Study Guide - IT Risk Management 600 - Compressed
Study Guide - IT Risk Management 600 - Compressed
Faculty of
Information Technology
IT Risk Management 600
Year 1 Semester 1
INTERACTIVE ICONS USED IN THIS LEARNER
GUIDE
Research Glossary
Key Point
Think Point
Problem(s)
Case Study
Bright Idea
Review Questions
Web Resource
Multimedia Resource
FACULTY OF INFORMATION TECHNOLOGY
QUALIFICATION TITLE:
BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
LEARNER GUIDE
MODULE: IT RISK MANAGEMENT 600
Review questions
2 CORPORATE GOVERNANCE
2.1 Introduction
Lecture 4
2.2 Definition of corporate governance
Review questions
Review questions
Review question
5.5 Strategy
5.6 People
5.9 Outsourcing
Review questions
Review question
Review questions
Review questions
Review questions
UNIT ONE | ENTERPRISE RISK MANAGEMENT IN CONTEXT
AIM
At the end of this topic, you should be able to demonstrate, discuss and interpret
risk, risk management and ERM in an overall context and be able to assess corporate
governance in a risk-related context.
Learning Outcomes
1.1 INTRODUCTION
The global financial crisis in 2008 demonstrated the importance of adequate risk
management. Since then, new risk management standards have been published,
which draw together all developments to provide a structured approach to
implementing ERM.
Many companies perceive a rise in the number and severity of the risks they face.
Some industries confront unfamiliar risks stemming from deregulation. Others worry
about increasing dependence on business-tobusiness information systems and just-
in-time supply/inventory systems. And everyone is concerned about emerging risks
of e-business – from online security to customer privacy. (Economic Intelligence Unit
2001)
Traditionally, risk management has been segmented and carried out in “silos”. However,
with the dynamic environment and the evolving nature of risk, businesses encounter
new types of risk while pursuing new business objectives. There is therefore a need for
an integrated framework for a holistic approach to risk management. Businesses have
increasingly become exposed to a whole range of risks including operational, strategic,
financial, market, compliance and regulatory risks. It is clear that an effective risk
management function, based on a broad and integrated framework, is necessary to
ensure that all risks are covered. ERM is therefore a response to the sense of inadequacy
in using a silo-based approach to manage
increasingly interdependent risks (Chapman, 2011). With ERM, risks can be managed
in a coordinated and integrated way across an entire business.
STUDY
Study the section o n “Approach to risk
management” par. 1.2 in Chapter 1 of the
prescribed book.
For all types of organizations, there is a need to understand the risks being taken
when seeking to achieve objectives and attain the desired level of reward.
Organizations need to understand the overall level of risk embedded within their
processes and activities. It is important for organizations to recognize and priorities
significant risks and identify the weakest critical controls. When setting out to
improve risk management performance, the expected benefits of the risk
management initiative should be established in advance. The outputs from
successful risk management include compliance, assurance and enhanced decision-
making. Such outputs will provide benefits by way of improvements in the efficiency
of operations, effectiveness of tactics (change projects) and the efficacy of the
strategy of the business. The benefits of ERM include the following:
• Link growth, risk and return: Business’s accept risk as part of wealth
creation and preservation and they expect return commensurate with risk.
ERM provides an enhanced ability to identify and assess risks and establish
acceptable levels of risk relative to potential growth and achievement of
objectives. _
• Rationalise capital: More robust information on risk exposure allows
management to more effectively assess overall capital needs and improve
capital allocation. _
• Seize opportunities: The very process of identifying risks can stimulate
thinking and generate opportunities as well as threats. Reponses need to be
developed to seize these opportunities in the same way that responses are
required to address identified threats to a business.
STUDY
Risk-taking refers to the tendency to engage in behaviors that have the potential to
be harmful or dangerous, yet at the same time provide the opportunity for some
kind of outcome that can be perceived as positive. Driving fast or engaging in
substance use would be examples of risk- taking behaviour. They may bring about
positive feelings in the moment. However, they can also put you at risk for injury,
such as an accident. Likewise, taking and managing risk is the essence of business
survival and growth.
The reality is you cannot grow a business without taking risks, and you cannot take
risks without being prepared.
Growth strategies are a real test of leadership and organization. They seek to transform
mindset and culture. They take courage and commitment. They also quickly add cost
and complexity. Failure can be serious to careers and business survival. Given the stakes
and the obvious challenges, it is surprising that success is often undermined by
incomplete or perhaps wishful thinking, loss of control or even loss of nerve.
The entire management team must incorporate the risk dimension fully into any
evaluation or discussion of performance and plans.
Organisations which are more risk conscious have for a long time known that actively
managing risk and opportunity provides them with a decisive competitive advantage.
Taking and managing risk is the essence of business survival and growth.
• Value enabler
New business initiatives almost always depend on some involvement of IT:
Enabling successful IT
projects that support the new initiatives and, thus,
the creation of value
Applying new technology or using new technology in innovative ways to
enable new business initiatives and the creation of value
• Value inhibitor
The reverse side of the previous statements applies as well:
IT-enabled business projects or investments often fail to deliver the
expected results, so value is not delivered.
The enterprise may fail to identify or capture opportunities for new
business initiatives arising from new technology.
• Value destruction
can cause mild to serious
Some IT events, especially in IT operations,
operational disruption to the enterprise.
Source: http://www.isaca.org/Journal/Past-Issues/2009/Volume-6/Pages/Identify-
Govern-andManage-ITRisk-Part-3-andnbsp-andnbsp-Techniques-and-Uses-for-Risk-IT-
and-Its-S.aspx
The board of directors plays an essential role in ensuring that an effective ERM
program is in place. The board’s role is to steer the corporation towards corporate
governance policies that support long-term sustainable growth in shareholder
value. The board should:
• Eliminate policies that promote excessive risk-taking for the sake of short-
term increases in stock price performance;
• Establish compensation plans that align goals to long-term value creation,
taking into consideration incentive risks;
• Ensure that appropriate risk management systems are in place to avoid
excessive risk taking, and
• Be comprised of primarily independent, diverse members, which is helpful to
assess a business’ risk profile.
The task for boards of course is to ensure the effectiveness of their risk
model. With this in mind, here are some action items for the strategic risk
management agenda for boards and CEOs to consider:
• Appoint a C-level risk leader empowered not only with the responsibility, but
with the authority to act on all risk management matters.
• Ensure that this leader is independent and can work objectively with the
company’s external advisers (external audit, legal etc.) and the governing
decision maker and oversight function (the CEO and board).
• Be satisfied as to the adequacy of the depth of current risk analysis actions,
from an identification, assessment and mitigation standpoint.
• Be confident that the risk management information board members receive
is accurate, timely, clear and relevant.
Figure 1.1 The role of the board and the integration of risk management. (Adapted
from Garratt (2003)) Reproduced with permission from The Fish Rots from the Head, B.
Garratt, Profile Books Ltd.
As illustrated in Figure 1.1 above, risk and opportunity impinges on the four main
functions of boards: policy formulation, strategic thinking, supervisory management
and accountability. Policy formulation involves setting the culture for the organisation
which should include risk management; strategic thinking entails selecting markets to
pursue and commit resources to those markets on the strength of the risk profile
prepared; supervisory management requires businesses to put in place oversight
management and governance processes including formal risk management
processes. Accountability relates to ensuring that risk mitigation actions have clear
owners who are charged with implementing pre-agreed actions to address the risks
identified, report changes in risk profiles and engage in ongoing risk management.
1.8 E R M STRUCTURE
Effectiveness and efficiency of operations
Reliability of financial reporting
Compliance with applicable laws and regulations
1.8.3 Implementation
Mandate and commitment
Design framework
Implement framework
Monitor framework
Improve framework.
