RSK2601 Study Guide
RSK2601 Study Guide
RSK2601/1/2021–2022
10021450
InDesign
MNB_Style
CONTENTS
1 Page
(iii) RSK2601/1/2021–2022
5.8 Currency (or foreign exchange) risk 52
5.9 Foreign investment risk 52
5.10 Derivatives 53
(iv)
TOPIC 4: EXTERNAL INFLUENCES – MACRO FACTORS 75
LEARNING UNIT 11: ERM – External factors 77
11.1 Economic risk 78
11.2 Environmental risk 81
11.3 Legal risk 82
11.4 Political risk 85
11.5 Market risk 87
11.6 Social risk 90
BIBLIOGRAPHY 92
(v) RSK2601/1
(vi)
Dear Students
I wish to extend a warm welcome to all of you registered for the module Enterprise Risk Man-
2
agement, RSK2601.
This module is offered online. Your online study material is uploaded under Lessons on the
3
Please note that this module is designed in such a way that in order to master the con-
4
tent and learning outcomes you will need to devote at least 120 hours per semester to
it. You are likely to find the assignments and examination paper very difficult if you
have not invested the required time in the subject.
topics:
y ERM in context
y Enterprise risk management
y Internal influences – micro factors
y External influences – macro factors
Each lesson contains sections to study and sections to read in the prescribed textbook. The
6
“study” sections are important for examination purposes, but I would like you to pay atten-
tion to the sections I indicate for you to read, as these will give you context and background
to the content being discussed.
Prescribed book
7The compulsory prescribed textbook for this module is:
Chapman, RJ. 2013. Simple tools and techniques for enterprise risk management. 2nd edition.
John Wiley and Sons (ISBN 9781118742426) (Paperback).
This book is available at any of the official Unisa bookstores. You will find additional contact
8
details under Prescribed Books on the RSK2601 site on myUnisa or in Tutorial Letter 101.
Assignments
Formative assessment in the form of multiple-choice and written assignments is available
9
under Lessons on myUnisa. The assignments are also available in Tutorial Letter 101, up-
loaded on myUnisa.
The suggested solutions for the assignments will be provided in Tutorial Letters 201 and 202
10
under Lessons on myUnisa two weeks after the respective assignment due dates. Please
note that no printed versions of these tutorial letters will be available.
(vii) RSK2601/1
Discussion forums
We will initiate discussions on relevant topics covered in the study guide. The purpose of
11
the discussion forums is to discuss particular subject-related information and make contribu-
tions where possible. Please make every effort to contribute to the discussions, as participating
in them will increase your knowledge and insight into the subject.
Announcements
Special instructions and relevant information will be shared via Announcements on myUnisa.
12
If you have not changed the default Unisa e-mail address to your work or home e-mail ad-
dress, please ensure that you log on at least once a week to read the announcements.
Examination
The examination paper will contain both multiple-choice and written questions. Additional
13
information about the examination and format of the paper will be made available in Tuto-
rial Letter 101.
15 Regards
16 Your Lecturer
(viii)
MODULE AIM AND OUTCOMES
private and non-profit sectors. Historically, risk management has focused on avoiding the
adverse consequences of risk. Today, however, risk management is about something entirely
different – the integrated and coordinated management of all types of risks and effects on
an enterprise-wide basis. This module will equip you to define and classify risks, define and
implement corporate governance and propose and implement enterprise risk management
(ERM) in your organisation. RSK2601 aims to explain risk management as an enterprise-wide
concept and propose a framework for implementing ERM in an enterprise. The module will
also provide a foundation for later courses and modules in risk management.
MODULE OUTCOMES
At the end of this module, you should be able to
18
y define and classify risks, risk management and enterprise risk management.
y define and implement good corporate governance.
y propose and implement an ERM framework/process in the workplace or business.
y identify and understand the macro and micro external influences on a business.
In addition to teaching you technical skills, this module also aims to achieve the following
19
(ix) RSK2601/1
(x)
TOPIC 1
ENTERPRISE RISK MANAGEMENT IN CONTEXT
Topic contents
Lesson 1: Introduction
Lesson 2: Corporate governance
Aim
At the end of this topic, you should be able to demonstrate your knowledge of, discuss
and interpret risk, risk management and ERM in an overall context and assess corporate
governance in a risk-related context.
Learning outcomes
OVERVIEW
Following disasters such as Enron in December 2001, WorldCom in July 2002, the global
21
financial crisis of 2007/2010 and, more recently, the Steinhoff scandal, investors’ trust in com-
panies decreased and company ethics were widely criticised. With the demand for invest-
ment funds in both developed and developing countries increasing and the free flow capital
barriers decreasing, investors and policy-makers have recognised that corporate governance
is necessary to attract both foreign and domestic capital.
The lack of effective risk management and proper corporate governance has often been
22
blamed for the collapse of many international and national corporations. Shortcomings in
traditional risk management approaches have thus driven the evolution of enterprise risk
management, or ERM. Current trends and developments that increased the awareness of
risk compelled enterprises to adopt a more holistic and integrated approach to managing
their risks. In this lesson, the concepts of ERM and corporate governance are defined. The
benefits of ERM and corporate governance are highlighted, and a suggested framework for
their implementation is discussed.
1 RSK2601/1
LESSON 1
INTRODUCTION
Contents
Aim
Key concepts
Learning outcomes
Learning material
Self-assessment
Summary
Aim
At the end of this lesson, you will be able to provide the background to risk, risk manage-
ment and ERM.
Key concepts
• Risk
• Risk management
• ERM
• Risk diversity
• Risk-taking
Learning outcomes
LEARNING MATERIAL
23Lesson 1 deals with chapter 1 of the prescribed book.
2
1.1 INTRODUCTION
Risk management is an increasingly important business driver, and stakeholders have become
24
much more concerned about risk. Risk may be a driver of strategic decisions, it may be a
cause of uncertainty in the business, or it may simply be embedded in the activities of the
business. An enterprise-wide approach to risk management enables a business to consider
the potential impact of all types of risks on all processes, activities, stakeholders, products
and services. Implementing a comprehensive approach will result in a business benefiting
from what is often referred to as the “upside of risk”.
The global financial crisis in 2008 demonstrated the importance of adequate risk manage-
25
ment. Since then, new risk management standards have been published; these include
ISO 31000, the COSO ERM Framework and the IRMSA risk reports, which draw together all
developments to provide a structured approach to implementing ERM.
Read
Activity 1.1
Access the LibGuide on myUnisa and download the latest IRMSA risk report. Identify the
top risks South Africa is facing today. Discuss these risks in the discussion forum.
risks to take and which to avoid. As businesses grow, they are continuously exposed to more
significant, complex, diverse and dynamic risks. Therefore, the range of threats that organisa-
tions need to manage has increased dramatically. Because of the diversity of risk exposures,
risk management requires a broader approach.
Study
of the dynamic environment and the evolving nature of risk, businesses encounter new types
of risk while pursuing new business objectives. There is, therefore, a need for an integrated
framework for a holistic approach to risk management. Businesses have increasingly become
exposed to a whole range of risks, including operational, strategic, financial, market, compli-
ance and regulatory risks. It is clear that an effective risk management function, based on
a broad and integrated framework, is necessary to ensure that all risks are covered. ERM is,
3 RSK2601/1
therefore, a response to the inadequacy of a silo-based approach to manage increasingly
interdependent risks (Chapman, 2013). With ERM, risks can be managed or controlled in a
coordinated and integrated way across an entire business.
Study
Study the section “Approach to risk management”, par. 1.2 in chapter 1 of the prescribed
book.
ous, yet at the same time provide the opportunity for some outcome that can be perceived
as positive. Driving fast or engaging in substance use would be examples of risk-taking be-
haviour. They may bring about positive feelings in the moment – however, they can also put
you at risk of injury, such as an accident. Likewise, taking and managing risk is the essence
of business survival and growth.
petitive differentiator, helping businesses achieve success despite difficult economic times.
Businesses continuously explore and develop opportunities to sustain earnings and drive
long-term increases in shareholder value. It is acknowledged that businesses are exposed to
various risks in their daily activities and that it is necessary to take certain risks to maximise
business opportunities. The board has the overall responsibility to operate an active risk and
opportunity management system that ensures comprehensive and consistent management
of all significant risks and opportunities. The benefits of effective risk and opportunity man-
agement include the following:
y Improved cost certainty
y Higher economic returns
y Sustainable shareholder value
y Increased stakeholder confidence
y Reduction of costly disputes and claims
Study
Study section 1.4, “Risk and opportunity” in chapter 1 of the prescribed book.
4
y Establish compensation plans that align goals to long-term value creation, taking into
consideration incentive risks;
y Ensure that appropriate risk management systems are in place to avoid excessive risk-
taking, and
y Comprise primarily independent, diverse members, as such a composition is helpful in
assessing a business’s risk profile.
Study
Study section 1.5, “The role of the board” in chapter 1 of the prescribed book.
Read the section “Primary business objective (or goal)”, par. 1.6 in chapter 1 of the pre-
scribed book.
responsibilities. It provides a framework based on analysing risks and opportunities, with the
ultimate objective of creating value for the shareholders. ERM entails the alignment of an
organisation’s strategy, processes, people, technology and knowledge to meet its risk man-
agement purpose and offers a systematic and integrated way of identifying and responding
to all sources of risk. ERM aims to provide a coherent framework to deal with all risks that
result from operating in the ever-changing economic environment. How does the business
for which you work or for which you would like to work define enterprise risk management?
Does the business have an established risk terminology that is understood throughout the
organisation? Here is a definition of enterprise risk management:
Study
Study the section “What is enterprise risk management?”, par. 1.7 in chapter 1 of the
prescribed book.
Activity 1.2
Access the Risk Glossary document that you will find under Additional Resources on
myUnisa and refer to the definition of ERM, which you will find in all 11 official South
African languages. Write down your own understanding of the definition and discuss
this with your fellow students on the discussion forum.
5 RSK2601/1
1.9 BENEFITS OF ERM
It is necessary to understand the risks being taken by all types of organisations when seeking
32
to achieve objectives and attain the desired reward level. Organisations need to understand
the overall level of risk embedded within their processes and activities. They need to recog-
nise and prioritise significant risks and identify the weakest critical controls. When setting out
to improve risk management performance, the expected benefits of the risk management
initiative should be established in advance. The outputs from successful risk management
include compliance, assurance and enhanced decision-making. Such outputs will provide
benefits in the form of improvements in the efficiency of operations, the effectiveness of
tactics (change projects) and the efficacy of the strategy of the business. The benefits of ERM
include the following:
y Greater likelihood of a business realising its objectives
y Greater confidence among stakeholders and the investment community
y Compliance with relevant legal and regulatory requirements
y Alignment of risk appetite and strategy
y Improved organisational resilience
y Enhanced corporate governance
y The risk process will be embedded throughout the organisation
y Minimisation of operational surprises and losses
y Optimisation of resource allocation
y Identification and management of cross-enterprise risks
y Linkage between growth, risk and return
y Rationalisation of capital
y The capacity to seize opportunities
y Improved organisational learning
Study
Study the section “Benefits of enterprise risk management”, par. 1.8 in chapter 1 of the
prescribed book.
mentation, risk management framework, risk management policy, risk management process
and sources of risk.
ensures accountability, fairness and transparency in a company’s relationship with all its stake-
holders (financiers, customers, management, employees, government and the community).
6
y Procedures for proper supervision, control and information flow to serve as a system of
checks and balances.
(COSO), Internal Control–Integrated Framework (2013), explains that internal control is a pro-
cess, effected by an entity’s board of directors, management and other personnel, designed
to provide reasonable assurance regarding the achievement of objectives in the following
categories:
y Effectiveness and efficiency of operations
y Reliability of financial reporting
y Compliance with applicable laws and regulations
The aim is to accomplish this by identifying and assessing risks facing the business and re-
37
sponding to them by either removing them or reducing them or, where it is economical to
do so, transferring them to a third party.
1.10.3 Implementation
Implementation of risk management can be resourced internally or externally. The parameters
38
of any planned actions need to be mapped, communicated, and agreed upon to understand
the time factor, resources, costs, inputs, and deliverables.
faced by an organisation. The purpose of the risk management framework is to assist an or-
ganisation in integrating risk management into its management process so that this becomes
a routine activity. The framework consists of the following five steps:
y Mandate and commitment
y Design a framework
y Implement a framework
y Monitor framework
y Improve the framework
has identified will be managed and controlled. The risk management policy assigns responsibil-
ity for performing key tasks, establishes accountability with the appropriate managers, defines
boundaries and limits and formalises reporting structures. The policy should cover specific
responsibilities of the board, internal audit, external audit, the risk committee, the corporate
governance committee, the central risk function, employees and third-party contractors in
implementing risk management. A policy statement defines a general commitment, direc-
tion or intention, and a policy on risk management expresses an organisation’s commitment
to risk management and clarifies its general direction or intention.
