Fedex Risk Management

International Risks

FedEx faces international risks in its operations. Some international risks are dependent on the country. Smaller countries have higher barriers to international trade. International trade increases the standard of living for all countries involved. The international success of FedEx is primarily because of its ability to overcome risks and capitalize on the benefits. FedEx’s global achievement has helped them achieve economies of scale.

FedEx is vulnerable to exchange rate risk due to its global operations. Currency exchanges and forward contracts can minimize the risk of exchange rate fluctuations. FedEx also faces many regulations which vary from country to country. Regulations are often changed and can have an adverse impact on FedEx’s business and operations worldwide. FedEx could be exposed to political risks as well as diversity problems, such as language barriers among customers and suppliers. International trade involves the preparation of a number of documents which also creates difficulties and causes additional paperwork and documentation costs (Berger, 2010).

In the international marketplace, FedEx should expect to face restrictions on trade between nations. Foreign governments may charge tariffs or taxes on certain imported products designed to raise revenue, protect domestic companies or slow the flow of illegal or unsafe products into the country (Berger, 2010). Foreign governments may set quotas – limits on the number of foreign imports that they will accept in certain product categories. The risk of tariffs and trade wars could result in a decline in the gross domestic product of the countries involved, according to economists (Radcliffe, 2019). The risk of declining economies poses a risk to FedEx because the demand for delivery services declines simultaneously. Unfortunately, this international risk can not be mitigated by FedEx as they have little to no control over the changes in demand that could arise.

FedEx faces an international risk due to the uncertainty of the future of CUSMA, a modernized version of NAFTA. It is expected to be implemented by 2020 once all three countries approve it (FedEx, 2019). If this trade agreement were extinguished, the United States, Canada, and Mexico will suffer economically; therefore, sales revenues in many industries will suffer. FedEx relies on the sales of other industries to use their delivery service, and this loss in sales revenue would result in the shipment of fewer packages being delivered locally and internationally.

Determinants Of Risk Management Efficiency Of Private Commercial Banks In Ethiopia

The most important challenge faced by the banking industry today is the challenge of understanding and managing the risk in the banking business where a threat of risk is imbibed in it. A well-functioning financial system facilitates efficient intermediation of financial resources to the economy. The more efficient the financial system in resource generation and allocation is the greater in its contribution to economic growth and sustainability (Mohan, 2005). Financial institutions play a key role in economic growth and development because they supply money for individuals, business sectors, lend government organizations etc. Moreover, financial institutions help the government in assessing and bearing out the monetary and economic policies, and provide a wide variety of economic services such as money transfer, foreign exchange, facilitate international trade, market stabilization and other related activities.

To investigate the status of risk management practice in Ethiopian commercial banks a survey were conducted on November 2009. Questionnaires were distributed for a sample of 15 Ethiopian banks. The report revealed that credit, liquidity and operational risks were key bank risks over the last two years and would continue to be so over the next five years. But, the study did not identify the factors that affect risk management efficiency of Ethiopian banks. Therefore, identifying the factors that affect risk management efficiency of Ethiopian banks is open for empirical analysis.

In Ethiopia, private commercial banking system has been witnessing a significant expansion over the past ten years than before even though the Ethiopian banking industry was still Underdeveloped. A survey made by National Bank of Ethiopia (NBE) (2010), believes that such growth should be matched with strong risk management practices. This is because with the fastest economic growth of the country, societal demand of various banking service also increase and this situation may increase level of risks on the banks unless and otherwise banks have introduced effective risk management program.

A number of relevant studies regarding risk management in banks were made across the world. A study by Piyananda et al (2015) were made considering capital adequacy as a dependant variable and aims to identify the significant bank specific determinants of risk management efficiency of the listed commercial banks in Sri Lanka. The study revealed that the credit risk, liquidity risk, ROA, operational efficiency and banks’ size are the important factors of determining the degree of (CAR) capital adequacy ratio of commercial banks in Sri Lanka. Capital adequacy ratio (CAR) generally represents the safety moderate which can understand any unexpected loss that banks might face when operating in a highly uncertain environment. It represents the solidarity and stability of financial institutions.

The issue of risk management was concern of researchers such as Emira(2013) that have conducted research on Comparative Analysis of Risk Management in Conventional and Islamic Banks (The Case of Bosnia and Herzegovina). This research paper tries to determine the dependence of banks’ financial performance on the risk management. The results of this research reveal that still practices of risk management are developing worldwide. Anas & Fauziah (2014) also studied the impact of financial risk on Islamic banks’ profitability. However, their findings found to be different across country, bank nature and ownership structure.

Determinants of the risk management efficiency can be two fold; mainly internal and external. Internal factors are the bank specific factors whereas the external determinants are macroeconomic factors, which can be the growth rate of Gross Domestic Product (GDP), changes in interest rates and inflation rates etc.

In Ethiopia a number of risk management related studies were undertaken in commercial banks ignoring the issue of determinants of risk management efficiency and trying to study points like the relationship between risk management and profitability; credit risk issues and risk management practices. In this regard a study by Eneyew(2013) examines the impact of financial risk on profitability of commercial banks in Ethiopia. Fasika(2012) has investigated selected Ethiopian commercial banks operational risk management and Tibebu (2011) has studied on the impact level of credit risk management towards the profitability of commercial banks in Ethiopia. Emawayih(2017) assesses the determinants of financial risks in private commercial banks using credit risk and liquidity risk indictors. Endawek (2015) deals with the impact of risk management on performance of banks. Yalemzewd(2013), Girma(2010), conducted on credit risk and performance of banks and Fikremariam(2018) conducts a research on factors affecting credit risk management practices in private commercial banks. In all the available research works there is no specific study on risk management efficiency of commercial banks in Ethiopia which shows as there is a knowledge gap to show clear cut determinants of risk management efficiency in Ethiopian commercial banks. This initiates the researcher to investigate on the problem.

In this regard a study by Tilahun Amiro & Dugasa Afisa (2014) on the bank specific determinants of credit risk in Ethiopian commercial banks, only bank specific determinant variables such as bank size, profitability, capital adequacy, liquidity, credit growth, operating efficiency and ownership were used. This study differs from the previous studies in that it is addressing the problem for the first time in Ethiopian Commercial banks and considers bank specific and macroeconomic variables in the study. The dependant variable of this study is Capital adequacy ratio (CAR) as a proxy to risk management efficiency in banks and the bank specific variables were credit risk, liquidity risk, profitability, bank size, operation efficiency and market risk. The macroeconomic variables used in this study were GDP growth, inflation, lending interest rate and foreign exchange rate.

The main purpose of the study is to follow a comprehensive approach towards identifying determinant factors of risk management efficiency taking into account some private commercial banks in the country. In the context of this study, the risk management efficiency, as indicated above, was measured through the CAR while investigating the internal and external factors that may affect risk management efficiency in private commercial banks in Ethiopia.

Use of Risk Management in IT

In the enormous field of Information Technology, the term ‘Hazard Management’ alludes to the various systems to diminish and avert potential risks to an organization/association. This is finished by people who recognize, survey and control potential security dangers. These threats could emerge from a various scope of sources, including budgetary insecurity, methodical mistakes and lawful liabilities. For some, driving organizations, security dangers and information related dangers being top need has enabled organizations to progressively reinforce their benefits.