1.8.5 Risk Management Policy
A risk management policy sets out how the risks, which have been identified
by the risk assessment procedure, will be managed and controlled. The risk
management policy assigns responsibility for performing key tasks,
establishes accountability with the appropriate managers, defines boundaries
and limits and formalises reporting structures. The policy should address
specific responsibilities of the board, internal audit, external audit, the risk
committee, the corporate governance committee, the central risk function,
employees and third party contractors in implementing risk management. A
policy statement defines a general commitment, direction or intention. A
policy on risk management expresses an organisation’s commitment to risk
management and clarifies its general direction or intention.
A risk source has the intrinsic potential to give rise to risk. A risk source is
where a risk originates. It is where the risk comes from.
STUDY
1. Distinguish between risk and uncertainty. Explain the relationship between risk and
opportunity for an organization like South African Airways (SAA).
5. Define and explain the terms risk, risk management, risk diversity and risk taking.
4. Identify the option that best describes the diversification into many
unrelated areas
A. Risk management
B. Good management
C. Uncertainty reduction
D. Sustainability
5. What is Risk Evaluation?
A. looks at the combined effect of the identified risks and opportunities
B. evaluating every risk that has already taken place in a project
C. taking incognisance of every risk happened to the competitor
D. allowing risks to happen and take proper precautions afterward
AIM
At the end of this unit, you should have a clear understanding of corporate
governance in an enterprise wide risk-related context.
KEY POINTS
Corporate governance
The Companies Act, 2008 (Act No 71 of 2008) Basel III regulation accord
Financial crisis
Learning Outcomes
2.1 INTRODUCTION
Corporate governance usually outlines the goals and objectives of each business
contract. The rate of return, length of the contract, individuals who can approve
contracts and other obligations are usually included in the corporate governance
framework. Corporate governance also creates a system of checks and balances to
govern internal business departments. Such system ensures that no one (individual
or department) dominates business decisions or operates outside the company’s
mission and values.
READ
Effective corporate governance promotes the efficient use of resources within a firm
and the economy at large. When an efficient corporate governance system is in place,
debt, equity and capital flow to enterprises that are capable of investing these
resources efficiently in order to produce goods and services that are most in demand
and have the highest rate of return. In this regard, effective governance helps to grow
and protect scarce resources and to ensure that societal needs are met. Effective
governance should make it possible to replace managers who do not put scarce
resources to efficient use or who are incompetent in what they do.
To succeed in the long term, enterprises must comply with the laws, regulations and
expectations of the societies in which they operate. Most corporations take their
corporate citizenship seriously. They contribute to civil societies' needs while some are
opportunistic and have no regard for social or environmental issues. Good corporate
governance is essential to ensure adherence to legislation as well as corporate social
responsibility principles.
In the last few decades, the term "corporate governance" has become a buzzword
throughout the world, and is certainly not new to South Africa. The history of
corporate governance in South Africa can be found in three bodies of knowledge,
namely the Companies Act, 1973 (Act No 61 of 1973), the King I Report on Corporate
Governance of 1994, the King II Report on Corporate Governance of 2002 and the
King Code of Governance in South Africa 2009 (King III). We need to look at the
history of corporate governance in South Africa to understand the relevance of the
King II Report.
* Please note that the Companies Act of 1973 has been replaced by the
Companies Act of 2008. Please refer to Appendix 1for an explanation on
new Companies Act of 2008.
After legislative developments, locally and internationally, the 1994 King Report was
revised and replaced by the second King Report on Corporate Governance for South
Africa, 2002. The King II Report moved away from the single bottom-line principle (i.e.
profit for shareholders) to a triple bottom-line principle, which takes into account the
environmental, economic and social activities of a company. Besides reporting on their
financial performance (single bottom line), corporations must also disclose their social
and environmental performances (triple bottom line). This method places greater
emphasis on the non-financial indicators. Companies have to report on the nature and
extent of commitment to social, transformation, ethical, safety, health and
environmental management policies and practices. In a company, this is referred to as
the "triple bottom line".
2.4.4 The King Code of Governance in South Africa, 2009 (King III) 1
King III became necessary because of the anticipated new Companies Act of 2008 that
came into effect on 1 May 2011, and changing trends in international governance. The
review also came at a time when business ethics and corporate governance are
increasingly under the spotlight in view of recent corporate failures and the global
economic meltdown. As with King I and II, the King Committee endeavored to be at the
forefront of governance internationally, and this has again been achieved by focusing
on the importance of reporting annually on how a company has positively affected the
economic life of the community in which it operated during the year under review. In
addition, emphasis has been placed on the requirement to report on how the company
intends to enhance those positive aspects and eradicate or ameliorate any possible
negative impacts on the economic life of the community in which it will operate in the
year ahead.
King III recommends that companies generate sustainability reports according to the
Global Reporting Initiative’s Sustainability Reporting Guidelines. As of June 2010,
companies listed on the Johannesburg Securities Exchange (JSE) are expected to comply
with King III.
2.5 THE RELEVANCE OF THE KING III REPORT TO RISK MANAGEMENT
2.5.1 Consequences
Placing corporate governance in the spotlight means an automatic increase in the legal,
regulatory and reputational risks of an enterprise. Hence, certain legal mechanisms
such as the Companies Act 2008 and the JSE's listing requirements are used to enforce
the King III Report and the Code of Corporate Practices and Conduct. King III applies to
all listed companies on the JSE, banks, financial and insurance institutions and some
public sector agencies.
The consequences of corporate governance in the King III Report relate strongly to how
effectively companies enforced the King I Report in 1994. Companies with good
corporate governance will attract more foreign investments to finance their growth and
will therefore be more competitive in the corporate environment. Good corporate
governance contributes to shareholders' wealth and is a key factor in the investor
decision-making process. Investors are willing to pay a premium for good governance
for three reasons.
• They believe that the company will perform better over time, which
will mean higher share prices.
• It is a way of reducing risk by either avoiding it altogether or by coping
better with adverse events.
• The focus on corporate governance is a trend, but the reality is that
no one wants to be left behind.
Corporate governance principles and practices are dynamic and evolving. A code of
governance, which deals with the principles, should be studied with the report in which
recommendations of the best practices for each principle are provided. All entities should
apply the principles in the code and consider the best practice recommendations in the
report. All entities, by way of explanation, should make a positive statement about how the
principles have been applied or have not been applied. Such level of disclosure will allow
stakeholders to comment on and challenge the board on the quality of its governance.
Application will differ for each entity and is likely to change, as the aspiring nature of the
code should drive entities to improve on governance practices constantly. It is important to
understand that the “apply or explain” approach requires more consideration and
explanation of what has actually been done to implement the principles and best practice
recommendations of governance.
STUDY
Study the section on “King III at a glance”, Corporate
Go ve r n a n ce and the new Companies Act of 2008
explained in Appendix 1 at the end of the Study Guide.
REVIEW QUESTIONS
.
1. A driver training is an example of
A. Avoidance
B. Elimination
C. Transfer
D. Reduction
6. Questions that should be asked to assess the overall project risk include:
A. Have top managers formally committed to support the project?
B. Are end-users committed to the project and proposed system
being built?
C. Are requirements fully understood by development team and
customers?
D. A,B,C
AIM
At the end of this unit, you will be able to identify and discuss Stage 1 of the ERM
process. Establishing the context will assist you in gaining an understanding of the
background to the business and business activities, processes or projects.
Learning Outcomes
• Identify and explain the business process for establishing the context;
• Discuss the four process mechanisms for establishing the business context, and;
Unit 3 deals with Chapter 8 of the prescribed book. This section will
discuss Stage 1 of the ERM process.
Stage 1 of the ERM process is establishing the context. It will form the foundation for
all the other stages in the ERM process. Establishing the context will deal with the
business as a whole as well as the business activities, processes and projects. This
stage is used to acquire accurate data and information about the whole business.
Refer to par. 8.1 to 8.3 of the prescribed book.