7 RSK2601/1
1.10.6 Risk management process
According to ISO (International Risk Standard) 31000 (2009), a risk management process
41
Study
Study the section “Structure” and the diagram showing the ERM structure, par. 1.9 and
figure 1.2 in chapter 1 of the prescribed book.
1Self-assessment
(1) Distinguish between risk and uncertainty. Explain the relationship between
risk and opportunity for an organisation such as South African Airways (SAA).
(2) Discuss the role of the board of directors in terms of risk management.
(3) What is ERM?
(4) Draw a fully labelled diagram showing the ERM structure.
(5) Define and explain the terms risk, risk management, risk diversity and risk-taking.
SUMMARY
The purpose of Lesson 1 was to introduce you to ERM by giving you an overview of the course.
43
It is important to define ERM from a strategic management perspective to ensure that atten-
tion is paid to all risks in an organisation. It should be noted that risk is now more complex,
diverse and dynamic. Whatever strategy boards adopt, they must decide what opportuni-
ties, present and future, they want to pursue and strike a sensible balance between risk and
opportunity. Risk management, therefore, needs to be integrated with the activities of the
board. If applied systematically and methodically, ERM gives rise to a series of clearly recog-
nised benefits, including an increase in shareholder value. The business case for corporate
governance is discussed in Lesson 2.
8
LESSON 2
CORPORATE GOVERNANCE
Contents
Aim
Key concepts
Learning outcomes
Learning material
Self-assessment
Summary
Aim
At the end of this lesson, you should clearly understand corporate governance in an
enterprise-wide risk-related context.
Key concepts
• Corporate governance
• King III Report
• The Companies Act 71 of 2008
• Basel III regulation accord
• Financial crisis
Learning outcomes
LEARNING MATERIAL
44 Lesson 2 deals with chapter 2 of the prescribed book.
9 RSK2601/1
2.1 INTRODUCTION
Although corporate governance is usually unique to each company, it has some universal
45
elements. Corporate governance controls the internal and external actions of managers,
employees and outside business stakeholders. This framework also sets out the duties, privi-
leges and roles of board members or directors to ensure that these individuals do not take
advantage of the company’s resources. Companies may also include information on the role
of shareholders in the organisation and their responsibilities for voting on corporate issues.
Corporate governance usually sets out the goals and objectives of each business contract. The
46
rate of return, length of the contract, individuals who are authorised to approve contracts,
and other obligations are usually included in the corporate governance framework. Corpo-
rate governance also creates a system of checks and balances to govern internal business
departments. The system ensures that no one (in other words, no individual or department)
dominates business decisions or operates outside the company’s mission and values.
Read
Activity 2.1
Various corporate governance collapses have taken place in South Africa over the past
few years. Identify a corporate scandal and discuss this with your fellow students on
myUnisa. What were the underlying factors that led to the scandal?
tion, its board, its shareholders and other relevant stakeholders. It also refers to the specific
responsibilities of boards of directors and management to maintain established relationships.
Study
Study the section “Definition of corporate governance”, par. 2.17 in chapter 2 of the
prescribed book.
Activity 2.2
Access the Risk Glossary document on myUnisa under Additional Resources and refer to
the corporate governance definition, which you will find in all 11 official South African
languages. Write down your own understanding of the definition and discuss this with
your fellow students on the discussion forum.
10
2.3 THE IMPACT OF CORPORATE GOVERNANCE ON
BUSINESS
48 Corporate governance affects various business areas of an enterprise, as discussed below.
economy at large. When an efficient corporate governance system is in place, debt, equity
and capital flow to enterprises that are capable of investing these resources effectively to
produce goods and services that are most in demand and have the highest rate of return are
possible. In this context, effective governance helps to grow and protect scarce resources
and to ensure that societal needs are met. Effective governance should make it possible to
replace managers who do not put scarce resources to efficient use or who are incompetent
in what they do.
mestic and international investor confidence and assuring investors that the assets are used
in the form agreed upon, whether the investment is in the form of debt or equity. This has a
positive impact on both debt and equity. For enterprises to succeed in competitive markets,
corporate managers must innovate relentlessly and efficiently and constantly develop new
strategies to meet changing circumstances.
tions of the societies in which they operate. Most corporations take their corporate citizenship
seriously. Many contribute to alleviating the needs of civil society, although others are oppor-
tunistic and have no regard for social or environmental issues. Good corporate governance is
essential to ensure adherence to legislation as well as corporate social responsibility principles.
and holds managers and the board accountable for managing corporate assets. Such ac-
countability contributes to the efficient use of resources, the attraction of lower-cost capital
and an increase in the responsiveness of the enterprise to society and will therefore lead to
improved corporate performance. Effective corporate governance may not guarantee im-
proved corporate performance at the individual firm level. However, it should increase the
likelihood of managers focusing on improving the performance of enterprises and of their
being replaced when they fail to do so.
throughout the world, and it is certainly not new to South Africa. The history of corporate
11 RSK2601/1
governance in South Africa can be found in four bodies of knowledge, namely the Companies
Act 61 of 1973, the King I Report on Corporate Governance of 1994, the King II Report on
Corporate Governance of 2002 and the King Code of Governance in South Africa 2009 (King
III). We need to look at the history of corporate governance in South Africa to understand
the relevance of the King II Report.
* The Companies Act of 1973 has been replaced by the Companies Act of 2008. Please
refer to section 2.6 for an explanation of the new Companies Act of 2008.
early 1990s, the Institute of Directors (IoD) in Southern Africa appointed Mervyn King, SC, to
head the committee on corporate governance. The wider definition of corporate governance
was institutionalised by the committee’s findings, together with the aim and purpose of the
King I Report, to promote the highest standard of corporate governance in South Africa. The
King I Report was unique compared with its counterparts in other countries in terms of the
guidelines on financial reporting that it provided and its emphasis on good social, ethical
and environmental practices. It advocated an integrated approach that took all stakeholders
(not only the shareholders) into consideration for the greater good of society.
revised and replaced by the second King Report on Corporate Governance for South Africa
of 2002. The King II Report moved away from the single-bottom-line principle (i.e. profit for
shareholders) to embrace the triple-bottom-line principle, which considers the company’s
environmental, economic, and social activities. Besides reporting on their financial perfor-
mance (single bottom line), corporations must also disclose their social and environmental
performances (triple bottom line). This method places greater emphasis on the non-financial
indicators. Companies are required to report on the nature and extent of their commitment
to social transformation, ethics, and safety, health and environmental management policies
and practices. In a company, this is referred to as the “triple bottom line”.
12
2.4.4 The King Code of Governance in South Africa of 2009 (King III)
King III became necessary because of the anticipated new Companies Act of 2008, which
57
came into effect on 1 May 2011, and changing trends in international governance. The review
also came at a time when business ethics and corporate governance were increasingly under
the spotlight in view of recent corporate failures and the global economic meltdown. As with
King I and II, the King Committee endeavoured to be at the forefront of governance interna-
tionally, and this was again achieved by focusing on the importance of reporting annually on
how a company has made a positive contribution to the economic life of the community in
which it operated during the year under review. In addition, emphasis has been placed on
the requirement to report on how the company intends to enhance those positive aspects
and eradicate or ameliorate any possible negative impacts on the economic life of the com-
munity in which it will operate in the year ahead.
King III recommends that companies generate sustainability reports according to the Global
58
legal, regulatory and reputational risks. Hence, certain legal mechanisms such as the Com-
panies Act of 2008 and the JSE’s listing requirements are used to enforce the King III Report
and the Code of Corporate Practices and Conduct. King III applies to all listed companies on
the JSE, banks, financial and insurance institutions and some public sector agencies.
The consequences of corporate governance in the King III Report relate closely to how ef-
60
fectively companies enforced the King I Report in 1994. Companies with good corporate
governance will attract more foreign investments to finance their growth and will therefore
be more competitive in the corporate environment. Good corporate governance contributes
to shareholders’ wealth and is a key factor in the investor decision-making process. Investors
are willing to pay a premium for good governance for three reasons.
y They believe that the company will perform better over time, which will mean higher
share prices.
y It is a way of reducing risk by either avoiding it altogether or coping better with adverse
events.
y The focus on corporate governance is a trend, but the reality is that no one wants to be
left behind.
ance, which deals with the principles, should be studied with the report in which recommen-
dations for the best practices for each principle are provided. All entities should apply the
principles in the code and consider the best practice recommendations in the report. By way
of explanation, all entities should make a positive statement about how the principles either
have or have not been applied. Such a level of disclosure will allow stakeholders to comment
on and challenge the board on the quality of its governance. The application will differ for
each entity and is likely to change, as the aspirational nature of the code should drive entities
to constantly improve on governance practices. It is essential to understand that the “apply
or explain” approach requires more consideration and explanation of what has been done
to implement the principles and best practice recommendations of governance.
13 RSK2601/1
Each principle is of equal importance, and together they constitute a holistic approach to
62
2.4.5 The King IV Report on Corporate Governance for South Africa of 2016
(King IV)
On 1 November 2016, the IoDSA released the King IV report on Corporate Governance for
63
South Africa. King IV replaces King III in its entirety, and the application of King IV is effec-
tive in respect of financial years starting on or after 1 April 2017 (PwC, 2016:2). King IV builds
on its predecessors’ positioning on sound corporate governance as an essential element of
good corporate citizenship (PwC, 2016:2). According to Deloitte (2016:1), King IV provides a
more practical, outcome-based approach to good corporate governance and incorporates
global public sentiment and global regulatory changes since the incorporation of King III.
14
y Present corporate governance as concerned not only with structure and processes, but
also with an ethical consciousness and conduct.
y Encourage transparent and meaningful reporting to stakeholders.
(IoDSA, 2016:22)
65
As you can see from this, King IV has moved away from an “apply and explain” to a more
66
outcome-based approach. The new code has reduced the 75 principles in King III to 17 basic
principles. For the purpose of this module, our focus will be on principle 11, which explains
the governance of risk. Like King III, King IV focuses on the governance of risk, but the code
now recognises the complexity of risks and the need to strengthen risk oversight (IoDSA,
2016:30). One of the significant changes in the recommendation is that the risk committee
should comprise a majority of non-executive members as part of the governing body. This
recommendation goes beyond what was required in King III (IoDSA, 2016:30).
Principle 11 focuses on the governing body’s process of governing risk to support the or-
67
ganisation in setting and achieving its strategic objectives (IoDSA, 2016:41). The following
are recommended practices for the governance of risks based on King IV:
y The governing body should assume responsibility for the governance of risk by setting
the direction for how risk should be approached and dealt with in the organisation. Risk
governance should encompass both:
– the opportunities and associated risks to be considered when developing strategy; and
– the potential positive and negative effects of the same risks on the achievement of
organisational objectives.
y The governing body should approve a policy that articulates and gives effect to its set
direction on risk.
y The governing body should treat risk as integral to the way it makes decisions and executes
its duties.
y The governing body should evaluate and agree on the nature and extent of the risks that
the organisation should be willing to take in pursuit of its strategic objectives. It should
approve in particular:
– the organisation’s risk appetite, namely its propensity to take on appropriate levels
of risk, and
– the limit of the potential loss that the organisation has the capacity to tolerate.
y The governing body should consider the need to receive periodic independent assurance
on the effectiveness of risk management.
y The governing body should exercise ongoing oversight of risk management and in
particular, ensure that it results in the following:
– An assessment of risks and opportunities emanating from the triple context in which
the organisation operates and the capitals that the organisation uses and effects.
– An assessment of the organisation’s dependence on resources and relationships as
represented by the various forms of capital.
– An assessment of the potential upside, or opportunity, presented by risks with poten-
tially negative effects on achieving organisational objectives.
– The design and implementation of appropriate risk responses.
– The integration and embedding of risk management in the business activities and
culture of the organisation.
15 RSK2601/1
– The establishment and implementation of business continuity arrangements allow
the organisation to operate under volatile conditions and withstand and recover from
acute shocks.
y The governing body should delegate to management the responsibility for implementing
and executing effective risk management.
y The nature and extent of the risks and opportunities the organisation is willing to take
should be discussed without compromising sensitive information.
y In addition, the following should be disclosed in relation to risk:
– An overview of the arrangements for governing and managing risk.