A hazard is whatever could possibly affect your venture’s course of events, execution or spending plan. Dangers are possibilities, and in a task the executives setting, on the off chance that they become substances, they at that point become delegated ‘issues’ that must be tended to. So hazard the executives, at that point, is the way toward recognizing, sorting, organizing and arranging for dangers before they become issues.

Each business and association face chance anyway with Risk Management usage set up, organizations can limit the exposures to peril and can deal with circumstances before they happen to counteract abundance costs, threat to notoriety and guarantee security of people included. It is the methodology used by errand chiefs to restrict any potential issues that may conversely influence an endeavor’s timetable. Danger is any unexpected event that may impact the people, methodology, advancement, and resources related with an errand. As opposed to issues, which make certain to happen, perils are events that could occur, and you will undoubtedly be not able tell when. In view of this weakness, adventure danger requires certifiable course of action to manage them viably.

Having a Risk Management plan is vital. By executing through with this, organizations are thinking about the different potential occasions which may occur. This can enable business organizations to get ready and act proficiently and successfully. A full-bodied arrangement will enable an organization to set up activities, limit the effect of the circumstance and make do with the end result. Taking into account the association to comprehend and control the factors of hazard included can take into consideration entrepreneurs to feel guaranteed, positive and certain about their business choices. It will likewise permit solid corporate organizations to uphold rules that attention explicitly on counteractive action of dangers and can help organizations accomplish their ideal headways. Effective peril the administrators systems empower you to recognize your undertaking’s characteristics, weaknesses, openings and threats. By masterminding unanticipated events, you can be set up to respond if they rise. To ensure your endeavor’s thriving, describe how you will manage potential risks so you can recognize, reduce or evade issues when you need to do. Powerful errand chiefs see that peril the board is huge, on the grounds that achieving an endeavor’s goals depends after orchestrating, arranging, results and appraisal that add to achieving fundamental target other benefits of having a risk management plan in place ensures to create a safe and secure workplace environment for staff members and other interactions with others, increase stability of business activities taking into account decreasing legitimate obligation. It is likewise giving assurance from occasions that are harming to the organization’s notoriety, resources from potential damage and permit to set aside cash from extra expenses through pointless premiums when experiencing protection

A risk is alluded as a conceivable peril to PC security which may abuse defenseless data to rupture security. A case of a danger incorporates, infections, Trojans and programmers hacking into a product. The risk is generally followed up on a thought process. A danger source is portrayed as an episode or condition where there is probability to destruct an IT framework. Guaranteeing tricky business data in movement still is a measure couple of endeavors directly can’t get a handle on, despite its sufficiency. The social protection industry handles sensitive data and understands the gravity of losing it – which is the explanation HIPAA consistence requires every PC to be encoded. In Information Security risks can be many like Software attacks, thievery of authorized development, information extortion, theft of equipment or information, harm, and information pressure.

Danger can be whatever can exploit a defenselessness to rupture security and contrarily adjust, eradicate, hurt item or objects of intrigue.

One of the significant strides in recognizing the wellspring of danger should be possible through recognizing the previous sources. This can consider IT framework to evaluate the PC security. The 3 basic danger sources are isolated into either Natural dangers, Human dangers and Environmental dangers. Regular dangers, for example, a cataclysmic event like floods, may destroy the hardware, for example, the PC causing harm, and may cause loss of information. Human dangers can occur in 2 distinct manners, it can occur coincidentally, for instance an individual may have entered information wrong making it be mistaken. It additionally might be purposefully, for instance, downloading Trojans to break through to delicate and private data to use in a wrongly doing act. A huge amount of the time, the articulation ‘hazard understanding’ is used to delineate the wellsprings of this data, yet in reality they’re noble motivations of data that must be taken care of before they can be seen as information. As computerized perils become logically progressed, yet what’s more progressively open (you can buy malware code from the dull web for two or three dollars), the ought to be responsive with against disease affirmation, anyway altogether more so proactive is growing always. Peril learning fuses gathering significant and important data and dealing with this information together to update an affiliation’s advanced security

A couple of bodies set out the gauges and principles for the system of peril the board. The methods included proceed as before basically. There are little assortments related with the cycle in different sorts of risk. The perils being referred to, for example, in assignment, the officials are particular conversely with the threats included reserve. These records for explicit changes in the entire risk the administrators’ system. Anyway, the ISO has set out explicit steps for the strategy and it is all around material to a wide scope of danger. The principles can be applied for the term of the life of any affiliation and a wide extent of activities, including methods and decisions, exercises, structures, limits, adventures, things, organizations and assets. All Risk Management Plans pursue comparative stages to make the general procedure to help guarantee that it is fruitful. The accompanying advances included are:

– Establish Context: Understanding the conditions in which the procedure will be applied in. The measures that will be utilized to assess dangers ought to be considered and the examination of the structure ought to be plot.

– Identifying Risks: Aiming to appreciate the basic potential dangers that may contrarily effect organizations, or ventures.

– Analysing Risks: Once the hazard elements are recognized, it is the duty of the association to keep this from re-happening. This stage likewise thinks about what hazard could be included and how it might adversely affect the target and activities.

– The Risk Assessment and Evaluation: The fundamental result from this stage is to further improve information and execute activities to help stop this kind of circumstance and different circumstances like it reoccurring. The organization can than assess whether the choices with the dangers included are justified, despite all the trouble.

– Risk Justification: In this stage, organizations evaluate their highest grouped hazard and build up an arrangement to improve their hazard the board plan. Utilizing explicit strategies and assessing the plausibility of this circumstance happening again and back up plans.

– Risk Monitoring: Part of the Justification stage incorporates following up on both the dangers and

The arrangement to screen and track both new and existing dangers. The Risk Management plan is then modified and defended in like manner. In IT related organizations this alludes to the new infections or bugs included.

– Consultation and Communication: In this progression, it is resolute that both staff, investors included are addressed and mindful of the accompanying issue. It is good in the event that they are incorporated and their perspectives and thoughts are heard to help guarantee a consequence of what should be possible to the entire procedure. For models inquiries might be posed:

• What is the probability of this circumstance perhaps reoccurring?

• How is this influencing the notoriety of the business?

• What changes can be made to the current programming?

• How will it influence the association and the relations with different partners?

Risk Management Approaches:

Each endeavor appearances a ton of peril straightforwardly from the earliest starting point till its end. A peril could possibly be sudden and can act itself like an opportunity or a threat to the endeavor. Perils may be business threats (with increases or hardships) or unadulterated risks (only setbacks) in light of the circumstance. In nature, they may be degree perils (with specific, execution or quality issues), external threats, and various leveled risks or just adventure the official’s threats. At the point when the dangers have been recognized and everything is talked about the time has come to concentrate on the various methodologies’ associations do to help forestall different issues. Some of them can be:

– Avoiding Major Risks: It is hard to destroy hazards be that as it may; this methodology is planned to dispose of whatever number dangers as could be expected under the circumstances so as to maintain a strategic distance from outcomes.