3.2.1 Planning
Prior to embarking on the written proposal it is prudent to plan the preparation of the
proposal as if it were a project in its own right. This entails obtaining answers to basic
questions such as who, what, when and how:
who is going to write the proposal – will it be a single individual, will marketing
be involved in providing information on previous experience, is support required
for the preparation of diagrams/charts/organograms, is background research
required, are CVs required to be updated?
what will the subject matter be, or was the information gathered during the
interview with the client so complete and precise there is no need for follow-up
questions?
when does the proposal have to be submitted -how many copies of the proposal
are required, is the proposal to be bound or is it to be sent electronically be e-
mail; if by e-mail, should the proposal exclude photographs to cut the file size
down?
how is the proposal to be prepared – what software is required and how will it
be accessed – and if the proposal is to be restricted to a limited number of
pages, what subjects will receive a more comprehensive treatment?
3.3 PROPOSAL WRITING
The ERM process can be regulated or be constrained by the culture of business risk
management, resources and plan. It is very important for a business to take note of the
factors that can have an impact on the risk management process.
STUDY
Certain process mechanisms are used in the first stage to obtain information on the
business. They are financial analysis tools, risk management process diagnostic,
SWOT analysis and PEST analysis.
Financial ratios are used to look at the financial position and performance of a business.
These ratios are used for planning, evaluation and control purposes, to determine the
financial standing of a business and to aid in the risk analysis process.
The growth of the business is also an aspect to analyse when looking at the business in
its full context. The PEST analysis, which stands for “political, economic, social and
technology factors”, can be used to look at the market, in which the business operates.
The business objectives will be the criteria against which the business strategy’s success
will be measured.
3.5.2 U n d e r s t a n d i n g the business plan
The business plan should show how the business would achieve its objectives by looking
at all the factors that might have an impact on the business.
It is important to understand that a business can have a very active competitive market
in which it operates. A business must know its industry and the risks associated with
that specific industry.
A business must use its resources to the most competitive advantage in the market. If
resources are used effectively, the business can achieve a greater return on its capital
employed.
A business must understand that change is unavoidable and that the business must
appropriately change processes to achieve the best possible solution.
REVIEW QUESTION
3. A risk item checklist would contain known and predictable risks from which
of these categories?
A. Product size
B. Development environment
C. Staff size
D. all of them
AIM
At the end of this unit, you will be able to explain stages two to seven of the ERM
process. A clear understanding will be gained on the interrelationships between the
different stages in the implementation of the ERM process.
KEY CONCEPTS
LEARNING OUTCOMES
Unit 4 deals with Chapters 9 - 14 of the prescribed book. Each section will discuss the
remaining six stages (Stages 2 to 7) in the ERM process.
4.1 RISK IDENTIFICATION: Stage 2
Risk identification is a crucial step in the ERM process. As discussed in Study Unit 3, it is
important for a business to understand the business activities and context. In the
second stage, it is important to be able to identify the risks in the business and
understand how they fit into the overall business context.
Through risk identification, the business will be able to identify the key risks and risk
events associated with the business. The business will constantly change and grow as
well as the risks associated with the business. The business will need to indentify risks
on a constant basis and identify the opportunities that may arise in order to enhance its
objectives as well as risks that may reduce the likelihood of the business achieving its
objectives. Risk can also be based on two main outcomes namely the upside and
downside of risk. Refer to par. 9.1 to 9.3 in the prescribed book.
The process inputs will deal with assumptions, business analysis, uncertain events,
lessons learnt and issues regarding the risk identification process. The process output
will be the risk register. A risk register is a tool that can be used by a business to compile
a list of all the risks identified in the business and categorise the risk according to the
impact, probability, risk owner and counter measures.
Refer to par. 9.6 in the prescribed book regarding all the factors that can have an
impact or constraint on the risk identification process.
• Risk checklist
A risk checklist is used to list all the risks that were identified on previous
projects within the business.
• Gap analysis
A Gap analysis can be used to identify the main risks linked to a certain activity or
project of the business. The method will assist the business to establish where the gap
is in the risk associated within the activity/project so that pro-active or reactive risk
measures can be established.
• Risk taxonomy
A Risk taxonomy can be explained as a structured checklist to break down the risks and
opportunities into manageable components, which then can be aggregated for exposure
measurement, reporting and management. This method is used in the risk taxonomy of
software development. Refer to Table 9.1 in chapter 9 of the prescribed book.
• PEST analysis
The business can also use the PEST analysis method in the identification stage to
identify the risk exposure of the business to its external environment. The business can
conduct this analysis in a workshop or brainstorming session.
• SWOT analysis
A SWOT analysis is a very easy and understandable method for a business to identify
the risks and opportunities in the business.
• Database
A risk database can be used to capture all the information of each risk identified in the
business and is an effective way to monitor all the risks and actions used in the
management of all the identified risks.
A breakdown structure for business risk is used to identify all the sources of risk within
projects and activities in the business.
• Risk questionnaire
A risk questionnaire is used when a business needs to establish the concerns and risks
that arise in a business project/activity through the various stages. The completion of
the questionnaire will show how the business employees respond to risk.
• Risk register
STUDY
In the risk identification process, the activities required are the tasks that are necessary
to capture risk, uncertainty, and record the risks in a log, list or risk register. The
following activities need to be conducted:
The objectives of the business must be clear and understandable so that the risk
identification process will be able to identify the threats or opportunities that may arise
from the business objectives.
The business activities (as described in Study Unit 3) which have been identified in Stage
1: Establishing the context of the risk management process must be reviewed and
examined for sources of risk and opportunities.
• Facilitation
It is important to have techniques that can be used to best identify the risks and
opportunities to suit every circumstance. Facilitation needs to be conducted through
interactive workshops to inform the business on how to identify the risks. Thus, the
responsibilities for a facilitator in an interactive workshop are as depicted in Figure 4
below.
To have a consensus on the risks and opportunities is essential so that the business can
assign risks to risk owners and managers in the risk management process.
• Risk Register
A risk register will be drafted after all the process activities have been conducted. The
risk register can be used as a proactive tool in the risk identification process.
The risk analysis stage will provide information on the likelihood of risks and
opportunities occurring and the impact of them to aid in the decision making process.
The risk analysis process will assess all the risks identified in the risk register. Ample
time should be allowed for conducting the risk analysis stage. Refer to par. 10.1 to 10.3
of the prescribed book.
READ
The process inputs in the risk analysis process will consist of risk study parameters,
which include risk identification, risk recording, profit and loss account assessment,
balance sheet assessment and industry betas. The process outputs will be the risk
register including the assessment, which shows the probability and impact of each risk
and opportunity.
4.2.1 Process Mechanisms for Stage 3: Risk Analysis
Probability is the main process mechanism used in the risk analysis’s process.
Probability is shown on a scale of 0 to 1. If there is no chance of an event occurring, the
probability will be 0, and if there is a chance of the event occurring, the probability will
be
1. Refer to Table 1 for an example of probability.
In the risk analysis process the activities that need to take place are the tasks that are
necessary to capture the likelihood of the risk occurring and the impact so that it can be
recorded in the risk register. The following activities need to be conducted:
• Causal analysis
The causes of any risk must be identified. It is important for the business to learn from
past events to implement risk management measures for future events. Refer to Figure
10.4 in the prescribed book for the main causes of event diagram, which identify the
relationships, and categories of risks.
Pareto 5 analysis is used to identify those risks that will have a dramatic impact on
business projects/activities and objectives. Such analysis will rank and order the risks
according to their impact so that the business can manage the high risks accordingly.
The CAPM model is used to determine the expected return of an asset in relation to its
risk or risk profile. The higher the risk, the higher the return will be for an investment.
Market risk is measured by its beta in the CAPM model. Refer to the section “Required
Rates of Return” in par. 10.8.4 of the prescribed book.
The risk evaluation stage will evaluate the results obtained in the risk analysis stage.
