Sunteți pe pagina 1din 7

Business Opportunities Report: Risk Analysis

PRESENTERS: Ralph Deiparine Monique Sim Kara Dacayan Mike Faustino

January 12, 2012

I. What is Risk Analysis? a. Definition Risk analysis is a technique to identify and assess factors that may jeopardize the success of a project or achieving a goal. This technique also helps to define preventive measures to reduce the probability of these factors from occurring and identify countermeasures to successfully deal with these constraints when they develop to avert possible negative effects on the competitiveness of the company. Reference class forecasting was developed to increase accuracy in risk analysis. One of the more popular methods to perform a risk analysis in the computer field is called facilitated risk analysis process (FRAP) b. Facilitated Risk Analysis Process FRAP analyzes one system, application or segment of business processes at time and assumes that additional efforts to develop precisely quantified risks are not cost effective because: Such estimates are time consuming Risk documentation becomes too voluminous for practical use Specific loss estimates are generally not needed to determine if controls are needed.

After identifying and categorizing risks, a team identifies the controls that could mitigate the risk. The decision for what controls are needed lies with the business manager. The team's conclusions as to what risks exist and what controls needed are documented along with a related action plan for control implementation. Three of the most important risks a software company faces are: unexpected changes in revenue, unexpected changes in costs from those budgeted and the amount of specialization of the software planned. Risks that affect revenues can be: unanticipated competition, privacy, intellectual property right problems, and unit sales that are less than forecast. Unexpected development costs also create risk that can be in the form of more rework than anticipated, security holes, and privacy invasions. Narrow specialization of software with a large amount of research and development expenditures can lead to both business and technological risks since specialization does not necessarily lead to lower unit costs of software. Combined with the decrease in the potential customer base, specialization risk can be significant for a software firm. After probabilities of scenarios have been calculated with risk analysis, the process of risk

management can be applied to help manage the risk. Methods like applied information economics add to and improve on risk analysis methods by introducing procedures to adjust subjective probabilities, compute the value of additional information and to use the results in part of a larger portfolio management problem.

II. What is Risk Management? Risk management is the identification, assessment, and prioritization of risks (defined in ISO 31000 as the effect of uncertainty on objectives, whether positive or negative) followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities. Risks can come from uncertainty in financial markets, project failures (at any phase in design, development, production, or sustainment lifecycles), legal liabilities, credit risk, accidents, natural causes and disasters as well as deliberate attack from an adversary, or events of uncertain or unpredictable root-cause. Several risk management standards have been developed including the Project Management Institute, the National Institute of Science and Technology, actuarial societies, and ISO standards. Methods, definitions and goals vary widely according to whether the risk management method is in the context of project management, security, engineering, industrial processes, financial portfolios, actuarial assessments, or public health and safety. The strategies to manage risk typically include transferring the risk to another party, avoiding the risk, reducing the negative effect or probability of the risk, or even accepting some or all of the potential or actual consequences of a particular risk. Certain aspects of many of the risk management standards have come under criticism for having no measurable improvement on risk, whether the confidence in estimates and decisions seem to increase. Method For the most part, these methods consist of the following elements, performed, more or less, in the following order. Identify, characterize, and assess threats Assess the vulnerability of critical assets to specific threats

Determine the risk (i.e. the expected consequences of specific types of attacks on specific assets) Identify ways to reduce those risks Prioritize risk reduction measures based on a strategy

A. Principles of risk management The International Organization for Standardization (ISO) identifies the following principles of risk management: Risk management should: Create value - resources expended to mitigate risk should generally exceed the consequence of inaction, or (as in value engineering), the gain should exceed the pain Be an integral part of organizational processes Be part of decision making Explicitly address uncertainty and assumptions Be systematic and structured Be based on the best available information Be tailorable Take into account human factors Be transparent and inclusive Be dynamic, iterative and responsive to change Be capable of continual improvement and enhancement Be continually or periodically re-assessed