– Reduction of Risks: Organizations can reduce the level of impact certain dangers can have on organizations and ventures. This might be accomplished through specific parts of plans and might be balanced on what they may not require.

– Risk Sharing: Due to legitimate obligation, a few results of a hazard might be shared among the distinctive venture’s donors and diverse colleagues, for instance outsiders.

– Retaining from Risks: This is unpredictable, every once in a while an association may embrace a hazard accepting that the hazard merits the esteemed understanding being made. Organizations as a rule remember that if a venture’s evaluated benefit is bigger than the expense of the potential misfortune.

It supposedly is useful for associations to have a Risk Management plan set up anyway it has disservices also. To make a hazard the executives plan, it is essential that there is sufficient required information and research known to help order whether it is a hazard factor or not, and how it might affect the association. It might be costly to accumulate a lot of information and structure a forecast. It might likewise not go to design and might be problematic and mistaken.

Furthermore, the utilization of this information may be seen uniquely in contrast to alternate points of view. Thus, settling on basic leadership procedures may have various results if various pointers are not considered in complex circumstances, prompting startling outcomes. Peril the board incorporates complex considers far as supervising risks. Without the modified instrument, each and every estimation concerning risks ends up problematic. Despite whether the ambiguity is out of hardship, by then people need to cover it inside the orchestrated size of mishaps of the cutoff points and even the idea into unnecessary security limits. Risk the board puts aside a long exertion to gather information as for key plans. It has comprehensive standards that are directed and recognized by the cash related characteristics. It matches with a hard understanding without progressing learning without compensation of the fundamental measure of data.

Absence of examining capability and time can likewise cause limits and confinements. PC programming applications have been progressed to help move scholars to perceive what impact certain circumstances can have a negative/positive effect on the business. While this is exorbitant, it likewise requires prepared proficient who have been prepared analysists effectively and have information to comprehend the exact outcomes.

There might be a misguided feeling of consistent quality, for instance with a hazard the executives plan set up, an association may have a sense of security and may go out on a limb and not understand that they may have various intricacies and may not go easily, which makes disappointment comprehend the aggregate dangers included. Managing the risks gives the pointless activity to compensate for the errands. It incites the endeavors that react to improve the advantages in the association. It is spent on the inventive work of the assigned issues that hold to ensure adventure the officials. These potential threats are to be maintained up carefully in control to make and evaporate from the market. This use diminishes the level of risk and generally fabricates the direction over it. Any kind of technique will have its own repressions and points of interest of endeavor chance organization. Thusly to develop an effective peril, the board one needs to focus on the mitigated fundamental plans of threats that are suitable on the challenging individuals. It is to perceive the cutoff of the entire organization to overcome pending hazards. Risk the official’s transforms into the critical circumstance when the affiliation has concentrated on results isolated from potential perils, damages, and vulnerabilities.

People associated with the Risk Management group are generally part of the Management Team. It includes:

– Senior Management: Senior organization, under the standard of due thought and extraordinary commitment must ensure that the essential resources are effectively applied to help develop the limits expected to help accomplish the objectives. They ought to in like manner assess and combine eventual outcomes of the peril examination activity into the essential initiative procedure. A convincing threat the administrators’ program that assesses and mitigates IT- related urgent requires the assistance and consideration of senior organization.

– Chief Information Officer: The CIO is subject for the association’s IT organizing, arranging, and execution including its information security fragments. Decisions made in these domains should be established on an incredible risk the board program.

– System and Information Owners: The structure and information owners are liable for ensuring that fitting controls are set up to address uprightness, protection, and openness of the IT systems and data they guarantee. Consistently the system and information owners are at risk for changes to their IT structures. Thusly, they generally need to help and endorse changes to their IT systems (e.g., structure improvement, huge changes to the item and gear). The structure and information owners ought to therefore fathom their activity in the risk the official’s strategy and totally support this method.

– Business and Functional Managers: The chiefs obligated for business undertakings and IT procurement strategy must play a working activity in the risk the board system. These chiefs are the individuals with the power and commitment in regards to choosing the tradeoff decisions fundamental to mission accomplishment. Their commitment in the danger the board system engages the achievement of authentic security for the IT structures, which, at whatever point regulated properly, will give vital practicality with an inconsequential utilization of benefits.

– ISSO: IT security program chiefs and PC security authorities are careful for their affiliations’ security programs, including peril the administrators. Thusly, they expect the principle work in exhibiting a fitting, composed framework to help perceive, survey, and limit threats to the IT systems that help their affiliations’ missions. ISSOs furthermore go about as huge masters in favor of senior the board to ensure that this activity occurs on an advancing reason.

– IT Security Practitioners: IT security experts (e.g., arrange, structure, application, and database administrators; PC specialists; security inspectors; security counsels) are liable for genuine utilization of security necessities in their IT systems. As changes occur in the present IT structure condition (e.g., improvement in framework organize, changes to the current

structure and definitive plans, introduction of advancements), the IT security authorities must assistance or use the peril the boarding strategy to perceive and assess new potential threats and execute new security controls true to form to shield their IT systems.

– Security Awareness Trainers: The affiliation’s workforce is the customers of the IT systems. The use of the IT systems and data according to an affiliation’s approaches, standards, and rules of lead is fundamental to mitigating dangers and verifying the affiliation’s IT resources. To constrain peril to the IT structures, it is essential that system and application customers be given with security care getting ready. As such, the IT security mentors or security/point specialists must fathom the risk the boarding strategy so they can make legitimate getting ready materials and join peril evaluation into planning undertakings to teach the end customers.

In end chance administration methodologies to any business relationship with or without facing risks. A convincing peril the board plan should have early and mighty distinctive verification of threats through incorporation and participation of appropriate accomplices. Peril the administrators depicts affiliation decisions on how they deal or will stand up to various risks if they occur. It moreover chooses different ways and measures to control those threats and offering attestation to the affiliation that it can make and realize an effective organization plan to confine or foresee loses occasion. A not too bad risk the officials plan should state clearly procedures frameworks to be used to see and go facing perils and vulnerabilities facing the association and offer possible response for the issues.

Analysis of Risk Management Techniques

Preparing for the worst is essential to running a successful food business. Before anyone can open the doors to a new business, it is imperative to reduce the likelihood of a serious accident or a liability lawsuit by conducting a restaurant risk analysis. A comprehensive risk management plan can reduce the likelihood of these risks because every business endeavor comes with some element of risk. Thus, the ability to manage these risks, will not only affect the company’s profitability, but it could also mean the difference between staying in a business or not. As such, we will implement the techniques listed below to manage the risks identified.

Employees are the heart of any business, so protecting them from harm in the work place should be top priority. Also, since employees handle day-to-day operations, they can often help avert potentially disastrous situations – if they have the proper training. Some of the trainings include: work safety – these training sessions include proper lifting for heavy equipment and mandating footwear and attire that minimizes risks of injuries, safety procedures – walk customers through the food business’s safety protocols, such as how to properly handle, store, and prepare food, and also what to do in case of a fire or robbery, and lastly customer service.