Stage 4 will focus on both the risk exposure and opportunity that may arise from a
business activity. All the information gathered in the risk analysis process is integrated
into the risk evaluation process. The risk evaluation stage will evaluate the financial
impact (loss or gain) of a risk in a business in numerical terms. Refer to par. 11.1 to 11.3
in the prescribed book.
READ
The process input in the risk evaluation process will consist of the risk register. The risk
register will now illustrate all the risks and risk categories in the business as well as
important information such as who the relative risk owner/manager is. The risk register
will have more background information, which can be used in the risk evaluation stage.
The process outputs will consist of the following:
• Sensitive analysis.
• Quantitative schedule and cost risk analysis results.
• Decision tree.
• Scenario modelling.
• Investment model results.
• Revised risk register.
Refer to par. 11.6 in the prescribed book regarding all the factors that can have an
impact or constraint on the risk evaluation process.
This section will briefly explain the process mechanism used in the risk evaluation
process.
• Probability trees
A probability tree is a method used by a business to ensure that all possible outcomes of a
risk event have been taken into account. A probability distribution is a list of possible
outcomes with associated probabilities. Thus, a probability tree will illustrate all possible
probability distributions for a certain risk event. A probability tree can be used to illustrate
both a dependent event and an independent event. The probability of any
6
event (E) is a number between 0 and 1. Thus, 0 ≤ P(E) ≤ 1 and is the sum of the
probabilities of any set of mutually exclusive (only one event can occur at a time) and
non-mutually exclusive (the events cover all possible outcomes) events which equals 1.
Read par. 11.7.1 to get an understanding on how a probability tree can be used to
calculate the probabilities that may arise from an independent and a dependent event.
In some cases, the decision outcome of an event can have more than one outcome. In
such an event, the EMV will be calculated by using the weighted outcomes, which is
calculated using the probabilities assigned to each outcome, for example,
successes/profit and failures/losses. The theory requires that the probabilities and
outcomes be determined.
The EMV will be used to select the decision alternative with the highest monetary
value. Read par. 11.7.2 and understand the examples given to illustrate how the EMV is
calculated.
The utility theory is used when an alternative decision does not necessary reflect relative
attractiveness to a decision maker. In the EMV method, the decision alternative was chosen
which yielded the largest monetary value, but such decision might not be the most
preferred decision for the business. The utility theory was adapted in an attempt to explain
why people make decisions differently than suggested by the EMV criterion. It can be
considered that business decision makers can each have a different attitude
towards certain outcomes. The utility theory will thus measure personal attitudes
towards risk by decision makers. The utility function illustrates how the same monetary
payoff/outcome might have different levels of utility for decisions makers. Decision
makers can be classified under the following attitudes towards risks (Refer to Table 2):
READ
Read par. 11.7.3 in the prescribed book and refer to Figure 11.5 on
p.205 for an illustration on the utility function.
• Decision trees
• Markov chain
The Markov chain method is used to combine the ideas of probability with those of
matrix algebra. It assumes that the probabilities remain fixed over time but the system
being used is able to change from one position to another. These fixed variables will be
used as transition possibilities.
• Investment appraisal
The investment appraisal method is used when a business needs to decide which
project to embark on. Such projects are usually high capital investment projects and it
is thus required by the business to decide which project will be feasible, affordable and
successful. The business must consider the risks as well as the benefits of each project.
Four techniques can be used by the business to decide which project to embark on.
Please refer to these techniques in Table 3 below.
Technique Description
3. Net present The difference between the initial investment amount and
value (NPV) the present value of a project’s expected future cash
flows, discounted at the appropriate cost of capital. The
NPV is a direct measure of the value a project creates for a
4. Internal rate of return The discount rate that makes NPV equal to 0 or the discount
(IRR) rate that makes the present value of an investment costs
equal to the present value of the investments benefits. The
• Sensitivity analysis
The sensitivity analysis method can be used by a business to assess how sensitive the
project outcomes are to changes in the business. The method uses one variable and
examines the effect of that specific variable on the project.
• Scenario analysis
• Simulation
Simulation is a method used to analyses financial or time models, where the variables may
be uncertain, for example costs, duration, opportunities or risks. Simulation can only be
used when a business has statistical software or commercially available spreadsheets.
The Monte Carlo simulation is a method used by a business to evaluate the effect of
uncertainty on a planned activity in a range of situations and uses random numbers to
sample from a probability distribution. A business can use this method to evaluate
duration, demand or throughput and costs. Refer to par. 11.8.5 of the prescribed book
to understand how Monte Carlo simulation, percentiles and correlations work, as well
as the benefits of the Monte Carlo simulation method.
Some risk analysis models involve subjective estimates and thus further information
needs to be gathered by the business to get a better understanding of the analysis.
The risk treatment stage will assist the business to design a specific action plan and
produce strategic responses to address the risks and opportunities identified in the
business to secure business objectives. This stage is vital in the risk management
process because the risk strategy responses and action plan must be prepared and
implemented effectively into the business. Refer to par. 12.1 to 12.3 in the prescribed
book.
The process inputs in the risk treatment process will be the risk register, industry betas
and a description of the business risk appetite, and details of existing insurance policies.
The process outputs will be the risk response (i.e. remove, reduce or transfer) actions.
Refer to par. 12.6 in the prescribed book regarding all the factors that can have an
impact or constraint on the risk treatment process.
• Resolution strategy
A risk response flow chart is used to illustrate the decision options used to arrive at a
risk response category. The chart will assist decision makers in a business to determine
whether it is more appropriate to transfer a risk than to remove it. Refer to par. 12.7 in
Chapter 12 of the prescribed book.
The process activities in the risk treatment stage assist in transforming the prioritized
list of risks in the business into a concrete plan of action for risk resolution. It is
important to understand the activities that need to be implemented to design an
effective risk action plan.
prescribed book.
Risk appetite can also be referred to as risk attitude, tolerance, preference or capacity.
The definition for risk appetite is the amount of risk a business is prepared to tolerate
(be exposed to) at any point in time. A business risk appetite can vary according to its
objectives, culture, environment, perceived financial exposure to certain risks and risk
attitudes (risk neutral, seeking and averse). It is very important for a business to
determine its risk appetite/tolerance and inform its senior managers about the
business risk culture in which it operates. Senior managers must assist the board in
implementing decisions on projects within business risk tolerance levels.
The following risk response strategies can be used by a business in the risk
treatment stage:
• Risk reduction
Risk reduction can also be referred to as treatment or mitigation. Risk reduction can be
seen as risk diversification (reduction of risks by distribution) for example, where a
business invests in multiple stocks to reduce risk and the impact of the risk. Two
approaches to reduce risk can be followed namely:
likelihood of a risk
reducing the
occurring, and;
limiting the loss should the risk
materialize.
• Risk removal
Risk reassignment is the strategy used to transfer risk to another entity, business or
organisation. Businesses can use contracts and financial agreements to transfer risk to a
third party. Risk transfer does not reduce the severity of the risk but does increase the
impact of the risk. The most common method of risk transfer is insurance. For example
the financial consequences of the loss is transferred to the insurance company. When a
business transfers risk the business must consider the objectives of the parties, ability
to manage the risk, risk context and cost effectiveness of the transfer.
• Risk retention
The risk monitoring and review stage is a key stage in the ERM process. It may become
necessary for a business to review all the previous stages in the risk management
process because new information became available or circumstances changed in the
business. The monitoring and review stage must be carried out in order to increase the
success of the implementation of the entire ERM process. Refer to par.
13.1 to 13.3 of the prescribed book.
The process input in the risk monitoring and review stages will be the risk register,
where the business can go back to and review all the risks in the register. The process
outputs will be regular updates of the risk register and reports on the effectiveness of
the risk response actions.
Refer to par. 13.6 of the prescribed book regarding all the factors that can have an
impact or constraint on the risk monitoring and review process.