– Key areas of focus during the reporting period, including objectives, the key risks that
the organisation faces, and undue, unexpected or unusual risks and risks that are taken
outside of risk tolerance levels.
– The actions taken to monitor the effectiveness of risk management and how the
outcomes were dealt with.
– Planned areas of future focus.
68 (IoDSA, 2016:61–62)
Study
Study the following two documents on the RSK2601 LibGuide: “King III at a glance.
Corporate Governance Series” and “A summary of the King IV Report on Corporate
Governance for South Africa, 2016. King IV: An outcomes-based corporate governance
code fit for a changing world”. You will be examined on the content of these documents.
Activity 2.3
Access the IoDSA King IV website on myUnisa, read the web version of the IoDSA King IV
report, and discuss the following questions on the discussion forum: How does King IV
define corporate governance? What are the underpinning philosophies of King IV? Also
discuss principle 11: Risk governance and its recommended practices.
of enterprises. For South African enterprises to be globally competitive, they must remain
abreast of developments in the rest of the world and take corporate governance and the
King report to heart. Good governance equals good business.
Good corporate governance is largely the responsibility of corporate citizens. For an enter-
70
prise to achieve and aspire to be a good corporate citizen, it has to empower the board of
directors to:
y disclose all practices and understand the importance of a relationship between the board
and the community;
y report annually on social, transformation, safety, ethics, health and environmental
management policies and practices;
16
y report on HIV/AIDS strategic plans and policies;
y disclose its formal procurement policies;
y develop and implement a clearly stated code of ethics, and
y implement the above by complying with the principles of reliability, relevance,
clarity, comparability, timeliness and verifiability.
Risk management is applied by defining a company’s risk tolerance, related strategies and
71
policies and by reviewing their effectiveness on an ongoing basis so that the objectives are
clearly defined. Reviewing processes are essential for identifying opportunity areas where
effective management can be turned into competitive advantages. Risk management goes
far beyond simply controlling financial risks. The reputation and future survival of an enter-
prise are also at stake – that is why enterprises have to ensure that corporate governance
pertaining to risk management is transparent and disclosed to all stakeholders.
of public trust and confidence, which is critical to the proper functioning of the economy
as a whole. Poor corporate governance may contribute to organisational failures, which can
give rise to high public costs and consequences due to their potential implications for the
broader macro economy.
There is a number of definitions of corporate governance. For instance, the UK Cadbury Com-
74
mission Report on Corporate Governance of 1992 gives the following definition: “Corporate
governance is concerned with balancing economic and social goals and between individual
and communal goals. The governance framework is there to encourage the efficient use of
resources and equally to require accountability of the stewardship of these resources. The
aim is to align as nearly as possible the interests of individuals, corporations and society.”
The OECD Principles of Corporate Governance (2004) states: “Corporate governance involves a
75
set of relationships between a company’s management, its board, its shareholders and other
stakeholders. Corporate governance also provides the structure through which the company’s
objectives are set, and the means of attaining those objectives and monitoring performance
are determined.”
It is clear from these definitions that corporate governance is the practice by which organisa-
76
17 RSK2601/1
The South African framework
78
Introduction
79
Corporate governance in South Africa was institutionalised by the publication of the King
80
The King Report was updated in 2001, and a third report was published in 2009. The new
81
Companies Act and changes in international governance trends necessitated the third report
on corporate governance in South Africa.
Extracts from the code relevant to this course that we will be discussing below are the gov-
82
ernance of risk, the audit committee, compliance with laws and internal audit.
Governance of risk
83
y The board should delegate to management the responsibility for designing, implementing
and monitoring the risk management plan
y Risk assessment
– The board should ensure that risk assessments are performed continually
– The board should ensure that frameworks and methodologies are implemented to
increase the probability of anticipating unpredictable risks
y The board should ensure that management considers and implements appropriate risk
responses
y The board should ensure continual risk monitoring by management
y The board should receive assurance regarding the effectiveness of the risk management
process
y The board should ensure that there are processes in place making complete, timely,
relevant, accurate and accessible risk disclosure to stakeholders possible
Audit committees
84
y The board should ensure that the company has a practical and independent audit committee.
y Membership and resources of the audit committee
– Audit committee members should be suitably skilled and experienced independent
non-executive directors
– An independent non-executive director should chair the audit committee
18
y Internal assurance providers
– The audit committee should satisfy itself regarding the expertise, resources and ex-
perience of the company’s finance function
– The audit committee should be responsible for overseeing internal audit
– The audit committee should be an integral component of the risk management process
y The audit committee is responsible for recommending the appointment of the external
auditor and overseeing the external audit process
y The audit committee should report to the board and shareholders on how it has discharged
its duties
y The board should ensure that the company complies with applicable laws and considers
adherence to non-binding rules, codes and standards
y The board and each director should have a working understanding of the effect of the
applicable laws, rules, codes and standards on the company and its business
y Compliance risk should form an integral part of the company’s risk management process
y The board should delegate to management the implementation of a practical compliance
framework and processes
Internal audit
86
y The board should ensure that there is an effective risk-based internal audit
y Internal audit should follow a risk-based approach to its plan
y Internal audit should provide a written assessment of the effectiveness of the company’s
system of internal controls and risk management
y The audit committee should be responsible for overseeing internal audit
y Internal audit should be strategically positioned to achieve its objectives
Governance in companies in South Africa is also a legal requirement as per the Companies
88
Act 71 of 2008. The Act came into effect in May 2011. Relevant aspects of the Act will be
discussed below.
y promote compliance with the Bill of Rights, as provided for in the Constitution, in the
application of company law
y promote the development of the South African economy by:
– encouraging entrepreneurship and enterprise efficiency
– creating flexibility and simplicity in the formation and maintenance of companies
– encouraging transparency and high standards of corporate governance as appropriate,
given the significant role of enterprises within the social and economic life of the nation
19 RSK2601/1
y creating optimum conditions for the aggregation of capital for productive purposes, and
for the investment of that capital in enterprises and the spreading of economic risk
y providing for the formation, operation and accountability of non-profit companies in a
manner designed to promote, support and enhance the capacity of such companies to
perform their functions
y balancing the rights and obligations of shareholders and directors within companies
y encouraging the efficient and responsible management of companies
y providing for the efficient rescue and recovery of financially distressed companies in a
manner that balances the rights and interests of all relevant stakeholders
y providing a predictable and effective environment for the efficient regulation of companies
Board of directors
90
The Act provides for the business and affairs of a company to be managed by, or under, the
91
direction of a board of directors. The board has the authority to perform any of the company’s
functions except to the extent that the Companies Act or Memorandum of Incorporation
provides otherwise.
A private company or personal liability company requires at least one director, while a pub-
92
lic company or a non-profit company requires at least three directors. The minimum number
of directors may be increased in a company’s Memorandum of Incorporation.
Shareholders of profit companies (other than state-owned entities) elect at least 50% of
94
Board committees
95
The board of a company may establish any number of committees and delegate to such com-
96
mittees any board function. Unless the Memorandum of Incorporation, or a resolution es-
tablishing a committee, provides otherwise, the committee may include persons who are
not directors of the company. However, such persons are not entitled to vote on a matter to
be decided by the committee.
The board committees may consult with or receive advice from any person and have the
97
The number of board committees will depend on the complexity and industry of the com-
98
pany. Banks, for example, can have a credit committee, operational risk committee and an
audit committee. Smaller companies can manage the situation differently by including the
risk functions as part of the audit committee or the main board.
Audit committees
99
A public company, state-owned enterprise or other company that has voluntarily determined
100
to have an audit committee must elect an audit committee at each annual meeting.
20
The audit committee must have at least three members unless the company is a subsidiary
101
of another company with an audit committee that will perform the audit committee func-
tions on behalf of that subsidiary.
Each member of the audit committee must be a director of the company. A member of the
102
y involved in the day-to-day management of the company, or have been so involved at any
time during the previous three financial years
y a prescribed officer or full-time executive employee of the company, or have been such
at any time during the previous three financial years
y a material supplier or customer of the company, such that a reasonable and informed third
party would conclude in the circumstances that the integrity, impartiality or objectivity
of that director is compromised in that relationship
y related to any person described above
The duties of the audit committee include:
103
The Act requires the audit committee to prepare a report for inclusion in the financial state-
104
ments describing how the audit committee carried out its functions, stating its level of sat-
isfaction with the external auditor’s independence and providing comment on the financial
statements, accounting practices, and internal controls of the company. The ambit of the
audit committee also extends to the receipt of and dealing with any complaints relating to the
accounting practices and internal audit of the company, content or auditing of the company’s
financial statements, internal financial controls of the company, or any other related matter.
The board may also delegate other functions to the audit committee, including developing
105
and implementing a policy and plan for a systematic, disciplined approach to evaluating
and improving the effectiveness of risk management, control, and governance processes
within the company.
Study
21 RSK2601/1
2Self-assessment
SUMMARY
In Lesson 2 we examined corporate governance and the implications of the principles
106
contained in the King III and King IV Reports. The next topic deals with the seven core risk
management stages in the risk management process to implement ERM in a business.
22
TOPIC 2
ENTERPRISE RISK MANAGEMENT
Topic contents
Aim
At the end of this topic, you will be able to identify and describe the seven risk manage-
ment stages in the ERM process to implement ERM in a business.
Learning outcomes
OVERVIEW
In this topic we will discuss the seven stages in the ERM process (see Figure 1 on the next
107
page). According to ISO 31000, as discussed in Topic 1 (1.10.6), ERM systematically applies
management policies, procedures, and practices to a set of activities intended to establish
the context, communicate and consult with stakeholders, and identify, analyse, evaluate,
treat, monitor, and review risk. Each of these stages will be discussed in detail to give you a
clear understanding of how the entire ERM process works in a business context.
23 RSK2601/1
108
Does the organisation in which you work or in which you would like to work have an enter-
109
prise risk management process? Here is a definition of the risk management process:
Activity
Access the Risk Glossary document on myUnisa under Additional Resources and refer to
the risk management process definition, which you will find in all 11 official South African
languages. Write down your own understanding of the ERM process and discuss this with
fellow students on the discussion forum.
24
LESSON 3
ERM: Establishing the context
Contents
Aim
Key concepts
Learning outcomes
Learning material
Self-assessment
Summary
Aim
At the end of this lesson, you will be able to identify and discuss Stage 1 of the ERM pro-
cess. Establishing the context will help you gain an understanding of the background to
the business and business activities, processes or projects.
Key concepts
SWOT analysis1
PEST analysis2
Business plan
Financial statements ratios
Learning outcomes
LEARNING MATERIAL
Lesson 3 deals with chapter 8 of the prescribed book. This section will discuss Stage 1 of the
110
ERM process.
25 RSK2601/1
111
FIGURE 2: Stage 1
the other stages in the ERM process. Establishing the context involves the entire business as
well as the business activities, processes and projects. This stage is used to acquire accurate
data and information about the entire business. Refer to pars. 8.1 to 8.3 in the prescribed book.
Read
Read the sections “Process inputs” and “Process outputs”, pars. 8.4–8.5 in the prescribed
book.
The ERM process can be either regulated or constrained by the culture of business risk man-
113
agement, resources and plan. A business needs to take note of the factors that can influence
the risk management process.
Study
Study the section “Process controls (constraints)”, par. 8.6 in chapter 8 of the prescribed book.
the business. These process mechanisms are financial analysis tools, the risk management
process diagnostic, SWOT analysis and PEST analysis.
These ratios are used for planning, evaluation, and control purposes to determine a business’s
financial standing and aid in the risk analysis process.
in a business. A risk management process must be implemented through the support of the
whole business and over an extended period. Risk management processes that have already
been put in place must constantly be reviewed to establish the effectiveness of the business.
26
3.2.3 SWOT analysis
The overall performance of a business must be reviewed by looking at the business strengths,
117
weaknesses, opportunities and threats; this is also known as the SWOT analysis.
full context. PEST stands for “political, economic, social and technological factors”, and the
PEST analysis can be used to analyse the market in which the business operates.
Study
Study the section “Process mechanisms (enablers)”, par. 8.7 in chapter 8 of the prescribed
book.
the business activities or risk breakdown structure to aid in the other stages of the risk man-
agement process. These activities are discussed below.
will be measured.
market. A business must know its industry and the risks associated with that specific industry.
the processes by which it operates. Refer to the business process definition in par. 8.8.4 of
the prescribed book.
financial position of the business and its future position. They will indicate what resources need
to be used or introduced to achieve an excellent financial position and growth in the business.
27 RSK2601/1
3.3.6 Resources available
A business must use its resources to the most competitive advantage in the market. If re-
125
sources are used effectively, the business can achieve a greater return on its capital employed.
processes in the best possible way to achieve the best possible solution.
operations. The business must also comply with the regulatory framework.