To reduce the odds of property damage or someone getting hurt on the property, we will ensure that: the kitchen is kept clean, clean the clutter – keeping it clear of obstacles will reduce the chance of a trip-and-fall hazard, and install indoor and outdoor railings.

We heavily rely on all the restaurant’s equipment to store and prepare food. Without proper maintenance, the equipment could break down, potentially putting both the business and customers at risk. We will ensure to regularly check the refrigeration units, heating equipment, and consider to have a commercial property insurance – which this policy can help to pay or repair or replace any equipment that has been stolen, vandalized or experience a kitchen fire.

Running a business in the digital age presents its own sets of risks. For instance, if we store customer information, such as credit card numbers on a computer, we are at risk of cyber theft. Nevertheless, we can use technology to help safeguard our business against such risks. We will use anti-virus software – to keep malware, phishing, and viruses at bay with appropriate firewalls and software, password protection for Wi-Fi network – offering internet access is a good way to get customers attracted to our business, but we endeavor to keep the network safe too, thus we will only use secure networks and only provide Wi-Fi password to paying customers, and lastly, security cameras – although security cameras aren’t exactly cutting-edge technology, they however still help to detect and deter criminal activity and theft. If the system is hacked and sensitive information like customer credit card numbers stolen, cyber liability insurance can help with the cost of customer notification and credit monitoring.

It is necessary for all employees to familiarize themselves with health and safety codes, so that the establishment is not caught off guard by a routine inspection form a health inspector. Some health and safety codes include: employee hygiene – employees will always wash their hands and wear disposable gloves before handling food, and also to wear hairnets when around food, health inspections – our business will definitely have to pass health inspection conducted by a local personnel before it can be open to the public and we will also have our restaurant inspected twice a year, and also, facilities and surfaces – persons in charge of cleaning can only use certain detergents to clean equipment that comes in contact with the food. Not only will adhering to safety codes help prevent our restaurant from being charged with violations, it will also create safer conditions for employees and customers and reduce our chances of getting sued.

Food allergies affect millions of persons worldwide, and a restaurant business operator, it is our duty to be aware of all different food allergies and diets. Thus we will update both our food and dietary disclosures. Disclosing this information will help us to avoid a costly lawsuit.

Despite employing the best restaurant risk management strategies, there may be times when an unpreceded accident may occur such as a fire or staff injuries. For such situations, you should be armed with insurance that provides a complete cover for the business as well as for our staff. The workers in this industry are more susceptible to workplace injuries than in any other sector. Hence, providing insurance will ensure better work environment and also reduce the chances of our business falling into any legal troubles.

Connections Between Generation Games and Risk Management

There are thousands kind of risks in the world of business and finance, risk management is a one term of them about the logical to establish the definition of the context, it consists of a wide range of sources including also financial threats from the business and legal authorities. The capacity to comprehend and evaluate chance, is absolutely critical. This is something that can be utilized to characterize the exact ways that hazard ought to be able to be overseen and on full scale level. An assortment of risks related definitions are applied to development ventures, and no standard definitions or systems existing for what comprises a hazard evaluation. In the development business, risk management is frequently linked to the closest potential or genuine treats or chances that impact the goals of an undertaking during development, charging, or at time of utilization. It is significant that the risk management must be comprehended for this situation, as there are numerous potential exposure regions that the company running the event should manage. Generally, you would consider dangers inferring a negative result to a business undertaking or programming item, anyway this isn’t supposed to be the situation. Risk management can likewise pass on potential chances to an undertaking process and decision-making to events. In this essay I will inform and clarify about two regions of event the executives frequently incorporated into the risks’ management territory that are considered in details: legitimate consistence and agreement the executives.

Bowdin and the others declared that risk management is “the process of identification, carrying out the threats of the business to deal with them”. Furthermore, it is a framework which expects to recognize and measure all dangers to which the business or task is uncovered with the goal that a cognizant choice can be taken on the best way to deal with the dangers, Bowdin also stated that exaggeration of the event by showcasing or over promotion is another kind of risk. Every one of these dangers may bring about security and budgetary issues at the occasion. Risking the board can be characterized as the way toward recognizing these issues, surveying them and managing them. Risk management is considered to be defined as the not fulfilling its objective when holding an event/festival. Risks are probably going to happen whether to decides it brings pros and cons. Moreover, it is crucial to specify the good risk management strategies, when the operational companies who run the event can reduce. The initial phase in making the efficient risk management upon executive’s framework is to comprehend the subjective differentiations among the kinds of dangers that associations face. Events’ risks from any class can be deadly to an organization’s methodology and even to its endurance (Kaplan, Robert S.& Mikes A. ,2012).

First of all, so far on the risk management we have learnt, to the real experiences in Generation Games, we considered it to be a free and local community plus tourists events, being sponsored by local stores in Lillehammer, creating an active atmostphere for the people in Lillehammer as well as tourists can participate in sports. Considering the event risks are ways to get people not harmed from all the activities, making the strategies for the risk management also means that protecting people, guaranteeing people with safety and fun activities. Then, the risks could be classified to different types, matching to each sports and the whole event, when you can identify the risks before holding an event, it also helps to encourage people to play especially kids. Afterwards, when you have recognized dangers, we can altogether examine the potential impacts that each will have on our plans on making the sports enough safe and available to people’s satisfaction, your organization and other current undertakings. Controlling the risks, finding a solution so that it is high probability that people will join the event. Presenting our experiences in the Generation Games: when we held the Dart sport, we have to know that the risks about playing Dart are getting hurts when others are throwing darts. Maybe the best method of the event risk management is to roll out little improvements to singular things on a continuous premise, as the progressions has happened, and afterward to complete a progressively extensive survey of the archive on Generation Games a less continual, yet at the same time standard timetable. The 3 extensive surveys that the Dart groups have made would incorporate returning to the means we canvassed in the prior pieces of this arrangement for plans on the days the event will occur, conceptualizing pretty much every one of the threats your event is dependent upon, adding new things to the rundown, and positioning them by significance. At that point do likewise with your current risks noticed, we made an idea, choosing the venue of our sports to be at the end of the spot for all the other sports, it stays as an area where people can freely throw the darts without hurting anyone else. Moreover, we also made baloons for throwing for kids so we are making sure that we made a line so that they dont stand too closed to it and hear the sounds when balloons are all being blown up, that might scare kids. That’s our strategy and how we monitoring our risks, we have to conclude every risk that could be occurred when the event is taking place. Noticing people for the risks we have specify before the event also help people who join feel more comfortable and secure.

This essay has presented the connections between the risks management strategies and how its impacts could reduce the risks on Generation Games. There are no difficulties and distincts of how we manage our risk management strategies, the main keys are to devote the right plans, to identify the accurate risks that the event we are holding have to face against, and also taking surveys to get responses and experiences from the communities who have participated in the event. The majority of the risks will less likelihood to happen when we organize our steps like a operational system, that will create a huge impacts on the performance and purposes of the event as well as the achievement after the event ends. In any case, it is reasonable and great practice to guarantee that risks shaped indispensable pieces of the executives and getting ready for the entire organization and its crews’ plans. These factors have solidly explained about the influential causes risk management to events, specially in the Generation Games event, it helped a lot in the use of group works to solve all the critical problems.