Two primary mechanisms that can be used in this stage, namely meeting agendas and
pro formas. (Refer par. 13.7 in the prescribed book).
In the risk monitoring and review process the activities that need to take place are the
tasks that are necessary to ensure that this stage is managed proactively which
executes responses, monitors effectiveness and then intervenes to implement
corrective action. The following activities need to be conducted:
• Executing
All the actions planned in the risk treatment stage to respond to risks and opportunities
must be effectively executed by the business.
• Monitoring
• Controlling
The controlling process is based on the information gathered in the monitoring process
to form decision-making. It means the business must understand who needs what
information for what purpose and when. To give a manager control, the control
activities must adhere to the following seven specifications:
The risk communication and consultation stage will be used across all the other ERM
process stages. It is essential for a business to understand how effectively the process
outputs of each stage is communicated and understood by decision makers. Refer to
par. 14.1 to 14.3 of the prescribed book.
The process inputs in the risk communication and consultation process will consist of
the risk register, risk responses, response progress, early warning indicators and Key
Performance Indicators (KPI’s). The process outputs will be the risk reports, press
releases, internal e-mails, company internet site, internal newsletters and posters.
Refer to par. 14.6 of the prescribed book regarding all the factors that can have an
impact or constraint on the risk communication and consultation process.
Three primary mechanisms that can be used in this stage. They are as follows:
STUDY
A business must clearly distinguish between key risk indicators (KRI) and key
performance indicators (KPI).
• KRI’s
KRI’s refer to captured information that provides useful views of underlying risk profiles
at various levels to assist decision makers within a business. The following can be seen
as the four types of KRI’s:
• KPI’s
KPI’s refer to high level snapshots of the health and performance of a business based on
specific predefined measures for example statistical information on the business. The
following can be seen as seven types of KPI’s:
Statutory KPI’s, such as GAAP 9 or legal regulatory requirements.
Profitability per business unit/product/customer.
Exception reporting.
Employee performance, such as assets under management or profit per customer.
Competitiveness, such as market share.
Cost management, such as return on assets (ROA) on IT or new delivering channel
monitoring.
Credit management, such as time to settlement or credit exposure.
REVIEW QUESTION
AIM
At the end of this unit, you will be able to point out the elements, attributes and
features of operational risk and describe an appropriate response strategy in view of
ERM.
LEARNING OUTCOMES
LEARNING MATERIAL
This chapter examines the one of the internal processes, called operational risk.
Operational risk is the exposure of an enterprise to losses resulting from people,
processes, systems and external events. Operational risk is present in all organisations
and can affect a firm’s solvency, the fair treatment of its clients and the incidence of
financial crime.
Peccia (2001) defines operational risk as “the potential for loss due to failures of people,
processes, technology and external dependencies”. The sources of risk considered to be
embraced within operational risk include business risk, crime risk, disaster risk,
information technology risk, legal risk, regulatory risk, reputational risk, systems risk
and outsourcing. Refer to par 16.1 of the prescribed book for more details.
5.5 STRATEGY
Strategy is a description of what the business will do and the rationale behind it. For
example, Virgin Mail
Order’s early strategy for music record sales was to compete in the market place by
means of mail order (as its company name suggests), undercutting record sale prices
offered by the existing well-established high street retailers. Adopting the wrong
business strategy, failing to execute a well thought-out strategy or not modifying a
successful strategy over time to reflect changes in the business environment are forms
of operational risk. Strategic risk, then, may be defined as the risk associated with initial
strategy selection, execution or modification over time, resulting in a lack of
achievement of overall objectives.
5.6 PEOPLE
There is always a human factor to consider in undertaking any business activity. The
knowledge, experience, capability and reliability of the persons involved in all of the
business processes are critical risk factors. People risk continue to be the major
contributing factor in many dramatic failures and, despite the difficulties of measuring this
kind of risk, it needs to be targeted in any programme aimed at improving risk
management. People risk may therefore be defined as a combination of the detrimental
impact of employee behaviour and employer behaviour. The following serve as
examples of people risk:
Absenteeism rates
Labour turnover
Accident rates
Productivity
Quality of finished goods customer satisfaction
READ
According to Chapman (2011), processes and systems risk is the failure of processes or
systems due to their poor design, complexity or non-performance resulting in
operational losses. Consequently, a business may experience problems such as inability
to meet orders, poor quality control and fraud and information security failure.
READ
External events are events that occur outside the business which may require a
response in the form of change management or the establishment of contingency
events to cope with, e.g. natural catastrophes.
5.9 OUTSOURCING
It is necessary to measure the impact of those issues likely to have the greatest
detrimental effect on the operation of the business. Measurement enables businesses
to set aside monies to cope with adverse events and to know the extent of insurance
required.
RIVIEW QUESTION
1. Which factors affect the probable consequences likely if a risk does occur?
A. Risk cost
B. Risk timing
C. Risk scope
D. Risk resources
3. The reason for refining risks is to break them into smaller units having different
consequences.
A. Guaranteed
B. Generally
C. Correct
D. Wrong
4. Risk monitoring involves watching the risk indicators defined for the project and
not determining the effectiveness of the risk mitigation steps themselves.
A. Absolutely
B. Accurate
C. True
D. Falsified
5. The word tactic is most likely to be associated with:
A. Business Risk
B. Corporate Risk
C. Operational Risk
D. Functional Risk
6. ABSA suffers loss due to adverse market movement of a security. The security was
however held beyond the defeasance period. What is the type of the risk that the
bank has suffered?
A. Market Risk
B. Operational Risk*
C. Market Liquidation Risk
D. Credit Risk
7. Sanjeev was just named Risk Manager of ABC Company. He has decided to create a
risk management program which considers all of the risks faced by ABC—pure,
speculative, operational, and strategic—in a single risk management program. Such a
program is called a
A.financial risk management program.
B. enterprise risk management program.
C. fundamental risk management program.
D. consequential risk management program.
UNIT SIX | TECHNOLOGICAL RISK MANAGEMENT
AIM
At the end of this unit, you will be able to describe technology risk management,
identify the primary types of technology of interest to organizations, sources of risk
and possible responses.
KEY CONCEPTS
• Technology risk
• Communications technology
• Information technology (IT) governance
• Broadband
• Electronic (E)-commerce
• Control technology.
LEARNING OUTCOMES
6.1 INTRODUCTION
Chapter 18 of the prescribed book examines the internal processes, called technological
risk. The majority of today’s technologies are information, communication and controls.
These technologies can raise productivity, lower costs and drive growth of
organisations. Changes in technology can therefore be both an opportunity and a
threat in terms of market share and market development. Although there is a wide
range of technologies, the common ones considered important to business and
discussed in this chapter are information, communication and control. The chapter
deals with the definition of technology risk management, the primary types of
technologies essential to business, sources of risk and possible responses.
A sample of the sources of risk that are considered to be embraced within the term
“technology risk” are recorded below. The potential list is considerable. Any examination of
the sources of risk needs to be tailored to the specific activities of a business.
Lack of investment in technology and the resultant erosion of ability to compete.
Inadequate technology governance and in particular IT governance.
Inadequate management of outsourcing.
Lack of alignment of IT to the business objectives.
Inadequate protection against viruses, hacking and loss of confidentiality of
information. _ Inadequate flexibility of production to be able to economically
produce small production runs.
The development of a sound management system for technology risk, the effective
implementation thereof depends on whether attention is paid to a number of issues.
As pointed out in the introduction, risk management can be quite helpful to identify
opportunities for the improvement of processes. Labour intensive and complicated
processes have the potential for more errors compared to streamlined and simplified
processes.
6.5.1 Information Technology
• Software applications
• Management information systems
• Intranets
• Telematics
• Information assets
• Conference calls.