Study
Study the section “Process activities”, par. 8.8 in chapter 8 of the prescribed book.
Activity 3.1
Identify and discuss the context of the organisation for which you work or for which you
would like to work and compare your answer with those of your fellow students on the
discussion forum.
3Self-assessment
SUMMARY
The purpose of Lesson 3 was to discuss Stage 1: Establishing the context in the ERM pro-
cess. The lesson provided a high-level overview of the factors that need to be considered
and evaluated in business before embarking on the other stages in the ERM process. Stage
1 will assist in determining the sources of risks and the participants in the risk identifica-
tion process. The second stage: Risk identification in the ERM process, will be discussed in
the next lesson.
28
LESSON 4
THE ERM PROCESS
Contents
Aim
Key concepts
Learning outcomes
Learning material
Self-assessment
Summary
Aim
At the end of this lesson, you will be able to explain stages 2 to 7 of the ERM process.
You will gain a clear understanding of the interrelationships between the stages in the
implementation of the ERM process.
Key concepts
Learning outcomes
29 RSK2601/1
LEARNING MATERIAL
Lesson 4 deals with chapters 9 to 14 of the prescribed book. We will discuss the remaining
129
FIGURE 3: Stage 2 to 7
ness needs to understand the business activities and context. During the second stage, it
is crucial to identify the risks in the business and understand how they fit into the overall
business context.
Through risk identification, the business will identify the key risks and risk events. The busi-
131
ness will constantly change and grow, so will the risks associated with it. The business will
need to constantly identify risks and identify the opportunities that may arise to achieve its
objectives and mitigate risks that may reduce the likelihood of the business achieving its ob-
jectives. Risk can also be based on two primary outcomes, namely the upside and downside
of risk. Refer to pars. 9.1 to 9.3 in the prescribed book.
Read
Read the sections “Process inputs” and “Process outputs”, pars. 9.4–9.5 in the prescribed book.
The process inputs will deal with assumptions, business analysis, uncertain events, lessons
132
learnt and issues relating to the risk identification process. The process output will be the
risk register. A risk register is a tool that a business can use to compile a list of all the risks
identified in the business and categorise each one according to impact, probability, risk
owner and countermeasures.
Refer to par. 9.6 in the prescribed book to learn more about the factors that can influence or
133
30
4.1.1 Process mechanisms for Stage 2: Risk identification
Specific process mechanisms are used in the second stage to identify risks in the business.
134
In this section we will briefly discuss some of these mechanisms so that you will have an
indication of how the risk identification process could be approached.
y Risk checklist
A risk checklist is used to list all the risks identified during previous projects within the
135
business.
the business will identify the main categories of risks experienced within the business.
y Gap analysis
Gap analysis can be used to identify the main risks linked to a certain activity or project
137
carried out by the business. This method will help the business to establish where the gap
is in the risk associated with the activity or project so that either proactive or reactive risk
measures can be established.
y Risk taxonomy
risk taxonomy can take the form of a structured checklist to break down the risks and op-
138
portunities into manageable components, which then can be aggregated for exposure
measurement, reporting and management. This method is used in the risk taxonomy of
software development. Refer to Table 9.1 in chapter 9 of the prescribed book.
y PEST analysis
The business can also use PEST analysis in the identification stage to quantify the risk ex-
139
posure of the business to its external environment. The business can conduct this analysis
during a workshop or brainstorming session.
y SWOT analysis
A SWOT analysis is an easy and understandable method allowing a business to identify
140
y Database
A risk database can be used to capture all the information relating to each risk identified
141
and is an effective way to monitor all the risks and actions taken to manage them.
y Risk questionnaire
A risk questionnaire is used when a business needs to establish the concerns and risks
143
that arise in a business project/activity through the various stages. The completion of the
questionnaire will show how business employees respond to risk.
y Risk register
A risk register is used to capture information constantly and simplify communication
144
regarding the risks in a business project/activity. Refer to Table 9.2 in chapter 9 of the
prescribed book.
31 RSK2601/1
Study
Study the section “Process mechanisms (enablers)”, par. 9.7 in chapter 9 of the prescribed
book.
capture risk or uncertainty, and record the risks in a log, list or risk register. The following
activities need to be carried out:
y Clarifying the business objectives
The objectives of the business must be clear and understandable so that the risk identifi-
146
cation process will make it possible to identify the threats or opportunities that may arise
from the business objectives.
Establishing the context of the risk management process must be reviewed and examined
for sources of risk and opportunities.
of risk identification must be implemented so that consistent risk management can take
place.
y Facilitation\
It is essential to have techniques that can be applied to identify the risks and opportunities
150
to suit every circumstance. Facilitation needs to take place through interactive workshops
to inform the business about how to identify the risks. The responsibilities of a facilitator
in an interactive workshop are depicted in Figure 4 below.
151
32
A facilitator can adopt one of the following nine techniques in an interactive workshop:
• Brainstorming
• Structured or Semi-Structured Interviews
• Nominal Group Technique
• Scenario Analysis
• Delphi Technique
• Cross Impact Method
• Systems Dynamics
• Risk Meta-language
• Implementation
assign risks to risk owners and managers in the risk management process.
y Risk register
A risk register will be drafted after all the process activities have been carried out. The risk
154
Study
Study the section “Process activities”, par. 9.8 in chapter 9 of the prescribed book.
SUMMARY (STAGE 2)
The risk identification process can be implemented to identify risks and opportunities that
155
may arise in the business. If a business cannot identify risk, it will not be able to manage risk.
As mentioned above, Stage 2 will form the foundation for the remaining five stages. The
next section deals with Stage 3: Risk analysis.
occurring and their impact, in this way assisting in the decision-making process. During the
risk analysis process, all the risks identified in the risk register will be assessed. Ample time
should be allowed for conducting the risk analysis stage. Refer to pars. 10.1 to 10.3 in the
prescribed book.
Read
Read the sections “Process inputs” and “Process outputs”, pars. 10.4–10.5 in the prescribed
book.
33 RSK2601/1
The process inputs in the risk analysis process will consist of risk study parameters, including
157
risk identification, risk recording, profit and loss account assessment, balance sheet assessment
and industry betas.3 The process outputs will be the risk register, including the assessment,
which shows the probability and impact of each risk and opportunity.
Refer to par. 10.6, read in conjunction with par. 8.6 of the prescribed book, regarding all the
158
When you flip a coin, it can land either heads up or tails up. Thus, there is a 50% chance of
either of the positions occurring – a 0.5 probability chance of landing heads up and a 0.5
probability chance of landing tails up, because the probability must add up to 1.
A business needs to understand probability. For example, a business can apply to be consid-
160
ered for a contract appointment to render a service to another organisation. This particular
business is one of four businesses that tendered for the contract. Thus, each business has
a probability of 25% of being successful in obtaining the contract. A business will need to
decide which probability distribution method and probability impact matrix to use in the
risk analysis stage. Refer to the example in par. 10.7.1 in the prescribed book.
Study
Study the section “Process mechanisms (enablers)”, par. 10.7 in chapter 10 of the prescribed
book.
capture the likelihood of the risk occurring and its impact so that this can be recorded in the
risk register. The following activities need to be carried out:
y Causal analysis
The causes of any risk must be identified. The business need to learn from past events in
162
order to implement risk management measures for future events. Refer to Figure 10.4 in
the prescribed book for the leading causes of the event diagram, identifying the relation-
ships and categories of risks.
3 Beta is used to measure the non-diversifiable risk element for a particular share in
relation to the market as a whole.
34
y Decision analysis and influence diagrams
Decision analysis is used to structure decisions, uncertain/chance events and values of
163
outcomes. The influence diagram can assist in the development and understanding of
the risks and the actions to be taken in the decision-making process. This analysis will
provide a framework for the decisions, events, management of problems, reduction of
large volumes of data and sensitivity analysis in the business. Refer to Figures 10.5 and
10.6 in the prescribed book.
y Pareto analysis
Pareto4 analysis is used to identify those risks that will have a notable impact on business
164
projects/activities and objectives. This analysis will rank and order the risks according to
their impact so that the business can manage the high risks accordingly.
risk profile. The higher the risk, the higher the return will be for investment. Market risk is
measured by its beta in the model. Refer to the section “Required rates of return” in par.
10.8.4 of the prescribed book.
Qualitative assessments explain the impact of the risks, whereas quantitative assessment
consists of numeric assessments, including financial and timing risks. It is best to manage
the most severe risks that the business has identified.
Study
Study the section “Process activities”, par. 10.8 in chapter 10 of the prescribed book.
SUMMARY (STAGE 3)
Stage 3 involves risk analysis and the assignment of probabilities and impacts on risks and
167
opportunities. It is essential that all the information obtained in the analysis of all the risks
and opportunities in this stage be recorded in the risk register. In the next section we will
discuss Stage 4: Risk evaluation.
Stage 4 will focus on both the risk exposure and opportunity that may arise from business
activity. All the information gathered in the risk analysis process is integrated into the risk
evaluation process. The risk evaluation stage will evaluate the financial impact (loss or gain)
of risk in business in numerical terms. Refer to pars. 11.1 to 11.3 in the prescribed book.
4 “Commonly Pareto diagrams reveal that 20% of the risks within an analysis contribute some
80% of the overall risk exposure/impact following the Pareto principle or 80/20 rule, as it is
known” (Chapman, 2013:193).
35 RSK2601/1
Read
Read the sections “Process inputs” and “Process outputs”, pars. 11.4–11.5 in the prescribed
book.
The process input in the risk evaluation process will consist of the risk register. The risk reg-
169
ister will illustrate all the risks and risk categories in the business and essential information
such as who the relative risk owner/manager is. The risk register will have more background
information, which can be used in the risk evaluation stage. The process outputs will consist
of the following:
y Sensitive analysis
y Quantitative schedule and cost risk analysis results
y Decision tree
y Scenario modelling
y Investment model results
y Revised risk register
Refer to par. 11.6 in the prescribed book for information about all the factors that can either
170
process.
y Probability trees
A probability tree is a method used by a business to ensure that all possible outcomes
172
of a risk event has been taken into account. A probability distribution is a list of possible
outcomes with associated probabilities. Thus, a probability tree will illustrate all possible
probability distributions for a certain risk event. A probability tree can be used to illustrate
both a dependent event and an independent event. The probability of any event (E) is a
number between 0 and 1. Thus, 0 ≤ P(E) ≤ 15 and is the sum of the probabilities of any set
of mutually exclusive (only one event can occur at a time) and non-mutually exclusive (the
events cover all possible outcomes) events which equals 1. Read par. 11.7.1 to understand
how a probability tree can be used to calculate the probabilities that may arise from an
independent and a dependent event.
an event, the EMV will be calculated using the weighted outcomes, which are calculated
using the probabilities assigned to each outcome, for example, successes/profits and
failures/losses. The theory requires that the probabilities and outcomes be determined.
The EMV will be used to select the decision alternative with the highest monetary value.
Read par. 11.7.2 and understand the examples given to illustrate how the EMV is calculated.
tractiveness to a decision-maker. In terms of the EMV method, the decision alternative that
36
yielded the largest monetary value was selected, but this decision might not be the one
175
that the business prefers. Utility theory was adapted in an effort to explain why people
make different decisions from what is suggested by the EMV criterion. It is possible that
business decision-makers may each have a different attitude towards specific outcomes
– utility theory will thus measure personal attitudes towards risk by decision-makers. The
utility function illustrates how the same monetary payoff/outcome might have different
levels of utility for decision-makers. Decision-makers can be classified according to the
following attitudes towards risks (Refer to Table 2):
Read
Read par. 11.7.3 in the prescribed book and refer to Figure 11.5 on p. 205 to see an illustra-
tion of the utility function.
y Decision trees
A decision tree is used to illustrate decision problems graphically. A decision tree
consist of a number of decision nodes, with interconnected branches representing the
alternatives for a particular decision. You can see a typical decision tree in Figure 5.
176 The decision tree is used to determine the decision with the largest EMV.
37 RSK2601/1
Read
Read par. 11.7.4 in the prescribed book to understand the construction and rolling back
of a decision tree.
y Markov chain
The Markov chain method is used to combine the ideas of probability with those of
177
matrix algebra. It assumes that the probabilities remain fixed over time, but the system
being used can change from one position to another. These fixed variables will be used
as transition possibilities.
y Investment appraisal
The investment appraisal method is used when a business needs to decide which project
178
to embark on. These are usually high capital investment projects, and so the business must
decide which of them will be feasible, affordable and successful. The business must consider
the risks as well as the benefits of each project. Four techniques can be used to decide which
project to embark on. These are summarised in Table 3 below.