Connections Between Business Continuity Management and Risk Management

In the present generation all company and organisations that have an value in society for practicing its major activities in a profitable or non-profitable manner should have an ability to confront in the difficult situations to preserve the position and maintain its activities. Moreover, building a response to negative events from day to day basis, from the expected to the unanticipated has become a heart of organisations and governments around the globe. This essay will discuss on risk management and business continuity management in a distinctive perspective, applying theories and practices relating with organisational examples and finally the differences and similarities.

Undertaking these risks require an unified and holistic framework with the ability to classify appropriate responses to the circumstances. For further organisations, this means complying with an Enterprise risk management model. ERM approaches to evaluate all threats inclusive of strategic, financial, market, personnel, technology, legal, geopolitical, environment and compliance that would sceptically effect an organisation.

For having an efficient management and resisting issues, this guides into two distinctive roles recognised as Business continuity management and risk management.

Business continuity management is an integrated management process that analysis the critical impacts that intimidates an organisation and contributes a structure for maintaining a flexible and effective response that secures the concerns of its stakeholders, position, brand and potential activities ( Elliott, Swartz and Herbane, 2010). As a matter of fact, BCM supports the possibility of an entity under coercion. According to (. gov ) to implement the business continuity in the organisation, it is vital to understand the key products and services, the critical functions and resources required to deliver, the risk of these critical functions and finally the process to maintain these critical functions in an unpredictable incident to have access to premises and essential utilities.

In response of BCM process there is an crucial concern with the growth and application of pertinent business continuity plans and preparation to secure the management of an incident for the continuity and recovery of critical activities that reinforce general products and services. In this manner the BCM plans have a distinctive number of plans and content which vary from disparate organisations and should reflect the culture and structure of the organisation and the intricacy of its critical functions. Complying with these factors, it is fundamental to adopt a separate incident management, business continuity and business recovery plans which cover a particular segment of the organisation.

Following a preceding legitimate cyber-attack case of business continuity from Talk Talk a telecommunication company in the UK, discussing the contempt of computers forming issues into most sectors of the businesses over the last two decades. Similarly, it mentioned that majority of organisations does not have an business continuity planning and suffer from long term issues in its operations. The former CEO Baroness Harding of talk talk provided a essential keynote at the Info Security Europe event on 2018, explaining the cyber-attack (hack) on the telecom company 2 years ago. This attack had triggered the Talk Talk technical team to be cautious and sure if the issues was resolved to be back on its daily operations.

This case had an outcome for Talk Talk to transform their activities with a business continuity management plan, whereby the non-technical business leaders participating in technical issues that are essential to deliver business satisfaction.

Recent activities around the globe have seen risks in higher circumstances. These circumstances include terrorism, weather conditions and financial issues globally. This links with higher number of risks confronting the society and commerce in its daily operations. In a general overview, all organisations have projects, portfolios, and programmes that are genetically risky in terms of its mission and vision. This is because they are based on expectations, performed by people and matter the external influences. Risks can distress the goals of an organisations achievement either positively or negatively, in a further definition risks consist of an equal opportunities and threats, which are believed to be managed over the risk management process.

In addition, Risk management is a set of exercises to safeguard the most appropriate result after the event or attain the best predictable consequences. by considering this approach risk management operations will. Make an enormous participation to the accomplishment of an organisation with enclosing in its strategic, tactic, operations and compliance activities. Mentioning a crucial consideration for risk management is to minimise the scope of potential outcomes, proceeding with an example demonstrating by ( ) Volkswagen lost its investment opportunity because it consumed more playing within the markets than manufacturing cars.

In this example overviewed, risk management can play a major role in risk assessment and serving the organisation to achieve a particular profit margin for a trading occasion, whereby the organisation will manage measures that could derive a possibility in lower predictable profit line along with sustaining the profit within a convinced collection. Risk management tools and technique such as hedging exchange rates can help worthy investments in a profit volatility.

According to multiple researches, business continuity and risk management are acknowledged as distinctive functions, subsets of each other or some similarities which reside. For instance the prevention, preparedness, response and recovery approach to risk management or PPRR is conferred as risk management. Nonetheless, when all roles are combined they put results together, which conclude presenting a business continuity plan. Certainly, they have an relevant difference in applying the risk identification and business impact analysis to form a long-term business continuity.

In this manner, the term business continuity had emerged on acknowledgement after risk management. Risk management can be compiled as evade, pacify, deliver or accepting risk. Business continuity harmonizes to evade, pacify, deliver risk more than pacifying or accepting it. In this anticipation, it is viewed as a subset of risk management. However, there is a counter controversy that risk management is not limited to protect an organisation as a whole, it is mainly possible in a case of individual plan and transactions. In a organisation perspective the risk management examples are credit check on borrowers, and exchange rate hedging. In general every check and hedge are parts of risk management process, but it is implausible to influence the continuity of the organisation.

Risk Management Approach Used in Non-Financial Corporations

All over the world, companies have to face new challenges, opportunities and risks because of globalization, intense competition, new technology improvement and market structures changes.

As financial institutions before, non-financial corporations have just realized that risk management is becoming essential and be part of the good financial health of firms. Non-financial corporations core business involves the production of goods and services to sell them on the market, it doesn’t deal with financial processes like financial assets or liabilities. For instance, non-financial institutions could be retailers, manufacturers, business service providers. These companies are threaten by a wide range of strategic, business, credit, market and operational risks and they try to deal with them thanks to governance structures, risk measurement, management processes and risk transfer strategies. These risks have an influence on the companies health. In fact, they can generate financial loss and damage a company’s brand. But, risk management improve financial performance through identification, anticipation, reporting, management and control. Moreover, when significant firms confront economic issues due to risks, the whole economy can be affects. For instance, GDP may decrease, price stability may be alter and the rate of unemployment may increase.

In this essay we will describe what risks companies have to deal with? Moreover, what kind of process they set up to manage them ? We will exemplified these questions with the Microsoft’s case study.

First of all, when companies want to deal with risks management, they have to define these risks to anticipate and control them. Authors have different point of views regarding their repartition.

Hopkin argue that risks are divided into three categories. The first one is hazard (or pure) risks, this category has always negative outcomes and have to be mitigate by the company with adequate security procedures such as segregation of financial duties. The second category is control (or uncertainty) risks, for the author, companies have an aversion for them and they have to manage them. For instance, when companies make projects, there is an uncertainty about the delivery of the project on time. The last category of risks is opportunity (or speculative) risks. They are taken with the intention of obtaining positive outcomes but this is not assured. Hopkin (2014) argues that enterprises have to embrace these risks. In opposite, Lam recognize seven major types of risks. Strategic risk, business risk, market risk, credit risk, liquidity risk, operational risk, and compliance risk. In my opinion, the business risk classification of Wolke (2017) is the more detailed and consistent, he classifies them into two large categories : financial risks and performance risks. Then, he divides them into five subcategories depending on their type. They are many debates about risks repartition, but the most important issue is that an organization adopt the risk classification system that is most suitable for its own circumstances.