• E-commerce using the internet
• Broadband
• E-mail
• Network systems
6.6.4 Intranets
Intranets are touching everyone’s lives from theUSMarine Corps (who have adopted a
situation awareness application) to physicians in southern Virginia and North Carolina
(who can access patients’ records remotely over the web) to school children in Reading
(England) who can access the school intranet remotely. Intranets can offer considerable
time-savings to a business if they contain information which is readily accessible by a
significant percentage of the employee population. The downside risk is that should an
intranet be unavailable for any length of time, that same employee group would be
unable to perform some or many of their routine tasks.
6.7 RESPONDING TO TECHNOLOGY RISK
A number of initiatives have been put forward to mitigate technology risk. These
include IT governance, investment and projects.
RIVIEW QUESTIONS
1. Define technology risk and discuss the possible sources for this kind of risk.
2. With examples, discuss the various types of IT tools used by SAA in its endeavor
to manage technological risk.
3. Discuss the risks associated with the use of e-mails in an organisation.
4. With the use of examples, discuss how an organisation like SAA responds to technology
risk.
1. Risk Management objectives may be classified into four main categories namely
A. strategic objectives
B. operational objectives
C. compliance objectives
D. reporting objectives
3. Which of the following tasks are important in establishing a basis from which to
launch an ERM strategy:
A. Evaluating the adequacy of specific measures, policies and
procedures
B. targeting risk and processes
C. evaluating risk management performance
D. the development of common language and framework
9. VaR is not enough to assess market risk of a portfolio. Stress testing is desirable
because
A. It helps in calibrating VaR module
B. It helps as an additional risk measure
C. It helps in assessing risk due to abnormal movement of market
parameters*
D. It is used as VaR measure is not accurate enough
10. Large Government borrowing can cause yield curve to shift upward.
A. False
B. True *
C. Difficult to say
D. Remains same
UNIT SEVEN | PROJECT RISK MANAGEMENT
AIM
At the end of this unit, you will be able to discuss project risk management and the
challenges encountered in embedding risk management within a project.
LEARNING OUTCOMES
LEARNING MATERIAL
Unit 7 examines the internal processes, namely Project Risk Management (PRM) since
technology improvements are introduced as projects. A project is defined as a unique
activity with defined objectives, undertaken in pursuit of achievement of beneficial
change, typically constrained by limited resources. Any project has definite start and
finish dates. Unless a project is appropriately managed, it has the potential to damage
the organization’s reputation, erode stakeholder relationships, diminish the share price
and critically undermine financial performance. Chapter 18 explores some of the
challenges encountered in integrating risk management with a project.
The term “project risk” embraces the sources of project risk. The sources of project risk
are considerable and emanate from the external business environment, the industry
within which an organisation sits, the sponsor’s organisation and the project itself.
PRM has the “potential” to afford a business a series of benefits. Such benefits are
discussed in the prescribed book.
Benefits of Risk Management for a Project
Project contingency can make or break a project. Having too much contingency is
uncompetitive; having too little contingency increases the chance of failure. Risk
assessment—or allowing for uncertainty within estimates—helps set contingency
levels, with a preferred level of risk, and gives the confidence level of outcome targets.
Contingency is often set at the task level, and it is common to add some contingency to
every estimate. The amount of contingency added may even be a fixed amount—10
percent, for example. However, it is much better to set contingency at the project
level. In other words, use the ranges on the task estimates to understand what
contingency should be set for the project as a whole. Setting contingency at the project
level reflects the reality that some tasks may be delayed whereas others may be
completed on time or be finished early. The amount of management reserve can be set
by the same principle—allowing drawdown against risks that were identified at the
start of the project.
In addition to setting the right level of contingency, risk assessment also benefits the
project team by giving it a forum for expressing concerns and for challenging or
defending assumptions. Removing the restriction of having to work with deterministic
(single-point) estimates allows team members to give open and honest opinions of what
is likely to happen. A risk assessment workshop is an important—but often ignored—
occasion for the project team to come together. It can lead to discussion and
clarification of the scope of project tasks, and missing work is often identified. As a
result of the workshop, the project team reaches an improved awareness and
understanding of the status of the whole project. Although the cost and schedule
disciplines for a project are often separate, it is important for these groups to confer
with each other. A risk assessment workshop can bring these disciplines together.
Risk management can be quite helpful to identify opportunities for the improvement of
processes. Labour intensive and complicated processes have the potential for more
errors compared to streamlined and simplified processes. Common challenges in
implementing PRM include the following:
Lack of clearly defined and disseminated risk management objectives
Lack of senior executive and project director commitment and
support Lack of risk maturity model
Lack of a change process to introduce the discipline
No common risk language (terms and definitions)
Lack of articulation of the project sponsor’s risk appetite
No definition of roles and responsibilities
Lack of risk management awareness training to build core competencies
Lack of integration of risk management with other project disciplines
Reticence of project personnel to spend time on risk management Risk
owners not automatically taking responsibility for assigned risks
No clear demonstration of how risk management adds value and contributes to
project performance
Overcomplicated implementation from an unclear risk policy, strategy,
framework, plan and procedure
Lack of alignment between the business strategy, business model and the risk
management objectives
Lack of the integration of risk management activities into the day-today
activities of project managers
STUDY
The PRM process should provide a methodical, efficient and effective way of managing
risks to delivery of a project. The process includes establishing the context, risk
identification, analysis, evaluation, treatment, monitoring and review; and
communication and consultation.
Risk identification is the process of determining which risks may affect the project as
well as establishing their characteristics.
Risk analysis involves the identification of the probability and impact of the identified
risks and opportunities. Analysis can be qualitative or quantitative depending on the
requirements of the risk process and the information available. Qualitative assessments
use labels such as high, medium or low, whereas quantitative measurements provide
percentage likelihoods (e.g. 50%) and an impact in terms of time and cost.
Risk evaluation typically looks at the combined net effect of the identified risks and
opportunities.
Communication and consultation take place at commencement and throughout the risk
management process. The activities of the communication and consultation process are
the tasks undertaken in striving to ensure that the risk management process is
effective. Refer to par.
18.6.7 in the prescribed book for the details of the activities involved.
STUDY
The director has overall responsibility for the delivery of the project in terms of
satisfying the stated objectives. Refer to Par. 18.8 in the prescribed book for details
of the project director’s role.
STUDY
Study the section on “Techniques used to
Support Project Risk Management”, par. 18.12 in
Chapter 18 of the prescribed book.
REVIEW QUESTION
(i) Who could be the possible attendees to this meeting? (At least four).
Identify the sources of risk associated with this project and discuss the benefits
and five common challenges encountered in the implementation of PRM.
Briefly discuss the application of the project management process to this
particular low- income housing construction project.
8. The 40-20-40 rule suggests that the least amount of development effort be
spend on
A. estimation and planning
B. analysis and design
C. coding
D. testing
At the end of this unit, you will be able to identify and discuss the key aspects of
business ethics to aid in the broader risk management context.
LEARNING OUTCOMES
8.1 INTRODUCTION
Ethics is inextricably linked with reputation, and a breach of ethics commonly leads to
one or more of the following: reduced share price, reduced profitability, unfavorable
media coverage, fines, additional administration and, in some extreme cases,
imprisonment. As with other aspects of risk management, the management of risks
associated with ethical conduct will determine its performance, position and prolonged
existence. This study unit therefore explores the key aspects of business ethics to aid an
allinclusive risk management.
Chapman (2011) defines ethics as the branch of business that addresses questions about
morality. Morality is a sense of behavioural conduct that differentiates intentions, decisions
and actions between those that are good and evil, and right and wrong. Business ethics
therefore refers to moral rules and regulations governing the business world. Ethical risk
refers to exposure to events, which may result in criminal prosecution, civil law suits or
erosion of reputation. Examples of ethical risk include bribery, false accounting, child
labour, tax evasion, money laundering and invasion of privacy.