Technique Description
Average rate of return The ARR is an average annual return expressed as a percentage
(ARR) of the initial cost of the project.
Payback period (PP) The number of years required to recover the initial investment.
It considers the timing of cash flows and, therefore, the time
value of money. Thus, the payback period should be as short
as possible.
Net present value (NPV) The difference between the initial investment amount and
the present value of a project’s expected future cash flows,
discounted at the appropriate cost of capital. The NPV is a
direct measure of the value a project creates for a company’s
shareholders. Thus, an investment decision rule states that
an investment should be undertaken if its NPV is positive,
but not undertaken if it is negative.
Internal rate of return The discount rate that makes NPV equal to 0 or the discount
(IRR) rate that makes the present value of investment costs equal
to the present value of the benefits of the investments.
The IRR rule is an investment decision rule that accepts
projects or investments from which the IRR is greater than
the opportunity cost of capital.
38
Read
Read par. 11.7.6 in the prescribed book and the examples given to understand how a
business can use specific techniques to decide which project to accept.
Study
Study the section “Process mechanisms (enablers)”, par. 11.7 in chapter 11 of the prescribed
book.
which can be used by a business to measure expected outcomes for mutually exclusive
and non-mutually exclusive events.
y Sensitivity analysis
A business can use the sensitivity analysis method to assess how sensitive the project
181
outcomes are to changes in the business. The method uses one variable and examines
the effect of that specific variable on the project.
y Scenario analysis
Scenario analysis is a valuable decision-making method for focusing on the consequences
182
of the combinations of events that the business would have ignored – for instance, an
event that has never happened or is very unlikely to happen. The business can draw up
different views (optimistic and pessimistic scenarios) of an event to get a feel for the “up-
side” potential and “downside” risk that could be associated with a project.
y Simulation
Simulation is a method used to analyse financial or time models in instances where the
183
variables, for example, costs, duration, opportunities or risks, may be uncertain. Simula-
tion can be used only when a business has statistical software or commercially available
spreadsheets.
fied by distribution functions and is a more modern technology method than the Monte
Carlo simulation method.
39 RSK2601/1
y Probability distributions defined from expert opinion
Some risk analysis models involve subjective estimates, and so the business needs to
186
Study
Study the section “Process activities”, par. 11.8 in chapter 11 of the prescribed book.
SUMMARY (STAGE 4)
The risk evaluation stage is essential, as it helps the business to understand the combined
187
effect of a group of risks and opportunities. This stage will assist the business in its decision-
making process. Risk evaluation is the only option available to the business for assessing its
exposure to risks and opportunities, and it must be properly implemented. This brings us
to Stage 5: Risk treatment.
strategic responses to the risks and opportunities that it identifies to secure business objec-
tives. This stage is vital in the risk management process because the risk strategy responses
and action plan must be prepared and implemented effectively in the business. Refer to pars.
12.1 to 12.3 in the prescribed book.
Read
Read the section “Process inputs and outputs”, pars. 12.4–12.5 in the prescribed book.
The process inputs in the risk treatment process will be the risk register, industry betas, a de-
189
scription of the business risk appetite, and details of existing insurance policies. The process
outputs will be the risk response (i.e. remove, reduce or transfer) actions.
Refer to par. 12.6 in the prescribed book for information about all the factors that can influ-
190
process.
y Resolution strategy
The resolution strategy is a technique used by a business to respond to a particular recur-
192
ring risk.
40
4.4.2 Process activities for Stage 5: Risk treatment
The process activities in the risk treatment stage assist in transforming the prioritised list
194
of risks in the business into a concrete plan of action for risk resolution. It is essential to un-
derstand the activities that need to be implemented to design an effective risk action plan.
Study
Study the section “Process activities”, par. 12.8 in Chapter 12 of the prescribed book.
the amount of risk a business is prepared to tolerate (be exposed to) at any particular time. A
business’s risk appetite can vary according to its objectives, culture, environment, perceived
financial exposure to certain risks and risk attitudes (risk-neutral, risk-seeking or risk-averse).
A business needs to determine its risk appetite/tolerance and inform its senior managers
about the business risk culture in which it operates. Senior managers must assist the board
in implementing decisions about projects within business risk tolerance levels.
Study
Study the section “Risk appetite”, par. 12.9 in chapter 12 of the prescribed book.
seen as risk diversification (reduction of risks by distribution), for example, where a busi-
ness invests in multiple stocks to reduce risk and the impact of the risk. Two approaches
to reducing risk can be followed, namely:
– reducing the likelihood of a risk occurring, and
– limiting the loss should risk materialise.
Methods that a business can use to reduce the likelihood of occurrence or the impact of
198
y Risk removal
Risk removal can also be referred to as avoidance, elimination, exclusion or termination.
199
Risk removal is used to eliminate a risk when a negative outcome/impact or high-risk ex-
posure is anticipated. For example, doing business with a country experiencing political
uncertainty may be too risky to make the opportunity worthwhile, so the company will
eliminate the potential for loss by not doing business with that country. When a business
wants to remove risk, factors such as opportunity, business objectives, and costs must be
considered. All three of these concepts must be taken into account. This would happen,
for example, when a business decides either not to introduce a new product or else to
end the production of an existing product and ceases operations carried out in the past.
41 RSK2601/1
y Risk reassignment or transfer
Risk reassignment is the strategy used to transfer risk to another entity, business or organi-
200
sation. Businesses can use contracts and financial agreements to transfer risk to a third
party. Risk transfer does not reduce the severity of the risk, it just removes it to another
party. In some cases transfer can significantly increase the impact of the risk, in instances
where the party to whom it is being transferred is unaware that it is being required to
absorb it. The most common method of risk transfer is insurance, as in that case the finan-
cial consequences of the loss are transferred to the insurance company. When a business
transfers risk, it must consider the parties’ objectives, the ability to manage the risk, risk
context and the cost-effectiveness of the transfer.
y Risk-retention
Risk-retention is also referred to as acceptance, absorption or tolerance. A business may
201
find itself in a position where the only option is to accept the risk – for example, risk re-
moval, reduction and transfer are not available as options, or alternatively it may be more
economical for the business to accept the risk. If the risk-retention strategy is adopted, the
options available, timing and the ability to absorb the risk must be considered.
Study
Study the section “Risk response strategies”, par. 12.10 in chapter 12 of the prescribed book.
SUMMARY (STAGE 5)
The business environment is forever changing. A business must therefore have adequate risk
202
response strategies in place to manage the risks within reasonable limits. The next stage that
we will be discussing is Stage 6: Monitoring and review.
sary for a business to review all the previous stages in the risk management process because
new information has become available or circumstances in the business have changed. The
monitoring and review stage must be carried out to increase the success of the implementa-
tion of the entire ERM process. Refer to pars. 13.1 to 13.3 in the prescribed book.
Read
Read the sections “Process inputs” and “Process outputs”, pars. 13.4–13.5 in the prescribed
book.
The process input in the risk monitoring and review stages will be the risk register, which
204
allows the business to go back to and review all the risks in the register. The process out-
puts will be regular updates of the risk register and reports on the effectiveness of the risk
response actions.
Refer to par. 13.6 in the prescribed book, which deals with all the factors that can influence
205
42
4.5.1 Process mechanisms for Stage 6: Monitoring and review
Two primary mechanisms can be used during this stage, namely meeting agendas and pro-
206
that are necessary to ensure that this stage is managed proactively. These process activities
make it possible to execute responses, monitor effectiveness and then intervene to imple-
ment corrective action. The following activities need to be conducted:
y Executing
The business needs to carry out all the actions planned in the risk treatment stage to
208
y Monitoring
When executing action plans, it is vital to monitor progress to differentiate the movement
209
in risk exposure. Monitoring is the collection of information about the risk for later use.
The monitoring process must identify the successes achieved in the planned responses
to the risks and opportunities and identify the changes in the business environment,
which might lead to new emerging risks. Thus, the monitoring and review processes
implemented by the business can improve business knowledge on the lessons learnt to
improve the future ERM process.
y Controlling
The controlling process is based on the information gathered during the monitoring pro-
210
cess to inform decision-making. It means that the business must understand who needs
what information, for what purpose and when. In order for a manager to have control,
the control activities must adhere to the following seven specifications:
– Control is a principle of the economy.
– Controls must be meaningful.
– Controls have to be appropriate to the character and nature of the phenomenon
measured.
– Measurements have to be congruent with the events measured.
– Controls have to be timely.
– Controls need to be simple.
– Controls must be operational.
Study
Study the section “Process activities”, par. 13.8 in chapter 13 of the prescribed book.
SUMMARY (STAGE 6)
Stage 6 will assist a business in managing the implementation of responses to identified
211
risks and opportunities proactively. A business needs to monitor and control the identified
risk response strategies effectively. The risk response strategies must be simple, and the
employees responsible for carrying them out must understand them. In the next section
we will discuss the last stage in the ERM process.
43 RSK2601/1
4.6 COMMUNICATION AND CONSULTATION: STAGE 7
The risk communication and consultation stage will be used across all the other ERM process
212
stages. A business needs to understand how effectively the process outputs of each stage
are communicated and understood by decision-makers. Refer to pars. 14.1 to 14.3 in the
prescribed book.
Read
Read the sections “Process inputs” and “Process outputs”, pars. 14.4–14.5 in the prescribed
book.
The process inputs in the risk communication and consultation process are the risk register,
213
risk responses, response progress, early warning indicators and key performance indicators
(KPIs). The process outputs will be the risk reports, press releases, internal e-mails, company
internet site, internal newsletters and posters. Refer to par. 14.6 of the prescribed book for
information about all the factors that can influence or limit the risk communication and
consultation process.
Read
Read par. 14.7 in the prescribed book.
are necessary to ensure that the overall risk management process is effective. Refer to par.
14.8 in the prescribed book.
process effectively in order to be able to deliver open and honest information on the risks
faced in the business and how the business responds to these risks. Refer to par. 14.10 in the
prescribed book for information about the various processes to implement.
44
Study
Study the sections “Internal communication” and “External communication”, pars. 14.9–
14.10 in chapter 14 of the prescribed book.
indicators (KPIs).
y KRIs
KRIs refer to captured information that provides valuable insight into underlying risk pro-
219
files at various levels to assist decision-makers within a business. The four types of KRIs are:
– Inherent or exposure risk indicators
– Control risk indicators
– Composite indicators
– Model risk factors
y KPIs
KPIs are high-level snapshots of the health and performance of a business based on spe-
220
cific predefined measures, for example, statistical information on the business. The seven
types of KPIs are:
– Statutory KPIs, such as GAAP8 or legal or regulatory requirements
– Profitability per business unit/product/customer
– Exception reporting
– Employee performance, such as assets under management or profit per customer
– Competitiveness, such as market share
– Cost management, such as return on assets (ROA) on IT or new delivery channel
monitoring
– Credit management, such as time to settlement or credit exposure
Activity 4.1
Read the additional information about the four KRIs and the KPIs under Additional Re-
sources on myUnisa. You will not be tested on this document.
SUMMARY (STAGE 7)
Risk communication and consultation form a link with all the other stages in the ERM pro-
221
cess. The business risk management process must be communicated effectively to all levels
of employees in the business. This step is vitally important because all employees may be
involved in an activity that could directly influence the ERM process. If the employee does
not understand the risk management culture in which the business functions, this could
have disastrous consequences.
45 RSK2601/1
Activity 4.2
Watch the Lego video on myUnisa, and in the discussion forum discuss with your fellow
students how Lego is using ERM in their organisation. Compare their ERM process with
what you have learnt in this lesson.
4Self-assessment
SUMMARY
In topic 2 we discussed the seven stages in the ERM process, namely: establishing the con-
222
text, risk identification, risk analysis, risk evaluation, risk treatment, monitoring and review,
and communication and consultation. All the stages are interrelated and must be imple-
mented effectively and communicated within the business if the business is to manage its
risks and opportunities. The next topic will deal with the impact of internal influences – micro
factors – on business.
223
46
TOPIC 3
INTERNAL INFLUENCES – MICRO FACTORS
Topic content
Aim
At the end of this topic, you will be able to discuss how internal influences can impact a
business’s performance.
Learning outcomes
OVERVIEW
This topic covers financial risk management, operational risk management, technological risk
224
management, project risk management, business ethics management, and health and safety
management. Micro risk factors are primarily generated internally, and so can be controlled
by the business itself. See Figure 6 on the next page.