Secondly, companies follow some processes and use tools in order to deal with risks. There are several risk management standards and frameworks but they all have similarities. Lam (2014) argues that to face risks, companies firstly have to do an identification and assessment of them. They can use a risk mapping which join risk severity and frequency. Risk’s position on the map indicate if the risk is well-managed, managed or poor managed to companies. Then, quantification and reporting of risks is a crucial step too. Finally, they have to manage and control these risks depending on the company’s objectives and the type of risk. Hopkin (2014) is in accordance with Lam (2014) regarding the Risk Management Process, he follows the same step: risk assessment, risk reporting, risk treatment, residual risk reporting and monitoring. Organizations have to establish themselves their own method for risk analysis. Actually, individualized risk management method is more relevant and useful for companies (Hori, Sakurai, Syalim, 2009). Microsoft Corporation has to deal with risks in a changing landscape of attacks and exposures. Firstly, Scott Lange, the former director of risk management, identified a dozen broad categories of risks such as financial, reputational, technological… in order to create a complete inventory of the organization’s risk. Secondly, they started using risk maps developed by the senior management Mr. Lange and Jean-Francois Heitz the Microsoft’s treasurer. This risk map allows Microsoft to know which risk could be a threat and has to be managed as a priority. Moreover, an other tool is used to help the company facing risks, it is the risk grid which is very easy to use and to understand by the employees. It matches elements of the risk management process as the first column and the other columns indicated the current process for managing that risk, the ideal process, and what actions are required to move toward the goal. Then, the firm has created an Intranet to improve the communication about risk between the employees, this tool permits them to save time and be more connected to the risk management staff. Based on Microsoft’s presentation (2019), nowadays the company manages risks thanks to the Information Risk Management Council which follows a Risk Decision Matrix. In accordance to Hori, Sakurai and Syalim (2009) this matrix identifies which stakeholder is the most appropriate to make the decision and to manage the risk depending on his category and level.

The research philosophy represents the way in which data will be collected, analyzed and used into the research. I choose to use positivism because it highlights objective knowledge and supports hard and measurable data that match with my quantitative approach.

Moreover, there are three approaches : deduction, induction and abduction. The deduction goes from theories to data, in the opposite the induction goes from data to theories and the abduction try to collect enough information to formulate solid enough theories. We have chosen the deductive approach because we based our analysis on theories through the desktop research in order to collect data.

There are three major methods to do research : quantitative, qualitative and mixed method. A quantitative study is realized as a survey or a questionnaire which give us quantifiable results in the form of numbers, variables, objects. Quantitative analysis is used to make comparisons, measure, test hypotheses. On the contrary, the qualitative study’s goal is to understand and analyze the behavior and the characteristics of a group of people which is a representative’s sample of the studied’s population. The collect data takes the form of words such as descriptions, opinions, feelings from interview transcript, field notes or audiovisual material (Walliman, 2011). The mixed method combines these two kind of research. In my opinion, it is more suitable for this topic to use a quantitative research method in order to collect data and evaluate the efficiency of the risk management process into Microsoft.

We can collect two types of datas : primary data and secondary data. Primary data is gather by the researcher from his own researches and experiments. In the opposite, secondary data already exist and has been collected by researchers through other purpose and is used for another research question. In my opinion, secondary data is the most appropriate for my essay. This kind of data is very useful because it is easily accessible and free of charge. I exploited academic researches and textbooks in order to do my essay. Finally, I did a desktop research which gather data from existing resources.

Monte Carlo Simulation in Financial Risk Management

Monte Carlo simulation is a method used to estimate risk involved in the occurrence of an event. Ideally one will be presented with several alternatives to perform certain task, and by the use of Monte Carlo simulation informed decision can be made choosing the correct or the most convenient course of actions. The mechanism of Monte Carl simulation is a system model will be generated multiple time based on probability models that best suite the key factors. Each time the input value will be changed, on random basis. The model is mostly appropriate on trying to reach a rounded opinion on decision problems like a company profit that is derived from set of factors as associated costs, advertisement and market share. The idea of this simulation tool is to treat basic variables with probabilistic nature instead of the deterministic approach that may misrepresent the real life. Those variables will be assigned a random number that will differ on each run. On performing many runs, probability distributions can fitted on the outcome to study and analysis it. The simulation process helps the decision maker to enumerate various instances where the involved factors may be interrelate. This paper will look into the literature and how scholars made use of simulation tools, in general and Monte Carlo simulation in specific, to help on accessing, mitigating and even reducing the financial risks.

On the paper published by Bandaly, and his colleagues (2014) on financial risk management and how it is considered as an important tool for visualizing and recognizing the real nature and integrative scope of supply chain management; the authors defined supply chain risk management (SCRM) is an evolving discipline in which holistic solutions across the various sectors typically do not harmonize. Since organizational risk management encompasses many areas, such as sourcing, accounting, sales and advertising, risks mitigation strategies in the supply chain, and as it needs to address a lot of the involved fields, Bandaly research aims to reduce the gap between these fields by creating an integrated SCRM methodology utilizing financial instruments and operative processes. Authors investigated an aluminum supply chain, a manufacturer and a retailer. Aluminum cost volatility and speculation about the product market were related to the supply chain. In order to manage the risk along the supply chain, a stochastic optimization framework is created.

Using this optimization framework as a guide, Bandaly and his colleagues compared the performance of an adaptive risk management system with the sequences of a design, under which decisions on financial risk management are taken after decisions on operational risk management are finalized. Through modeling on a simulated basis and using simulations and statistical analyses, they evaluate the output of both models in order to minimize the total expected supply chain opportunity cost. They look at supply chain performance based on three considerations, at different levels: risk tolerance, uncertainty in demand and fluctuations in aluminum prices, the commodity of study. In most instances, they find that their findings on a unified system beats a series model. While the findings often show that its reliability is increased by the conventional supply chain, a criterion is possible that does not require the need of higher levels of risk. Of various business situations evaluated, management lessons are given from past experts opinions on how to build a better holistic approach.

In the fifth chapter of his book “Supply chain risk management”, Olson (2014) described particularly how nature is uncertain; hence, whatever model they are trying to build based on deterministic approach may be unrealistic. So every model that they build incorporates some level of risk due uncertainty. In addition, the more they are aware of the associated risk in their models and accounting for it, the more accurate their work will be. Risk in supply chain models can arise from unpredicted weather conditions like a natural disaster that can hinder certain logistical operation. Political unrest, economic situations, and major industrial accidents are other factors that can affect well-established supply chain models. Mostly, to account for these risks, they have to use probability to change the deterministic nature of their models. This mandates the use of Monte Carlo simulation in supply chain professionals’ work.