STUDY
The benefits of ethics risk management are discussed in the prescribed book.
READ
Examples of ethical codes that govern businesses include honesty, objectivity, integrity,
carefulness, openness, respect for intellectual property and confidentiality. Refer to
par. 19.6 “Factors that Affect Business Ethics” in Chapter 19 of the prescribed book.
Examples of unethical practices by companies that were prosecuted or suffered
reputational damage because of the behaviour of employees and who attracted
negative media attention include the following:
One approach in addressing risk exposure from a breach of ethics is to devise and
implement an ethics system across the organisation as a means of preventive action. A
business ethics programme aims to achieve specific expected outcomes, such as
increasing awareness of ethics issues, improving decision making and reducing
misconduct. The areas of focus for an ethics manual, is based on four primary
orientations as follows:
A compliance-based approach
A protecting senior management approach
A satisfying external stakeholders
approach A values-based approach
The four primary orientations are not mutually exclusive. However, the degree of
application of these areas of focus is based on four orientation levels, namely
compliance, risk management, reputation enhancement and benefit. For an
organisation to be truly responsible, it must fully embrace all four levels of identity.
• Vision
• Context
• Establish
• Implement
REVIEW QUESTION
1. Identify and discuss the sources of ethical risk in an academic institution like
Unisa.
2. Define business ethics management and discuss the benefits of implementing
ethics risk management in an organisation.
3. List and discuss the reasons for the emergence of unethical behaviour in an
organisation.
1. Risk information sheets (RIS) are never an acceptable
substitute for a full risk mitigation, monitoring, and
management (RMMM) plan.
A. True but not exactly
B. True to the core
C. False to the core
D. False but comparable
3. Which one of the following is not a good choice that a company must make
to complement and supplement its choice of one of the risk competitive
strategies?
A. Whether to enter into strategic alliances or collaborative partnerships B.
Whether and when to employ offensive and defensive moves
C. Whether to employ a market share leadership strategy
D. Attacking a market leader is always unwise
4. Strategic alliances
A. Are the cheapest means of developing new technologies and getting new
products to market quickly
B. it’s collaborative arrangements where two or more companies join
forces to achieve mutually beneficial strategic outcomes
C. it’s a proven means of reducing the costs of performing value chain
activities
D. Attacking a market leader is always unwise
AIM
At the end of this unit, you will be able to discuss the six external influences (macro
factors) that may have a national and international impact on a business.
LEARNING OUTCOMES
LEARNING MATERIAL
Unit 9 deals with Chapters 21 to 26 of the prescribed book and will discuss the
six external influences (macro factors) in ERM.
9.1 ECONOMIC RISK
The first of the six macro-factors that affect the business-operating environment is
economic risk. Chapman (2011) defines economic risk as the influence of national
macroeconomics on the performance of individual business. Government policy affects
national macroeconomics through the manipulation of aggregate demand and
consumer spending. However, businesses have no control over national influence on
aggregate demand. Refer to par. 21.1 in the prescribed book for the complete definition
of economic risk.
The sources of risk embraced under economic risk include the following:
• Fall in demand
• Government policies
• Movement in house prices
• Exchange rates
• Inflation
• Micro-economics
Micro-economics is driven by households, whose members have need for goods and
services. Consumers have resources (incomes, assets, time and energy) with which to
satisfy their wants, However, the limitation of these resources force consumers to
make choices. Given a set of prices, each household will make choices that in aggregate
affect those prices.
• Macro-economics
Macro-economic studies the total amount of deployment of each of the major factors
of production, the total volume of output produced and income earned in the whole
economy; the average level of prices in all product markets; and the growth of the
economy’s total output. The three most important concepts are output, income and
expenditure. They are the main indicators of a nation’s economic performance. The
most important empirical measure of these variables is called the gross domestic
product (GDP). GDP is the value of total output actually produced in the whole
economy over some period.
• Government policy
• Aggregate demand
Determinants of consumer spending
Determinants of investment expenditure
Determinants of government spending
Determinants of net expenditure on exports and imports
Aggregate supply
Aggregate supply (AS) is the total output of the economy at a
point in time. The AS curve is affected by
given price level at a given
several factors namely:
An increase in the capital stock due to a reduction in interest
rates;
An improvement in the expectations of business executives;
Continuing technological change;
Increased investment in education;
A reduction in unemployment benefits, and
Schemes to improve the geographical mobility of workers.
Inflation
Changes in interest rates affect business and consumer behaviour in a number of ways,
namely changes in the exchange rate, discretionary expenditure, savings and borrowing.
• House prices
House sales are often treated as an economic barometer. Such expenditures are both
large and variable and they exert a major impact on the economy. Interest rates are a
large part of total mortgage payments. Small changes in interest rates cause a relatively
large change in annual mortgage payments. Changes in interest rates can have a large
effect on the demand for new housing.
In order to understand the risks and opportunities associated with the production of
goods for export, businesses need to understand the mechanisms of international trade
and protectionism imposed by governments.
• Methods of protection
Currency risk is the risk that the expected cash flow from overseas investments are
adversely affected by fluctuations in exchange rates. There are two types of foreign
exchange risk namely accounting or translation exposure and economic exposure.
There are various ways in which hedging can be done, namely netting, leading and
lagging, forward market hedge, fuel market hedge, currency futures, currency hedging
and money market risk
9.2.ENVIRONMENTALRISK
pollution of land, water, air;
increased regulation and higher operational costs;
prosecution arising from the lack of observance of rules set by a regulatory body;
publicity as a result of pollution events, resulting in a
reputational risk from adverse
reduced customer base;
destruction of facilities or loss of manufacturing as a result of severe weather conditions,
and
loss of oil production, resulting in higher energy costs.
“
Where a business is engaged in overseas transactions involving large sums, an adverse
movement in exchange rates can be catastrophic and so it will usually adopt some form
of “hedging” to minimise the risk.” (Chapman)
READ
Implementation: The development of a sound system of risk management depends on
several issues, namely
the risk management system not overly constraining risk taking, slowing down decision-
making processes or limiting the volume of business undertaken;
the implementers of the risk management framework being distinct from the managers of
the individual business units;
that risks are managed at an appropriate level in the organisation, and
the disclosure of risks when they exist, rather
the development of a culture, which rewards
than encouraging managers to hide them.
9.2.4 Pollution
Global warming is the rise in the average temperature of the earth's atmosphere and
oceans, which may have severe consequences for life on earth. Scientists believe that
global warming is primarily caused by increasing concentrations of greenhouse gases
produced by human activities such as the burning of fossil fuels and deforestation. The
greenhouse effect is the “natural” process by which the atmosphere traps some of the
sun’s energy.
According to Young (2006), legal risk is the risk arising from violations of or non-
compliance with laws, rules, regulations, prescribed policies and ethical standards.
This risk also arises when laws or rules governing certain products or activities of an
organisation’s customers are unclear or untested. Noncompliance can expose the
organisation to fines, financial penalties, payment of damages and the voiding of
contracts. It could also lead to a diminished reputation, reduced franchise value,
limited business opportunities, restricted developments and an inability to enforce
contracts.
The sources of risk that fall within legal risk are considerable, and may include, but not
limited to the following:
Breach of environmental legislation
listing information in terms of misstatements, material omissions or misleading
Inaccurate
opinions
Breach of copyright
Loss of business because of senior management time being lost through a protracted legal
dispute
Prosecution for breach of the law
Legaldispute with overseas trading partners (differences between local law and English
law)
Loss of reputation because of a prosecution or a dispute with a customer, partner or
supplier
Lost legal disputes through poor record keeping
STUDY
The sources of legal risk emanate from business activities based on the basic
features of the legal system. The primary categories of law are public and
private law.
Public law deals with the relationship between the state and its citizens. The three
key areas included are constitutional law, administrative law and criminal law.
Privatelaw is primarily concerned with the rights and duties of individuals towards each
other.