47 RSK2601/1
225
Does the business for which you work or for which you would like to work identify specific risks
226
within each primary internal risk class? Does the business consider all of the above micro factors?
Activity
Access the Risk Glossary document on myUnisa under Additional Resources and consult
the definitions of financial, operational, technological, project, business ethics, health,
and safety risks, which you will find in all the official South African languages. Write down
your own understanding of these types of risks and discuss this with fellow students on
the discussion forum.
227
48
LESSON 5
FINANCIAL RISK MANAGEMENT
Contents
Aim
Key concepts
Learning outcomes
Learning material
Self-assessment
Summary
Aim
At the end of this lesson, you will be able to identify and discuss the seven most significant
financial risks faced by organisations.
Key concepts
• Financial risk
• Liquidity risk
• Credit risk
• Currency risk
• Funding risk
• Foreign investment risk
• Derivatives
Learning outcomes
LEARNING MATERIAL
228 Lesson 5 is based on chapter 15 of the prescribed book.
49 RSK2601/1
5.1 INTRODUCTION
Chapter 15 of the prescribed book examines the first of the six internal processes of ERM,
229
which is financial risk management. Financial risk is the exposure of an enterprise to adverse
events that erode profitability and, in extreme situations, result in business collapse. Financial
sources of risk can be fatal in that they can bring about the downfall of a business, and they
therefore require a comprehensive management strategy. Through sound financial manage-
ment, businesses can evaluate business strategies appropriate to their risk appetite, market
and exposure profile (Chapman, 2013). This lesson focuses on the seven most significant
financial risks any business faces.
Study
Study the sections “The definition of financial risk” and “Scope of financial risk”, pars.
15.1–15.2 in chapter 15 of the prescribed book.
Study
Study the section “Benefits of financial risk management”, par. 15.3 in chapter 15 of the
prescribed book.
50
y Carrying out comprehensive due diligence on counterparties whose default could seriously
harm the business;
y Monitoring predicted changes in interest rates, and;
y Carrying out a robust assessment of planned investments using tried and tested techniques.
Study
Study the section “Implementation of financial risk management”, par. 15.4 in chapter
15 of the prescribed book.
its obligations as they fall due either by increasing liabilities or converting assets into money
without loss.
Read
Read the section “Liquidity risk”, par. 15.5 in the prescribed book.
ratio is a liquidity indicator that further refines the current ratio by measuring the amount of
the current liquid assets available to cover current liabilities. The quick ratio is more conserva-
tive than the current ratio because it excludes inventory and other current assets, which are
more difficult to turn into cash. Therefore, a higher ratio means a better liquid current position.
under a contract. Default by a small number of large customers could lead to insolvency. The
three main components of credit risk include default, exposure and recovery.
y Default risk is the probability of default.
y Exposure risk relates to the uncertainty surrounding the payment of future amounts.
y Recovery risk relates to uncertainty regarding the possible recovery.
y Credit insurance is a mitigation action for credit risk.
y Counterparty risk is the risk to each party to a contract that the counterparty will not live
up to its contractual obligations. If A is the counterparty to B and B is the counterparty to
A, both are exposed to this risk. For example, if Tshepiso agrees to lend funds to Tebogo
up to a certain amount, there is an expectation that Tshepiso will provide the cash, and
Tebogo will pay those funds back. There is still the counterparty risk assumed by them
51 RSK2601/1
both. Tebogo might default on the loan and not pay Tshepiso back, or Tshepiso might
stop providing the agreed-upon funds.
y Due diligence generally refers to the care a reasonable person should take before
entering into an agreement or a transaction with another party. A business considering
an undertaking such as entering into a significant contract, committing to a joint venture,
acquiring a business or lending money to a third party will need to undertake due diligence
as part of the evaluation process.
Read
Read the section “Credit insurance”, par. 15.6.4 in the prescribed book.
Study
Study the section “Credit risk”, par. 15.6 (excluding par. 15.6.4) in chapter 15 of the prescribed
book.
5.7 BORROWING
According to Chapman (2013), when a company borrows money, it needs to know the basis
237
of interest rate determination, the interest rate at commencement of the borrowing, the
nature of interest rate (fixed or variable), and the duration of payment. The rate of interest
paid depends on the following:
y Amount
y Term
y Forecasts
y Inflation
y Risk
y Opportunity cost
y Market
Read
ties abroad. Examples of foreign investment risks include country risk and environmental risk.
52
Read
Read the section “Foreign investment risk”, par. 15.10 in chapter 15 of the prescribed book.
5.10 DERIVATIVES
Derivatives are financial products derived from some other existing product. Examples in-
240
clude options, futures and swaps. Derivates are available to cover many types of exposure,
including interest rates; foreign currency exchange rates; commodities, such as energy (oil or
gas), bullion (e.g. gold and silver), base metals (copper and nickel) and agriculture (e.g. sugar);
and equities. Derivatives can be either exchange-traded or over the counter.
Study
Study the section “Derivatives”, par. 15.11 in chapter 15 of the prescribed book.
5Self-assessment
(1) With the aid of examples, discuss the financial risks faced by South African Airways (SAA).
What are the benefits to SAA of implementing financial risk management?
(2) Discuss the factors that determine the development of a sound system of financial
management by SAA.
(3) Discuss the three main components of credit risk.
(4) Define liquidity risk and discuss why it is essential in financial risk management.
(5) With reference to Box 15.1 in the prescribed book, calculate the quick ratio.
SUMMARY
The purpose of Lesson 5 was to examine various aspects of financial risk, which have to be
241
managed to maintain business continuity. The financial risks covered were liquidity risk, credit
risk, interest risk, foreign currency risk, foreign investment risk and derivatives. The business
case for operational risk is discussed in the next lesson.
242
53 RSK2601/1
LESSON 6
OPERATIONAL RISK MANAGEMENT
Contents
Aim
Key concepts
Learning outcomes
Learning material
Self-assessment
Summary
Aim
At the end of this lesson, you will be able to point out the elements, attributes and features
of operational risk and describe an appropriate response strategy in the context of ERM.
Key concept
Operational risk
People risk
Risk management culture
External events
Outsourcing
Mitigation
Learning outcomes
LEARNING MATERIAL
Lesson 6 is based on chapter 16 of the prescribed book.
243
54
6.1 INTRODUCTION
This chapter examines the second of the internal processes, namely operational risk man-
244
agement. Operational risk is the exposure of an enterprise to losses resulting from people,
processes, systems and external events. Operational risk is present in all organisations and can
affect a firm’s solvency, the fair treatment of its clients and the incidence of financial crime.
Read
to failures of people, processes, technology and external dependencies”. The sources of risk
considered to be embraced within operational risk include business risk, crime risk, disaster
risk, information technology risk, legal risk, regulatory risk, reputational risk, systems risk and
outsourcing. Refer to par 16.1 of the prescribed book for more details.
Study
Study the sections “Benefits of operational risk” and “Implementation of operational risk”,
pars. 16.3–16.4 in chapter 16 of the prescribed book.
6.4 STRATEGY
The business strategy is the overall approach to achieving business objectives. According to
247
Chapman (2013), adopting the wrong business strategy, failing to execute a well-thought-out
strategy and not modifying a successful strategy over time are examples of operational risk.
Study
55 RSK2601/1
6.5 PEOPLE
There is always a human factor to consider in undertaking any business activity. The knowl-
248
edge, experience, capability and reliability of the persons involved in all business processes
are critical risk factors. People risk continues to be the significant contributing factor in many
dramatic failures. Despite the difficulties of measuring this kind of risk, it needs to be targeted
in any programme aimed at improving risk management. Therefore, people risk may be
defined as a combination of the detrimental impact of employee behaviour and employer
behaviour. The following are examples of people risk:
y Absenteeism rates
y Labour turnover
y Accident rates
y Productivity
y Quality of finished goods
y Customer satisfaction
Study
Study the section “People” and Figure 16.3: Taxonomy of people risk in chapter 16 of the
prescribed book.
Study
Study Figure 16.5: Taxonomy of processes and systems risk in chapter 16 of the prescribed
book.
ment or the establishment of contingency events to cope with events such as natural disasters.
6.8 OUTSOURCING
To reduce operational costs and become more competitive, modern organisations have de-
251
signed and implemented numbers of key strategies. One of these is outsourcing. Outsourc-
ing offers multiple benefits, the most important being reduced costs, reorganisation of the
staff structure, increased level of working capital, improved quality of products and services
and reduced level of business risk. It also eliminates a degree of conflict with workers and
reduces some wasteful activities.
56
6.9 MEASUREMENT
It is necessary to measure the impact of those issues likely to have the greatest detrimental
252
effect on the operation of the business. Measurement enables businesses to set aside money
to cope with adverse events and to know the extent of insurance required.
6.10 MITIGATION
253 The success of mitigation depends on a number of different factors.
Study
6Self-assessment
SUMMARY
In Lesson 6 we considered the elements of operational risk, namely strategy, people, pro-
254
cesses and systems, external events, and outsourcing. Operational risk is present in many
different forms, and minor problems can quickly escalate into significant losses if they are
not prevented at the source. Businesses must establish a series of systems and controls to
manage people risks. Processes and systems are a significant area of operational risk, includ-
ing such areas as business continuity, transaction risk, IT and information security. External
events such as flooding, power failure, and terrorism can all disrupt a business. In the next
lesson we will consider technological risk management.
57 RSK2601/1
LESSON 7
TECHNOLOGICAL RISK MANAGEMENT
Contents
Aim
Key concepts
Learning outcomes
Learning material
Self-assessment
Summary
Aim
At the end of this lesson, you will be able to discuss technology risk management, and
identify the primary types of technology of interest to organisations, sources of risk and
possible responses.
Key concepts
Technology risk
Communications technology
Information technology (IT) governance
Broadband
Electronic (E)-commerce
Control technology.
Learning outcomes
LEARNING MATERIAL
255 Lesson 7 is based on chapter 17 of the prescribed book.
58
7.1 INTRODUCTION
Chapter 17 of the prescribed book examines the third of the internal processes, namely
256
technological risk. The main technologies today are information, communication and con-
trols. These technologies have the potential to raise productivity, lower costs and drive the
growth of organisations. Therefore, changes in technology can be both an opportunity and
a threat in terms of market share and market development. Although there is a wide range
of technologies, the common ones considered critical to business and discussed in this
chapter are information, communication and control. The chapter deals with the definition
of technology risk management, the primary types of technologies essential to business,
sources of risk and possible responses.
Study
Read
Read the section “Definition and scope of technology risk as a marketing tool” in chapter
17 of the prescribed book.
Study
Study the section “Benefits of technology risk management”, par. 17.3 in the prescribed book.
plementation depends on whether attention is paid to a number of issues. These issues are
discussed in the prescribed book.
Study
59 RSK2601/1
7.5 PRIMARY TECHNOLOGY TYPES
As pointed out in the introduction, risk management can be helpful for identifying opportu-
259
nities for the improvement of processes. Labour-intensive and complicated processes have
a greater potential for error than streamlined and simplified processes.
means. There are various types of IT tools, which include the following:
y Software applications
y Management information systems
y Intranets
y Telematics
y Information assets
the following:
y Computer-aided design (CAD)
y Computer-aided manufacture (CAM)
60
y Flexible manufacturing systems (FMSs)
y Mechatronics
y Computer-integrated manufacture (CIM)
y Manufacturing resource planning (MRP)
y Operational research (OR)
Study
Study the section “Primary technology types”, par. 17.5 in chapter 17 of the prescribed book.
7Self-assessment
(1) Define technology risk and discuss the possible sources of this kind of risk.
(2) Giving examples, discuss the various types of IT tools used by SAA in its endeavour to
manage technology risk.
(3) Discuss the risks associated with the use of e-mails in an organisation.
(4) Giving examples, discuss how an organisation like SAA responds to technology risk.
SUMMARY
In Lesson 7 we examined three primary technology types, namely information, communica-
264
tions and control technologies. The next lesson deals with project risk management.
61 RSK2601/1
LESSON 8
PROJECT RISK MANAGEMENT
Contents
Aim
Key concepts
Learning outcomes
Learning material
Self-assessment
Summary
Aim
At the end of this lesson, you will be able to discuss project risk management and the
difficulties encountered in embedding risk management within a project.
Key concepts
Learning outcomes
LEARNING MATERIAL
Lesson 8 is based on chapter 18 of the prescribed book.
265
62
8.1 INTRODUCTION
In Lesson 8 we examine the fourth of the internal processes, namely project risk management
266
Read
project risk, and they are situated in the external business environment, the industry within
which an organisation operates, the sponsor’s organisation and the project itself.