One of the topics discussed by Oslon (2014) is the idea of an inventory. He began with a brief description of what inventory can be; which was defined as, the resources that are stored that is exceeding current usage to be used in the future. Inventory is important because demand and supply are not always matching. The probability of a stock out event decreases with a higher inventory level. Stocking out is not favorable because its cost is not just represented in lost sales. It can lead to customers’ dissatisfaction and for them to start looking after alternative products, a matter that can put sales mission under unfavorable risk. On the other hand, building inventory means more cost and tied up capital, this is a risk on its own, because now the chances of bankruptcy, given that sales isn’t meeting their targets, is higher due to the large amount of money invested in keeping higher inventory levels. The problem is like a balancing problem that should be maintained to a certain level with the introduced variability. Inventory costs can be broken down, for further analysis, into holding costs, ordering cost, shortage cost, and purchasing cost. Holding cost is the cost associated with keeping commodities in my inventory and special treatment expenses that should be accounted for, like refrigeration. Ordering cost represented in the administrative work and expenses associated with requesting an order from the suppliers. Shortage cost, is represented in the amount of back order that can be accumulated due to inability to satisfy all the demand in a given period, or worse it can be the cost of lost sales, which will typically be identified on qualitative basis by sales experts. Finally, purchasing cost is the cost will be paid to the suppliers to pay for certain materials. So, Monte Carlo simulation can be used to quantify the risk involved here with the four different parameters. The trade off in the model will be to reach the optimal level minimizing the expected cost and the probability of stocking out.

The built hybrid SCRM system describes by Bandaly showed how the supply chain risk management mechanism involving the cooperation of supply chain stakeholders and the coordination of these members’ operational units. The system incorporates functional and financial risk management actions to reduce the expected total expense of a beer, the commodity of study, supply chain. The authors’ results show that the integrated model’s value efficiency is better than the sequential model as decisions are made separately by functional units, and it is more resilient as well, if exposed to evolving business environments. The results further illustrate the business environment where the unified design led to better results. A less volatile supply chain, for instance, can have some merit over a conservative supply chain while working with low demand volatility or low price volatility. The unified model is more convincing for conservative supply chains as the reduction in overall opportunity cost relative to the sequential template is important.

Nonetheless, a more dynamic supply chain can still leverage a hybrid model by increasing the opportunity cost for high price volatility events. The form of risk management approach used is relatable to how conservative the supply chain model and the volatility in request. When faced with increased demand volatility, the analyzed supply chain handled risks more using operative functions methods and less using financial tradeoffs. But since the supply chain is more aggressive or dynamic in nature, it uses organizational and financial instruments less to manage risk. The model has been improved by taking into account stochastic simulation lead times for null outputs and variations in the exchange rates in foreign currencies when a foreign supplier buys aluminum as per the stock market spot rates. In different organizational and financial context of risk management, the integrated supply chain risk management model can be further expanded. The design can include a large range of commodity items and several suppliers. The decisions incorporated can be formed as a dynamic process. Applying this approach, it may be more appropriate to use future or forward contracts rather than options.

The Mayo Clinic and Its Risk Management Facility

Murphy, S., indicated in his work that “the risk management is comparable to that of the immune system”. Considering that is not a thing or a part of something, but it is co-existing with each other like that of an organ or a part of it. Connecting into a larger organ or organization that must be able to go beyond its performance perfectly. Murphy, S., conveyed that the similarities between the immune system and the risk management are that one cannot fix or do something immediately when something is wrong. But to have a perfect immune system, one has to live a healthy lifestyle, have the best healthy eating habit and exercise to have an active physical activity as well. This is just the same goes with risk management, one will never give attention to a problem unless something wrong is identified. This exactly how the risk management works in the Mayo Clinic. The aim of the risk management and the immune system is not to put an end at all the bad things happening, but on the contrary, the risk management will learn from the bad occurrence that happened and existed in the healthcare facility. Furthermore, in view of this paper, the immune system is susceptible to all kinds of germs and virus that is a fact and no one is able to stop it from doing so, and the reality is that among this virus and germs the body gets stronger. Likewise, a tough organization needs to keep an eye on the same process as a matter of fact, this could make or break of an organization just like in the case of the Mayo Clinic. It is our reaction and adjustment to the case defines if we get resilient or vulnerable.

Upon watching the video from Phigenics. The Mayo Clinic openly presented the case of Legionella that affected their facility since it is already in their 150th years’ existing. They are accepting the fact they are experiencing some flaws from their designs and admittedly the structures of their buildings are really old. The organization facing this problem cooperatively acted on the problem. Facility management come together with infection control professionals and conceived a processing extent that ultimately led to a Water Management Program. Phigenics. Made it clear that their goal was “to be able to address the risks to the patients related with waterborne contaminants, either both biological and corrosion connected, in potable water systems.” Just like what is expected from a risk management program of a healthcare facility, the Mayo Clinic risk management program established a scope of work and went to leadership for project approval and funding. Similar procedures were taken by the risk management, by doing so there is no conflict in their implementation of the risk management program. They were able to involve Phigenics as a Legionella expert and Legionella assessing company to help them work out and put into operation a comprehensive and maintainable Water Management Program.

The conception of a multi-disciplinary team working within the hospital and outside of the facility with the assistance from the experts in the infection control and industrial hygiene. These working groups are consisting of the maintenance technicians, supervisors and mechanical engineers who would work out through the procedures for hazard control. It is important to take note of that the program would cover twenty-six buildings with the coverage area of 7,500,000 square feet, so an effective leadership is significant. Hence, the creation of a multi-disciplinary team will function as the overseer plays a vital role in the implementation and publishing of certain policy and guidelines in the healthcare facility for public awareness. Phigenics. Illustrates in their video, besides in the inclusion of in-house personnel, the Water Management Team included consultants from Phigenics. This team would be in charge of supervision by a specialist care and secondary progress, with their task as clearing a path for hazard control activities, and advancing improvements. As a part of their job description being a liaison with administration and ensured teams were communicating and documenting their work correctly. Full comprehensive reporting in their video presentation Phigenics. With diagrams and flow charts were displayed to show that the risk management program is really being followed by the management of the Mayo Clinic. Phigenics. Show the diagram about the processing of water throughout each building with each processing step named and numbered. From there the team completed a population-based risk assessment, this is regarded as areas with immunosuppressed patients as very high risk and non-patient areas, like waiting rooms, as low- risk areas. Generally speaking, everything that a healthcare facility’s risk management program strategies are being followed accordingly by the Mayo Clinic thus there is no inconsistency or whatsoever in this issue. Just to make sure that the management is strictly following the steps of the risk management facility program, the next step is to perform a systemic hazard analysis.

For this step, the team reviewed the flow diagrams carefully to identify hazards, then they characterize which risks are significant or not, and afterwards, the team determines if additional hazard control was needed. This is really what an organization should be doing and applying in their risk management program. Being under a good leadership the Mayo Clinic Water Management Team were able to identify seven areas as “control locations” as indicated in Phigenics. In supporting to regulate the hazards in these locations, team members are expected to develop control limits, then they chose monitoring methods, and lastly, the team is set to revise certain actions further. By processing and gathering of data, the team is closely observing the chlorine reaction to the water treatment plant. This procedure was also put into practice with the rest of the six controlled locations with the additional places where water is consumed either at drinking fountains and vendo machines or for the use in the restrooms. It is vital to monitor where the flow of water is coming to and coming from the pipes and being distributed to the said controlled locations. And true to its goal and purpose, all of this information was documented and accessible to all team members in Mayo Clinic’s phiAnalytics Water Management Program website. It is necessary to publish the managements’ action regarding the hazard control conflict. Used for the last two steps in the undertaking of risk management, are verification and validation. Intended for Mayo, the program is verified through online logs, oversight from the team, and quarterly check-in meetings. As stated earlier, everything must be documented for all the activities in the duration of the water treatment management program. Since it is easy for everyone to check on the Mayo clinic’s website anytime, then the organization is responsible for correct and comprehensive documentation that is verified by the team to give the public a verified data and report.