Another major distinction is drawn between civil and criminal law.
9.3.4 Companies
Legal risk also arises in the formation of companies. There are rules and
regulations that companies have to abide by, for instance, regarding the
company name, memorandum of association, articles of association,
financing the company, the issue of shares and debentures, the official listing
of securities, the remedy of rescission, protection of minority interests and
duties of directors.
Patents: The issues covered under patents include application, items that can be patented,
exclusions, registration, and infringement.
Copyright: Theissues covered under copyright include ownership, duration and
infringement.
right looks at the colouring, shape, texture and/or material associated
Designs: A design
with a product.
9.3.6 Employment law
Businesses must comply with employment law in their hiring of staff based on the
principles of the law of contract. Failure to do so, can lead to prosecution. Contracts of
employment must be legal. Other aspects addressed in the employment contract
include terms of remuneration, holiday pay, sick leave and pay, time for antenatal care,
maternity leave and dismissal procedures. Businesses are at risk if employment law is
not understood and adhered to. Refer to par. 23.8 in the prescribed book.
9.3.7 Contracts
Types of contracts
There are two broad categories of contracts namely speciality contracts
and simple contracts.
Criminal law affects the supplier of goods and services with regard to:
There are rules and regulations, which protect businesses from computer misuse.
Computer misuse is now a global dilemma with problems such as “hacking” and virus
infection. Common computer misuses include:
Unauthorized access to computer material
by means of the internet to commit or facilitate
Unauthorized access
further offences
Unauthorized modification of computer material
9.4 POLITICAL RISK
Political risk can be defined as “the uncertainty that stems, in whole or in part, from the
exercise of power by government actors and the actions of non-government groups”.
This type of risk can be seen in domestic as well as international markets but is also
associated with oversees exposure and developing countries. The political environment
of overseas countries will always have an impact on the threats and opportunities of a
business wanting to expand business overseas. Refer to par. 24.1 for the complete
definition of political risk.
Macro political risks can affect all businesses in a country and may include potential
threats of adverse economical magnitude terrorism, labour disputes, economic
recession, high inflation, civil war, escalating crime or high taxation.
Micro political risks only affect specific businesses or industries and may include new
regulations, taxations, tariffs and quotas on a specific business/industry or politically
motivated violence against a specific industry.
STUDY
STUDY
Study t h e sections on “Benefits of Political Risk Management ”
and “Implementation of Political Risk Management” in the
prescribed book.
READ
The following response strategies can be used to minimize political risk in the business:
Undertaking proper planning and exercising due diligence.
Investing in projects or entering into contracts where the host
government implementedcertain policies that encourage
private sector involvement.
Consider projects that are being supported by host governments.
Obtaining insurance against political risks
To be protected from interest rate fluctuations a business can enter
into a hedge contract.
Establish a good relationship with the workforce to create a risk
friendly environment.
arbitration language into contracts to address
Incorporating strong
labor disputes.
Enhancing on-site security to be protected against terrorist attacks.
Being attuned to what is happening in the host country.
The following tools can also be used by a business to mitigate political risks:
Assessing political risk factors
Putting political risk factors in order of priority
Improving relative bargaining power
9.5 MARKET RISK
Market risk can be defined as “the exposure to a potential loss arising from diminishing
sales or margins due to changes in market conditions, outside of the control of the
business”. (Chapman, 2012) A business needs to gain insight into the market structure
(size, barriers of entry, product diversification and number of competitors) in which the
business operates. Market risk policies should take into account business activities,
objectives, the regulatory environment, competitiveness and staff and technology
capabilities. Proactive market risk management is vital for a business to adapt to
changing markets. Refer to par. 24.2 in the prescribed book.
The sources of market risk and opportunity can be seen in Figure 9 below.
The marketing environment of a business can form part of the macro industry and task
environment. The business must also concentrate on the levels of uncertainty in the
marketing environment to be able to monitor, analyse and understand the different
influences affecting the industry.
STUDY
Study the section on the “Scope of Market Risk” in the prescribed book.
Number of firms - The number of firms in the market and their relative sizes
Barriers to entry - the ease or difficulty with which new entrants might enter the market.
Product homogeneity, diversity and branding: The extent to which goods are similar
Knowledge - The extent to which all businesses in the market share the same knowledge
one business will
Interrelationships within markets: The extent to which the actions of
affect another business (Bargaining power of suppliers and buyers)
It is important for a business to understand a product’s life cycle stages. A product life
cycle stage grows in an S-shaped manner and will then decline to be replaced by a new
product. A product life cycle can grow according to five different stages. Refer to Figure
10 below.
The alternative strategic directions for a business can be seen as the following: to grow
the business, do nothing or withdraw. Thus, a business plan can be developed to
expand a business in four possible directions.
Read the sections in par. 25.7 and Figure 2 5.4 in the prescribed book.
Students must be able to discuss the alternative strategic directions.
9.5.7 Competition
Value at risk can be defined as the calculation of the worst possible loss that might be
expected at a given confidence level over a given time period under normal market
conditions. In calculating value at risk, the following methods can be used as discussed
by Chapman:
A business must clearly set out how market risk will be evaluated throughout the
business. Clear responsibilities, roles and authority levels must be distinguished within
each management strategy for market risk. Broad strategies must be implemented in
the advertising, research and development, product development and diversification
sections within the business. Risk mitigation techniques for market risk will involve risk
identification, measurement and reporting. It is also very important for a business to
take out an insurance policy. Refer to par. 25.13 in the prescribed book. Students must
be able to explain the risk response strategies for market risk.
Social risk can be defined as “the society’s impact on business, and not vice versa
(Chapman,
2012). Social risks are seen as social aspects that have an impact on a business’
performance over which the business have no ability to control and minimal
opportunity to influence. It is important for a business to understand the
characteristics, lifestyle choices and social attitudes of its workforce. Workforces are
assumed to take on the behaviours, habits and social cultures within which they work,
function and live. Refer to par. 26.1 in the prescribed book.
There are seven identified sources of risks when dealing with social risk.
STUDY
Study the section on the “Scope of Social Risk” p a r . 26.2 in Chapter 26 of the
prescribed book.
STUDY
o Education,
o Population movements: demographic
changes, o Social-cultural patterns and trends,
o Crime,
o Lifestyles and social attitudes;
Home improvements
Motherhood, marriage and family formation
Health
Less healthy diets
Smoking and drinking
Long working hours
Stress levels
Recreation and tourism
REVIEW QUESTION
1. With the aid of examples, discuss the factors that determine the successful implementation of
a sound system of economic risk management.
2. “Climate change is widely recognized as one of the key environmental challenges facing the
world today”. Discuss this statement with reference to environmental risk management.
3. Gap analysis is
A. an analysis that reduces gap between different risk approaches
B. an analysis used in banking to determine loan worthiness
C. an analysis that compare two systems the present and proposed to find if
its necessary to continue with the proposed one
D. all of the above
BIBLIOGRAPHY
1. AIRMIC, Alarm, IRM: 2010. A structured approach to ERM (ERM) and the
requirements of ISO 31000. Available at:
http://theirm.org/documents/SARM_FINAL.pdf. (Accessed:
2. 2013/03/02).
3. Chapman, R.J. 2011. Simple Tools and Techniques for Enterprise
Risk Management.
nd
4. 2 edition. John Wiley & Sons.
9. http://www.businessdictionary.com/definition/environmentalsustainability.htm
l#ixzz 2Ps8HpOK8
10. ISO (2009). ISO 31000: 2009 Risk Management – Principles and Guidelines,
International Organization for Standardization, Geneva.
11. Peccia, T. (2001). Designing an Operational Risk Framework from a
Bottom-up
16. The King Code of Governance in South Africa, 2009 (King III)
17. Valsamakis, A.C.; Vivian, R.W. and du Toit G.S. 2010. Risk
18. Management. Fourth