Evaluating and reporting risk Flashcards
Which of the two base types of risks do risk-event identification activities typically focus on?
Downside risk
6 methods (or groups of methods) that can be used to identify risks:
- Expert judgement
- Focus groups and surveys
- Checklists
- Physical inspections
- Analytical approaches
- Loss event and near-miss investigations
Identifying risk - where might ‘expert judgement’ come from
- Internal specialists, such as IT or finance specialists
- External consultants
What might an org do to ensure use of an external consultant to identify risk is effective?
Have a facilitator work with them, usually being an internal risk specialist
Identifying risk - who would typically comprise a focus group? (2)
- Specialists, such as IT, finance and HR specialists
- Functional and departmental managers
Risk identification - Benefit of focus groups
Share a range of different perspectives and experiences to achieve a consensus view and ensure identification of a greater number of risk events
Risk identification - Cost of focus groups
Can take up significant time with involvement of great number of people
- this is why a survey of relevant individuals may be carried out instead
What might a risk-identification survey ask respondents to do?
List the risk events they believe could occur or provide a checklist of potential risk events
Would a checklist be used on its own as a risk identification tool?
No, it would be supplementary to other tools such as expert judgement, focus groups and surveys
Risk checklists (3)
- List of all recognised potential risk events
- Ensures focus groups or experts don’t overlook certain types of risk events and consider all
- Can be drawn up internally or by external specialists
Benefits of risk checklists (7)
- Cheap and efficient way to collate large amounts of info
- Simple and easy to use
- Ensures relevant sources of risk are not missed
- Useful way of updating info for current use
- Can be adapted to individual areas of risk
- Useful for putting sources of info into common format
- Can be use to provide evidence of compliance with regulations
Costs of risk checklists (6)
- Can be used by someone not skilled in subject of checklist
- Can be completed by someone not fully understanding objectives and use of info
- Can focus attention simply on completing checklist, tick boxing
- May be ambiguous, however careful the design
- May be completed too quickly, without much thought
- May be completed by someone who intends to suppress risk info
Risk identification - who would complete a physical inspection?
Qualified risk-identification specialists such as building surveyors, fire-safety professionals or H&S experts
Risk identification - disadvantages of physical inspections (4)
- Inspector only sees a snapshot in time and risk exposures visible on that day
- Inspection programmes can be expensive, especially where there are multiple sites
- Key sources of risk may be where third-party suppliers provide goods or services and it will be difficult to obtain authority to inspect these premises
- Risk-man is and should remain the responsibility of every manager and employee, and regular visits of an inspector may cause managers and employees to believe they can abdicate this responsibility
Primary aim of analytic approaches to risk identification
Make risk identification more scientific and less prone to human error
4 analytical approaches to risk identification
- Structured what-if technique
- Delphi technique
- Root-cause analysis
- System and process mapping
Structured what-if technique (SWIFT)
- Systematic team-oriented technique used for identification of H&S and environmental-related risks
- Used series of structured ‘what-if’ and ‘how-could’ type questions to consider deviations from normal operation of systems and processes
- Relies on expert input from team to identify risk events
- No standard approach, so can be modified to suit each individual application
Advantage and disadvantage of the structured what-if technique (SWIFT)
- More likely to identify all relevant risk events
- Expensive technique due to amount of time and people involved
Delphi technique (5)
- Information gathering tool used to reach a consensus of experts on a subject (such as ID of risk events)
- Experts participate anonymously, with facilitator used to solicit ideas
- Responses are summarised and re-circulated for further comment
- Consensus reached in a few, or many, rounds of this process
- Should reduce bias and prevent domination of single individual
Advantage and disadvantage of Delphi technique
- Can be effective at predicting risk events
- Time consuming, especially if consensus is hard to reach
Root-cause analysis - risk identification (4)
- Focusses on investigating the root cause of risk events
- May be applied to hypothetical or real risk events that have occurred
- Based on assumption that many risk events have multiple causes
- If causes can be prevented, the event may be stopped from occurring
Advantage and disadvantage of root-cause analysis technique
- Good when investigating causes of large and negative risk events that have occurred, to learn and prevent reoccurrence
- Time consuming, rarely practical or cost effective if looking to identify all risks
Systems and process mapping - risk identification (2)
- Systems and process mapping involves putting all of an org’s systems and processes into flow charts which are than investigated to identify potential sources of risk
- Common technique is a fault-tree analysis, which identifies potential system of process failures and then looks backwards to search for possible causes
Advantage and disadvantage of systems and process mapping technique
- It can highlight risk events that could combine to cause much larger risk events, which would be unlikely to be recognised by individuals working on a single aspect
- Expensive and time-consuming to flow-chart systems and processes and analyse them for points of failure causing risk events