Fortunately, the Mayo Clinic has never had a Legionella outbreak. This framework allows them to act in response quickly to get a situation under control promptly and prove that they had done all in their power to prevent it in the first place. With all the data and reports about the incident, there is never a doubt that by establishing a Water management program provides a means to act on in a coordinated manner should a conflict surfaces. Upon investigation during the experiment is being done, the Mayo Clinic is proud to say that no matching Legionella was detected in the potable water system or inpatient hospital rooms. This is all because of good leadership in providing a quality healthcare assurance program is implanted in a healthcare facility. Hopefully, healthcare facilities will be like that of the Mayo Clinic having as their goal is to serve and render quality healthcare services to the people.

Reasons Why Big Data are Relevant to Risk Management

In the Islamic financial world where there are many questions regarding the Islamic risk management which there are numerous issues such as the limited data. the illiquid instruments to use and many other risks. A lot of studies have focused on risks that are particularly aimed at being controlled risks and how to manage them in a way of that reduces “bad effect” in decision making wherefore the issue of how the risk originally exists and why it is perceived as a bad effect instead of a good one should first be answered.

Big data technologies can help Risk groups acquire exact risk intelligence, drawn from an assortment of data sources, in nearly Real-time. Inside the financial services industry, they can permit asset manager, banks and insurance agencies to proactively recognize potential dangers, respond quicker and all the more adequately, and settle on strong choices educated by a great many risk variable.

At the point when applied to risk management inside the financial services related industry, we would include ‘high-veracity’ and ‘high-value’ to this list- compelling examination of this data can possibly drive expanded accuracy and dependability, and offers conceivably huge cost reserve funds by combatting the potential significant cost saving by combatting risk that can cost financial institutions fortunes’. Big data technologies are set to change the world of risk management big data technologies given the chances to address these challenges.

Risk Management faces new requests and difficulties. Because of the upheaval, regulators are requiring progressively point by point data and in-depth reports. Later, distinctly published ‘rogue trader’ and money laundering scandal where the unhealthy activity of having illegal tax avoidance outrages have provoked further industry calls for enhanced risk checking and risk modelling. As the advent of financial crisis in diverse part of the world, and a correlated emphasis on systematic financial risk, there have been many developments of the international financial regulation which designed to mitigating such a risk, therefore the created first systematic risk model based on big data.

Big data technologies given the chances to address these challenges. Based on the applied viewpoint in the Cerchiello and Giudici journal, it shows that the risk model can go far on the interrelationship between financial institution industry. As the big data have a tremendous, far fetching technologies which will permit the improvement of models that will bolster regular risk officer on the decision-making. Ready to process immeasurable amount of data in quick time-frame, the technologies can likewise suit new stipulation for situation stress tests at the trade exchange, counterparty and portfolio levels. By using big data, Incidents are identified quickly and a broader perspective of the situation is offered, which allows for reactions in almost real time.

These days, everyone is talking about the estimation value of big data, yet finding down useful approaches to put this data to use remains a test for risk managers. One of the best ways is by utilizing big data to enhance chance administration and decide an organization’s total cost of risk. One other thing that big data incorporate is that it is crucial when picking at a strategy for how you will address, limit and manage with these costs, you’re taking a gander at everything in a progressively all-encompassing route in light of the fact that there is a great deal of interrelation. The things that you can do to address one viewpoint or aspect in total cost of risk may affect another. Thus, it will manage to broaden the risk management choices.

Principally, the data management challenges. According to Shukla, big data management and analytics has turned into an exceptionally vital apparatus in risk management in the banking sector and yet, with such a large number of various kinds of information accessible overseeing sheer volume of data is one of the greatest difficulties for keeping banking industry. Once more, the challenge makes itself discernible when attempting to deal with data that is helpful and data which are unfavourable. Financial institutions currently need to channel through considerably more information to distinguish fraud. Breaking down traditional client data is not sufficient as most client communications currently happen through the Internet, portable applications and online life. To pick up a driven edge, financial institution service needs to use enormous information to all the more likely consent to controls, recognize and anticipate extortion, decide client conduct, increase of sales, create data-driven items and significantly more. Significant issue identified with data analytics in developing nations concern over the importance of the data in, its representativeness, its unwavering reliability and also the larger privacy issues of using personal data.

Next, Big Data significantly help with the financial risk. As the Big Data allows Fintech industries to identify risk and opportunities of emergent technologies in order to provide efficient and sustainable financial services. Hence, the amount of data available online increases exponentially by the second whereas for the reason that their immediate availability, financial sectors has the opportunity in predicting the risk having quick reaction time to counter and increase the effectiveness of the sector.

Big data has made lots of significant role towards the risk management, primarily is credit risk. In Bank Islam, the application of using scorecard such as Statistical and Behavioural scorecards have help the bank evaluate client circumstances and manage to take preventive action (Thijs, n.d.). According to a survey by The Economist Intelligence Unit, businesses and entities reports that the most successful use of Big Data tools on the risk management activity is prevention of credit card fraud at the top and following by, the evaluation of credit repayment risk, analysing the liquidity requirements, regulatory compliance and reporting, also the least benefits is prediction on market trends. Big Data Analytics in banking sector helps early detection cases of high-risk accounts thereby helping in risk management thereby by reducing cases of frauds and defaults (Shukla, 2018). Following are operational risk. As it comes down to human error mostly the risk is high. Not every system provider can cater to complexity of Islamic Banking Products, therefore it needs efficient data integration and treat data integration very seriously as to cleanse and enrich the data. Big Data’s potential power lies in its ability to integrate a variety of platforms into a single solution, which provides more control and information about client interactions, while improving security and confidentiality. As for market risk, there are plenty method to use such as Monte Carlo simulation which presents many possible developments as it requires huge amount of calculation, the big data plays role in this by covering all bases. Big Data allows for better business and market simulations and predictions, such as interest rates, exchange rates, liquidity, and raw material prices. Not only that, big data too has redefined risk and create more business models and opportunities.

Nonetheless, the issues related to risk management in Islamic financial institutions requires significant attention. This is because some risks arise due to the nature of Islamic financial institutions themselves. Big Data applications have great potential, but they are still in the initial phases of development and implementation. The availability of those data cannot solve every single problem, and in fact, big data poses as many technical challenges as well as opportunities for organizations and regulators. The talk about using Big Data models for risk management was more at an academic level and less in practice. Various institutions need to keep up with smaller, more agile companies and peer to peer models.