Read
Read the section “Sources of project risk”, par. 18.3 in chapter 18 of the prescribed book.
will find a discussion of these benefits in the prescribed book – consult par. 18.4.
intensive and complicated processes have greater potential for error than streamlined and
simplified processes. Common difficulties in implementing PRM include the following:
y Lack of clearly defined and disseminated risk management objectives
63 RSK2601/1
y Lack of senior executive and project director commitment and support
y Lack of a risk maturity model
y Lack of a change process to introduce PRM
y No common risk language (terms and definitions)
y Lack of articulation of the project sponsor’s risk appetite
y No definition of roles and responsibilities
y Lack of risk management awareness training to build core competencies
y Lack of integration of risk management with other project disciplines
y The reluctance of project personnel to spend time on risk management
y Risk owners not automatically taking responsibility for assigned risks
y No clear demonstration of how risk management adds value and contributes to project
performance
y Overcomplicated implementation on the basis of an unclear risk policy, strategy, framework,
plan and procedure
y No alignment between the business strategy, the business model and the risk management
objectives
y No integration of risk management activities into the day-to-day activities of project
managers
Study
Study the section “Embedding project risk management”, par. 18.5 in chapter 18 of the
prescribed book.
to deliver a project. The process includes establishing the context, risk identification, analysis,
evaluation, treatment, monitoring and review, and communication and consultation.
Once a project has been approved and has commenced, progress should be checked against
273
the project’s business case to ascertain whether the project is still viable and planned benefits
are still realisable.
64
8.6.2 Risk identification
Risk identification is the process of determining which risks may affect the project and es-
274
opportunities.
otherwise of the planned responses. It entails evaluating the perceived benefit of the response,
its attendant costs and the likelihood of new risks triggered by the response. If a decision is
taken to implement the response, there must be clarity on who will do so and when.
management process. The communication and consultation process activities are the tasks
undertaken in striving to ensure that the risk management process is effective. Refer to par.
18.6.7 in the prescribed book for details of the activities involved.
Study
Study the section “Project risk management process”, par. 18.6 in chapter 18 of the
prescribed book.
stated objectives. Refer to par. 18.8 in the prescribed book for details of the project director’s role.
65 RSK2601/1
8.8 THE PROJECT TEAM AND THE CHALLENGES THEY FACE
The composition of the project team and its performance will have a fundamental impact
281
282 You will find these discussed in par. 18.9.1 in the prescribed book.
Study
Study the section “Techniques used to support project risk management”, par. 18.12 in
chapter 18 of the prescribed book.
8Self-assessment
SUMMARY
In Lesson 8 we covered the definition of project risk management and outlined the po-
tential sources of risk and the benefits and challenges associated with implementing PRM.
We examined the risk management process associated with running a project and issues
related to the project team. A significant source of risk is the project team itself, which is
why it was included as a topic of discussion. We ended the lesson by considering tech-
niques and software tools that enhance the implementation of PRM. In the next lesson we
will turn our attention to business ethics management.
66
LESSON 9
BUSINESS ETHICS MANAGEMENT
Contents
Aim
Key concepts
Learning outcomes
Learning material
Self-assessment
Summary
Aim
At the end of this lesson, you will be able to identify and discuss the key aspects of busi-
ness ethics to contribute to the broader risk management context.
Key concepts
Learning outcomes
LEARNING MATERIAL
283 Lesson 9 is based on chapter 19 of the prescribed book.
67 RSK2601/1
9.1 INTRODUCTION
Ethics is inextricably linked with reputation, and a breach of ethics commonly leads to one or
284
more of the following: reduced share price, reduced profitability, unfavourable media cover-
age, fines, additional administration and, in some extreme cases, imprisonment. As with other
aspects of risk management, the management of risks associated with ethical conduct will
determine its performance, position and prolonged existence. This lesson, therefore, explores
the critical aspects of business ethics to aid all-inclusive risk management.
Read
morality. Morality is behavioural conduct that relates to intentions, decisions and actions
involving choices between good and evil and right and wrong. Business ethics, therefore,
refers to moral rules and regulations governing the business world. Ethical risk refers to
exposure to events resulting in criminal prosecution, civil lawsuits or erosion of reputation.
Examples of ethical risk include bribery, false accounting, child labour, tax evasion, money
laundering and invasion of privacy.
Study
Study the sections “Definition of business ethical risk” and “Scope of business ethical
risk”, pars. 19.1–19.2 in chapter 19 of the prescribed book.
Read
Read the section “Benefits of ethical risk management”, par. 19.3 in the prescribed book.
carefulness, openness, respect for intellectual property and confidentiality. Refer to par.
19.6, “Factors that affect business ethics”, in chapter 19 of the prescribed book. Examples of
unethical practices by companies and other entities that have been prosecuted or suffered
reputational damage because of the behaviour of employees and that have attracted nega-
tive media attention include the following:
68
y Bribery in the private sector
y Money laundering
y Improper sales and marketing
y Inadequate financial accounting
y Bribery of government contracting officers
y Inadequate internal controls
y Failure to follow quality standards and procedures
y Environmental irresponsibility
y Employee claims of sexual harassment
y Blacklisting of international, national or local organisations
y Insider trading
y The exploitation of developing countries
y Health and safety irresponsibility
y Invasion of privacy
These four primary orientations are not mutually exclusive. However, the degree of application
289
of these focus areas is based on four orientation levels, namely compliance, risk management,
reputation enhancement and benefit. For an organisation to be truly responsible, it must
fully embrace all four levels of identity.
Figure 19.3, on page 369 of the prescribed book. The components are as follows:
y Vision
y Context
y Establish
y Implement
y Monitor
y Respond
y Evaluate
Study
Study the section “The system”, par. 19.8.3 in chapter 19 of the prescribed book.
69 RSK2601/1
9Self-assessment
(1) Identify and discuss the sources of ethical risk in an academic institution such as Unisa.
(2) Define business ethics management and discuss the benefits of implementing ethical
risk management in an organisation.
(3) List and discuss the reasons for the emergence of unethical behaviour in an organisation.
SUMMARY
Lesson 9 examined the definition and scope of business ethics and the benefits of ethical
291
risk management. A breach of ethics, depending on its severity, can erode reputation and
share price and lead to lost opportunities. A risk management strategy for business might
involve designing and implementing a business ethics programme that meets emerging
global standards. The focus of the next lesson is health and safety management.
70
LESSON 10
HEALTH AND SAFETY MANAGEMENT
Contents
Aim
Key concepts
Learning outcomes
Learning material
Self-assessment
Summary
Aim
At the end of this lesson, you will be able to discuss health and safety as part of ERM.
Key concepts
Learning outcomes
LEARNING MATERIAL
Lesson 10 is based on chapter 20 of the prescribed book.
292
71 RSK2601/1
10.1 INTRODUCTION
Health and safety are no longer seen as peripheral, as enterprises recognise that losses
293
may result from non-compliance with rules and regulations relating to health and safety in
organisations. This lesson covers the definition and scope of health and safety risk, and the
benefits and implementation of health and safety risk management.
Read
Read the sections “Definition of health and safety risk” and “Scope of health and safety
risk”, pars. 20.1 and 20.2 in chapter 20 of the prescribed book.
and safety risk management system is good business management and improves bottom-
line profitability.
Study
Study the section “Benefits of health and safety risk management”, par. 20.3 in the
prescribed book.
Study
Study all the sections dealing with the implementation of health and safety risk
management, par. 20.6 in the prescribed book.
72
10.5 CONTRIBUTION OF HUMAN ERROR TO MAJOR DISASTERS
Read
Read the section “Contribution of human error to major disasters”, par. 20.8 in the pre-
scribed book.
the following:
y Reward schemes
y Job satisfaction
y Appraisal schemes
y Selection
y Training
y Human reliability analysis
agement system, policy, and procedures to provide safe work systems. Refer to par. 20.10 in
the prescribed book for details of the principal risk mitigation factors.
Study
Study the sections “Improving human reliability in the workplace” and “Risk management
best practice”, pars. 20.9–20.10 in chapter 20 of the prescribed book.
10Self-assessment
(1) Discuss the benefits of implementing a health and safety risk management system in
a business.
(2) Discuss how companies can improve human reliability in the workplace.
(3) With the aid of a diagram and examples, discuss the components of a health and safety
management system that can be implemented in a business such as South African
Airways (SAA).
SUMMARY
In Lesson 10 we explored the definition and scope of health and safety risk and the benefits
298
of safety risk management. Businesses are expected to have a moral obligation to imple-
ment a health and safety environment legally enforceable by minimum standards of health
and safety practice. The next topic relates to the effect of external influences on businesses.
Individual businesses have no control over external macro factors.
73 RSK2601/1
Activity 10.1
Access the LibGuide on myUnisa, download the latest IRMSA risk report, and identify the
internal risks faced by organisations in South Africa today. Discuss these with your fellow
students on the discussion forum.
299
74
TOPIC 4
EXTERNAL INFLUENCES – MACRO FACTORS
Topic content
Aim
At the end of this topic, you will be able to explain how external macro influences will
affect businesses. You will also be able to identify the macro factors included in the
economy, the environment, the legal framework, political structure, social factors, and
market conditions.
Learning outcomes
At the end of this topic, you will be able to discuss the six external influences (the macro
factors, namely: economic, environmental, legal, political, market and social risks) and
how they can have an impact on a business.
OVERVIEW
In this topic, we will discuss how external macro factors affect businesses. These external
300
influences occur at both national and international levels, and businesses have no control over
them. Macro factors include the state of the economy, the environment, the legal framework,
political structure, market conditions and social factors. They are shown in Figure 8 below.
A study of these factors allows you to develop an appreciation of how a business is subject
to external constraints and exposed to opportunities.
301
75 RSK2601/1
FIGURE 8: External influences – macro factors
Does the organisation for which you work or for which you would like to work identify spe-
302
cific risks within each primary external risk class? Does an organisation take all of the above
macro factors into consideration?
Activity
Access the Risk Glossary document on myUnisa under Additional Resources and refer to
the definitions of economic, environmental, legal, political, market and social risks, which
you will find in all the official South African languages. Write down your own understand-
ing of these types of risks and discuss this with fellow students on the discussion forum.
76
LESSON 11
ERM – EXTERNAL FACTORS
Contents
Aim
Key concepts
Learning outcomes
Learning material
Self-assessment
Summary
Aim
At the end of this lesson, you will be able to discuss the six external influences (macro fac-
tors) that may have a national or international impact on a business.
Key concepts
Economic risk
Interest rate risk
Energy sources
Sustainability
Intellectual property
Political risk
Social risk
Learning outcomes
LEARNING MATERIAL
Lesson 11 deals with chapters 21 to 26 of the prescribed book, and in it we will discuss the
303
77 RSK2601/1
11.1 ECONOMIC RISK
The first of the six macro factors that affect the business-operating environment is economic
304
risk. Chapman (2013) defines economic risk as the influence of national macroeconomics
on individual business performance. Government policy affects national macroeconomics
through the manipulation of aggregate demand and consumer spending. However, busi-
nesses have no control over national influence on aggregate demand. Refer to par. 21.1 in
the prescribed book for the complete definition of economic risk.
of factors, namely:
y An understanding of the drivers and consequences of inflation
y An understanding of the impact of changes in foreign exchange rates on the demand curve
y Tracking planned government spending
y An understanding of government fiscal and monetary policies
y An understanding of the taxation regime
Study
Consumers have resources (income, assets, time and energy) with which to satisfy their wants.
However, the limitation of these resources forces consumers to make choices. Given a set of
prices, each household will make choices that in aggregate affect those prices.
78
y Macroeconomics
Macroeconomics studies the total degree of deployment of each of the significant factors of
309
production, the total volume of output produced and income earned in the whole economy,
the average level of prices in all product markets, and the growth of the economy’s total
output. The three most important concepts are output, income and expenditure. They
are the leading indicators of a nation’s economic performance. The most critical empirical
measure of these variables is called the gross domestic product (GDP). GDP is the value
of total output produced in the whole economy over a particular period.
Read
Read sections 21.5 and 21.6, “Micro and Macroeconomics” in chapter 21 of the prescribed
book.
y Government policy
Macroeconomic policy is influenced by government policy through fiscal policy, monetary
310
policy and competing theories. Fiscal policy aims to influence government revenue (taxa-
tion) and/or expenditure. Governments thus use macroeconomic policy to influence the
level of aggregate demand and supply in the economy. Monetary policy is the attempt by
the government or the central bank (in South Africa the SA Reserve Bank) to manipulate
the money supply, the supply of credit, interest rates and other monetary variables to
achieve the fulfilment of policy goals.
y Aggregate demand
Aggregate demand denotes the spending on goods and services produced in an economy.
