risk assessment (after risk identificationn)

A

risk assessment:
- asses the probability and impact of risks
- rank risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the general problem with “risk identification?

A

Even the most conscientious risk identification process cannot consider all risks, and lists of risks can easily become very long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the scope of the risk identification task?
(1. process step of risk identification)

A

Define scope
set the limits of the risk identification process, it is important to address three aspects “a priori”:

1.Define unit of analysis
- i.e. the entire supply chain for a specific end-product (e.g., a car model) or
- specific geographic locations
- only specific material groups (manf, process indutry, distribution channels)

2.Define risk sources under investigation (i.e. infrastructure)

3.Define supply chain objectives of interest
–>i.e. profit, firm continuity, customer satisfaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should be included in the scope statement?

A

The scope statement should include:
1. A description of the unit of analysis
2. A list of risk sources that are included or excluded in the risk identification process
3. A list of performance objectives that are to be investigated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the 2.Step of the risk identification process about?

A

organization: risk identification is team work!

  • Commitment and resources from senior managers are essential
  • Identify department and people that are involved in the delineated scope
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are important criteria for the team ? (Organization =2.Step risk identif)

A

create a well rounded team when identifiying and assesing risks:

  • identify people that know the unit of analysis
  • Look for different viewpoints
  • smaller teams (3-5) are more effective
  • establish a common language of risk identifcation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the 3. Step of risk identifcation: Identification about? The key of this

A

The key: to use a framework or strategy that allows to identify all major risks

–>Expose “all” potential risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3.Step risk identifi.
“Identification”: What is the “de minimis principle? and what are the two common stages?

A

De minimis principle:
There is a level of risk that is too small to be concerned with (e.g., risk of asteroid crashing into a firm’s annual Christmas party is remote)

two common stages:
- understand/observe
- systematically search for risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens in the identification step, in the first stage of identification?
(understand/observe)

A

Understnd/observe

  • visualize the unit of analysis: map of the supply chan, dependencies –> End-to-end view
  • divide the map into a serioe of distinct, related operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What happens in the 2 stages of identification process in risk identification
(search of possible risk)

A

Systematically consider the details of each operation

Identify critical paths and critical nodes (bottlenecks, key nodes, “latent” risks)

The choice of appropriate tools depends on circumstances, and particularly:

  • the size and complexity of operations
  • the organizational experience with risk management
  • the type of information needed and already available
  • the availability of resources, particularly people and time
  • the levels of skills and knowledge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the different risk identification techniques?

A

Progressive
- Checklists
- supplier defaults
- peer-group comparision

Mixed
- delphi method
- surveys
- creativity techniques (brainstoriming)

Retrograde
- cause and effects diagram
- fault tree analysis
- failure modes and effects analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are supply chain checklists? (Progressive)
Where can we get them?

A

Supply chain checklist can be derived from various sources:
- internal supply chains,
- external firms, or
- standard lists from industry forums and consultants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the benefits and drawbacks from supply chain checklists?

A

Benefits:
- one does not have to work from scratch - build on previous experience
- get results very quickly

Drawback:
- only a general view that does not captura idiosyncratic risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is brainstorming?

A

technique by which a group attempts to generate ideas or find a solution for a specific problem by amassing ideas spontaneously and without judgment

17
Q

What is the general procedure of brainstorming?

A
  • Large number of ideas are generated while evaluation of the ideas is deferred
  • Imagination is encouraged. No idea is too unique)
  • Using or building on the ideas of others is encouraged
  • no criticism of any idea
    − Evaluation is postponed until the group can no longer think of any new ideas
18
Q

What are ways of fostering creativity (brainstorming)?

A
  • Diversify teams to include members with different backgrounds, training, and perspectives
  • Encourage analogical reasoning
  • Stress periods of silent reflection
  • Record all ideas so that the same ones arenot rediscovered
  • Develop a physical space that encourages fun, divergent ideas
19
Q

What is the delphi technique?

A

is used to derive a consensus among a panel of experts who make predictions about future developments

  • provides independent and annonymous input (future events)
  • uses repeated rounds of questioning
20
Q

What is a cause and effect diagram? (retrograde)

A
  • Cause-and-effect diagrams trace back the causes for possible risks
  • Also called fishbone or Ishikawa diagrams
21
Q

What is a risk register (for the 4.step of risk ident.: Documentation

A

used to summarize the identified risks in a structured way

    • the main output of the risk identification process
  • a document that contains the results of various risk management processes and that is often displayed in a table or spreadsheet format
  • … a tool for documenting potential risk events and related information
22
Q

What are common errors in risk identification?

A
  • Terminology: Lack of a common understanding of what constitutes a risk
  • Scope:Lack of a clearly defined scope (unit of analysis)
  • Information: Lack of experience and information in a crucial subject area
  • Human judgment biases…
23
Q

What are the two components of risk and how are they assessed?

A
  • Probability that the risk occurs
    (uncertainty)
  • Impact (in case the risks occurs)

asses by means of:
- qualitative methods
- quantitative methods

24
Q

When to use qualitative methods for probabiliity assessment?

A
  • when situation is vague and little data exist
  • Subjective analysis based on visualization and discussion:
    Expert opinions (interviews), Jury of executives opinion, Delphi technique (and variants)
  • Subjective analysis based on psychometric scales:
    –>Probability is assessed on a verbal, quasiquantitative rating sc
25
Q

When to use quantitative methods for probability assessment?

A
  • when data is available
    − Historical data
    − Simulations based on assumptions
  • Time series (extrapolation of the past) vs. causal models (correlation/ dependence on other factors)

Examples: simple metrics, advanced risk metric that capture both probability and impact, monte carlo simulation

26
Q

What is supply side credit risk?

A

Supplier has trouble raising the cash to meet the payments on its
current financial obligigations ( such as loans, debts to suppliers, salaries)

27
Q

How to assess the financial health of a supplier?

A

–>sources of information for the assessment of supplies financial health:

  • Past financial statements allow assessments of the supplier’s liquidity, activity, debt, and profitability
  • Credit agencies (D&B, Moody’s, S&P’s) provide ratings and reports on the credit worthiness of a supplier
  • Own experiences
  • local, regeional, and/or national trade associations often serve as clearinghouses for credit information
  • possible that a firm´s bank can get credit information from the suppliers banks
28
Q

What is the interpretation of Altman´s z-score?

A

the lower the score, the higher the probability of credit default (credit risk):

z- score above: 3.0 –>company is safe

z-score between: 2.7 and 2.99: on alert

z-score between: 1.8 and 2.7: –>good chances of the company going bankrupt within 2 years

z-scores below: 1.8 –>probability of financial embarrassment is very high

29
Q

When to use qualitative methods for impact assessment?

A
  • when situation is vague and little data exist
  • Subjective analysis based on visualization and discussion
  • Subjective analysis based on psychometric scales:
30
Q

When to use quantiative methods for impact assessment?

A

Based on the analysis of data
− Historical data
− Simulations based on assumptions

Time series (extrapolation of the past) vs. causal models