III. What are the steps in Risk Analysis? A. Introduction Almost everything we do in today's business world involves a risk of some kind: customer habits change, new competitors appear, factors outside your control could delay your project. But formal risk analysis and risk management can help you to assess these risks and decide what actions to take to minimize disruptions to your plans. They will also help you to decide whether the strategies you could use to control risk are cost-effective. B. How to Use the Tool: Here we define risk as 'the perceived extent of possible loss'. Different people will have different views of the impact of a particular risk what may be a small risk for one person may destroy the livelihood of someone else. One way of putting figures to risk is to calculate a value for it as: Risk = Probability of event x Cost of event Doing this allows you to compare risks objectively. We use this approach formally in decision making with Decision Trees. To carry out a risk analysis, follow these steps: 1. Identify Threats: The first stage of a risk analysis is to identify threats facing you. Threats may be: Human from individuals or organizations, illness, death, etc. Operational from disruption to supplies and operations, loss of access to essential assets, failures in distribution, etc. Reputational from loss of business partner or employee confidence, or damage to reputation in the market. Procedural from failures of accountability, internal systems and controls, organization, fraud, etc.

Project risks of cost over-runs, jobs taking too long, of

insufficient product or service quality, etc.


Financial from business failure, stock market, interest

rates, unemployment, etc. Technical from advances in technology, technical failure, etc. Natural threats from weather, natural disaster, accident, disease, etc. Political from changes in tax regimes, public opinion, government policy, foreign influence, etc. Others This analysis of threat is important because it is so easy to overlook important threats. One way of trying to capture them all is to use a number of different approaches: Firstly, run through a list such as the one above, to see if any apply.
Secondly,

think through the systems, organizations or structures you operate, and analyze risks to any part of those. structures.

See if you can see any vulnerability within these systems or Ask other people, who might have different perspectives.

Estimate Risk: Once you have identified the threats you face, the next step is to work out the likelihood of the threat being realized and to assess its impact. One approach to this is to make your best estimate of the probability of the event occurring, and to multiply this by the amount it will cost you to set things right if it happens. This gives you a value for the risk. 2. Manage Risk: Once you have worked out the value of risks you face, you can start to look at ways of managing them. When you are doing this, it is important to choose cost effective approaches in most cases, there is no point in spending more to eliminating a risk than the cost of the event if it occurs. Often, it may be better to accept the risk than to use excessive resources to eliminate it. Risk may be managed in a number of ways: By using existing assets: Here existing resources can be used to counter risk. This may involve improvements to existing methods and systems, changes in responsibilities, improvements to accountability and internal controls, etc.

By contingency planning: You may decide to accept a risk, but choose to develop a plan to minimize its effects if it happens. A good contingency plan will allow you to take action immediately, with the minimum of project control if you find yourself in a crisis management situation. Contingency plans also form a key part of Business Continuity Planning (BCP) or Business Continuity management (BCM). By investing in new resources: Your risk analysis should give you the basis for deciding whether to bring in additional resources to counter the risk. This can also include insuring the risk: Here you pay someone else to carry part of the risk this is particularly important where the risk is so great as to threaten your or your organization's solvency.

Review: Once you have carried out a risk analysis and management exercise, it may be worth carrying out regular reviews. These might involve formal reviews of the risk analysis, or may involve testing systems and plans appropriately. C. What is a Contingency Plan? A contingency plan is a plan devised for an exceptional risk which is impractical or impossible to avoid. Contingency plans are often devised by governments or businesses who want to be prepared for events which, while highly unlikely, may have catastrophic effects. For example, suppose many employees of a company are travelling together on an aircraft which crashes, killing all aboard. The company could be severely strained or even ruined by such a loss. Accordingly, many companies have procedures to follow in the event of such a disaster. The plan may also include standing policies to mitigate a disaster's potential impact, such as requiring employees to travel separately or limiting the number of employees on any one aircraft.

S-ar putea să vă placă și