311
y Aggregate supply
Aggregate supply (AS) is the total output of the economy at a given price level at a given
312
y Inflation
Inflation is defined as a sustained general rise in prices. Creeping inflation is the term we
313
use to refer to a situation where prices rise a few cents on average each year. Hyperinflation
79 RSK2601/1
is the term describing a situation where inflation levels are very high. Inflation is believed
to cause unemployment and lower economic growth.
bringing about changes in the exchange rate, discretionary expenditure, savings and
borrowing.
y House prices
House sales are often treated as an economic barometer. Such expenditures are both
315
large and variable, and they exert a significant impact on the economy. Interest rates are
a large part of total mortgage payments. Small changes in interest rates cause a relatively
significant change in annual mortgage payments. Changes in interest rates can have an
enormous effect on the demand for new housing.
goods for export, businesses need to understand the mechanisms of international trade
and protectionism imposed by governments.
• Methods of protection
– Tariff – tax imposed on imported commodities
– Import quotas – limitation on the commodities that may be shipped into the country
– Domestic policies that reduce the demand for imported commodities
• Trade policy – a government may choose to impose or tighten currency controls.
y Currency risk
Currency risk is the risk that the expected cash flow from overseas investments will be
317
adversely affected by fluctuations in exchange rates. There are two types of foreign ex-
change risk, namely accounting or translation exposure and economic exposure. There
are various ways in which hedging9 can be done, namely netting, leading and lagging,
forward market hedging, fuel market hedging, currency futures, currency hedging and
money market risk.
Read
Read the section “Currency risk”, par. 21.15 of the prescribed book.
modify aggregate demand and supply to achieve a government’s objectives of full employ-
ment, low inflation, stable balance of payments, and economic growth. Other economic risk
issues dealt with are interest rate, house prices, international trade and currency risk, all of
which influence ERM. In the next section we talk about environmental risk.
80
11.2 ENVIRONMENTAL RISK
Environmental risk is the actual or potential threat of adverse effects on living organisms
320
and the environment as a result of effluents, emissions, wastes, resource depletion and so
on arising out of a business’s activities.
Read
Read par. 22.3, “Benefits of environmental risk management”, in the prescribed book.
322 Implementation
323 The development of a sound system of risk management depends on the following:
y the risk management system not overly constraining risk-taking, slowing down decision-
making processes or limiting the volume of business undertaken;
y the implementers of the risk management framework being distinct from the managers
of the individual business units;
y risks being managed at an appropriate level in the organisation, and
y the development of a culture that rewards the disclosure of risks where they exist, rather
than encouraging managers to hide them.
of supplies, and the control of emissions. Traditional sources of supply are being depleted
across the world, and so renewable energy sources have to be developed to ensure that
future generations have adequate supplies of energy. Such renewable sources include wind
power, solar power, hydroelectric power, tidal power, geothermal energy and biomass.
11.2.4 Pollution
Businesses risk prosecution for pollution and breaching environmental legislation. Prosecu-
325
81 RSK2601/1
11.2.5 Global warming
Global warming is the rise in the average temperature of the earth’s atmosphere and oceans,
326
which may have severe consequences for life on the planet. Scientists believe that global
warming is caused primarily by increasing concentrations of greenhouse gases produced by
human activities such as the burning of fossil fuels and deforestation. The greenhouse effect
is the “natural” process by which the atmosphere traps some of the sun’s energy.
have been put in place in an effort to reduce the effects of global warming. These initiatives
include the following:
y Earth Summit – the United Nations Framework Convention on Climate Change, 1992
y The Kyoto Protocol, 2004
y Pollution control targets imposed on countries by the Kyoto Protocol
y Sufficiency of emission cuts, in terms of which countries commit themselves to cutting
emissions
y The US Climate Pact, 2005
y The Copenhagen Accord, 2009
y The European Union taking a leading role in governing global action on climate change
y The Cancun Agreements, 2010
y Domestic government response to climate change, in terms of which governments
promulgate legislation on the cutting of carbon emissions
y Levies such as the carbon tax levied on the selling price of new vehicles in South Africa
y Emissions trading, in terms of which countries are allowed to buy and sell their agreed
allowances of greenhouse gas emissions
current energy consumption. The world’s traditional energy sources are being depleted, and
there is a need for the development of renewable energy sources to sustain future genera-
tions. In the next section we will discuss legal risk.
rules, regulations, prescribed policies and ethical standards. This risk also arises when laws
or rules governing certain products or activities of an organisation’s customers are unclear
82
or untested. Non-compliance can expose the organisation to fines, financial penalties, pay-
ment of damages and the voiding of contracts. It could also lead to a diminished reputation,
reduced franchise value, limited business opportunities, restricted developments and an
inability to enforce contracts.
Study
Study the sections “Benefits of legal risk management” and “Implementation of legal risk
management”, pars. 23.3–23.4 in chapter 23 of the prescribed book.
legal system. The primary categories of law are public and private law.
y Public law deals with the relationship between the state and its citizens. The three critical
areas are constitutional law, administrative law and criminal law.
y Private law is concerned primarily with the rights and duties of individuals in relation to
each other.
333 Another significant distinction is drawn between civil and criminal law.
11.3.4 Companies
Legal risk also arises in the formation of companies. There are rules and regulations that com-
334
panies have to abide by, for instance regarding the company name, memorandum of asso-
ciation, articles of association, financing of the company, the issue of shares and debentures,
the official listing of securities, the remedy of rescission, the protection of minority interests
and duties of directors.
83 RSK2601/1
11.3.5 Intellectual property
According to Chapman (2013), intellectual property refers to a product or process that is
335
marketable because of its uniqueness. Patent law usually protects this uniqueness. Patent
law gives protection to technological interventions, while copyright law protects rights in
musical and artistic works and works of literature. The law of trademarks and service marks
protects the use of a particular mark if it is used in trade. The law relating to registered designs
protects mass-produced articles that are distinguished from others by a registered design.
y Patents: The issues covered under patents include application, items that can be patented,
exclusions, registration, and infringement.
y Copyright: The issues covered under copyright include ownership, duration and
infringement.
y Designs: A design right looks at the colouring, shape, texture and/or material associated
with a product.
Study
of the law of contract. Failure to do so can lead to prosecution. Contracts of employment must
be legal. Other aspects covered by the employment contract include terms of remunera-
tion, holiday pay, sick leave and pay, time for antenatal care, maternity leave and dismissal
procedures. Businesses are at risk if employment law is not understood and adhered to. Refer
to par. 23.8 in the prescribed book.
11.3.7 Contracts
The essential elements of a valid contract include legality, agreement, consideration, inten-
337
Study
84
11.3.9 Computer misuse
There are rules and regulations which protect businesses from computer misuse. Computer
341
misuse is now a global problem, with hacking and virus infection being serious causes for
concern. Common forms of computer misuse include:
y Unauthorised access to computer material
y Unauthorised use of the internet to commit or facilitate further offences
y Unauthorised modification of computer material
cise of power by government actors and the actions of non-government groups” (Chapman,
2013:454). This type of risk can be seen in domestic and international markets and is also as-
sociated with cross-border exposure and developing countries. The political environment of
other countries will always have an effect on the threats and opportunities facing a business
wanting to expand its activities beyond the borders of its own country. Refer to par. 24.1 in
the prescribed book for the complete definition of political risk.
Study
Study the section “Micropolitical and macropolitical risks”, par. 24.2 in chapter 24 of the
prescribed book.
85 RSK2601/1
11.4.2 Benefits and implementation of political risk management
Implementing a sound system of political risk management strategies in business will give
344
Study
Study the sections “Benefits of political risk management” and “Implementation of political
risk management”, pars. 24.3–24.4 in chapter 24 of the prescribed book.
when identifying the political risks a business may face. The factors for consideration are:
y Contract risk events
y SA government fiscal policy
y Pressure groups
y Terrorism and blackmail
Read
Read the sections “Contracts”, “UK government fiscal policy”, “Pressure groups”, and “Ter-
rorism and blackmail”, pars. 24.6, 24.8, 24.9 and 24.10. You will be required to list the factors.
Read
Read par. 24.11 in the prescribed book. You will be required to list the response strategies
and tools used to mitigate political risks.
86
SUMMARY (POLITICAL RISK)
In the business ERM process, political risk will be considered as a primary source of risk and
346
opportunity. The degree to which a business wants to expand its activities in another country
will indicate the importance of the business to adapt to the political risk factors and imple-
ment mitigation strategies. Below we discuss market risk.
sales or margins due to changes in market conditions, outside of the control of the busi-
ness” (Chapman, 2013:467). A business needs to gain insight into the market structure (size,
barriers to entry, product diversification and number of competitors) in which the business
operates. Market risk policies should consider business activities, objectives, the regulatory
environment, competitiveness and staff and technology capabilities. Proactive market risk
management is vital for a business to adapt to changing markets. Refer to par. 24.2 in the
prescribed book.
The marketing environment of a business can form part of the macro industry and task environ-
349
ment. The business must also concentrate on the levels of uncertainty in the marketing envi-
ronment as to monitor, analyse and understand the various influences affecting the industry.
Study
Study the section “Scope of market risk”, par. 25.2 in chapter 25 of the prescribed book.
Study
Study the sections “Benefits of market risk management” and “Implementation of market
risk management”, pars. 25.3–25.4 in chapter 25 of the prescribed book.
87 RSK2601/1
11.5.3 Market structure
A market structure can be seen as characteristics of a market that have the potential to de-
351
termine business behaviour. The following five characteristics have been identified:
1. Number of firms – The number of firms in the market and their relative sizes
2. Barriers to entry – The ease or difficulty with which new entrants might enter the market
3. Product homogeneity, diversity and branding – The extent to which goods are similar
4. Knowledge – The extent to which all businesses in the market share the same knowledge
5. Interrelationships within markets – The extent to which the actions of one business will
affect another business (bargaining power of suppliers and buyers)
Read
Read par. 25.5 in the prescribed book. You must be able to discuss the five characteristics.
sists of five stages, as shown in Figure 10 below. Following the decline stage, a product will
be replaced by a new product.
Read
Read par. 25.6 and refer to Figure 25.3 in the prescribed book to understand the progres-
sion of a product life cycle.
Read
Read par. 25.7 and look at Figure 25.4 in the prescribed book. You must be able to discuss
the alternative strategic directions.
88
11.5.6 Acquisition
Read
11.5.7 Competition
An oligopolistic market can be characterised by price stability, non-price competition (prod-
354
uct, price, promotion and place), branding and specific market strategies.
Read
Read par. 25.9 and refer to Figure 25.5 in the prescribed book.
dividing the change in demand by the percentage change in price. If demand is not sensitive
to price, the business will increase revenue because the increase in price leads to a smaller
decrease in quantity demanded.
Read
a given confidence level over a given period under normal market conditions. In calculating
value at risk, the following methods can be used, as discussed by Chapman (2013):
y Historical simulations method
y Variance – covariance or analytical method
y Monte Carlo method
Read
Read par. 25.12 in the prescribed book. You need to understand the concept of value at risk.
responsibilities, roles and authority levels must be distinguished within each management
strategy for market risk. Broad strategies must be implemented in the advertising, research
and development, product development and diversification sections. Risk mitigation tech-
niques for market risk will involve risk identification, measurement and reporting. It is also
vital for a business to take out an insurance policy. Refer to par. 25.13 in the prescribed book.
You must be able to explain the risk response strategies for market risk.
89 RSK2601/1
SUMMARY (MARKET RISK)
A business needs to understand the market structure and the opportunities and threats pre-
358
sented by both existing and potential competitors. Similarly, a business must adapt and under-
stand changes in the market environment. Market risk must be dealt with as a primary source
of opportunities and risks in the ERM process. We will now turn our attention to social risk.
2013:500). Social risks are seen as social elements that affect a business’s performance over
which the business has no control or which it has only minimal capacity to influence. A
business needs to understand the characteristics, lifestyle choices and social attitudes of its
workforce. Workforces are assumed to take on the behaviours, habits and social cultures that
are prevalent where they work, function and live. Refer to par. 26.1 in the prescribed book.
Study
Study the section “Scope of social risk”, par. 26.2 in chapter 26 of the prescribed book.
to certain benefits.
Study
Study the sections “Benefits of social risk management” and “Implementation of social
risk management”, pars. 26.3–26.4 in chapter 26 of the prescribed book.
90
Read
Read pars. 26.5–26.9 in the prescribed book. You will be required to list the factors.
Activity 11.1
Access the LibGuide on myUnisa and download the latest global risk report. Identify
the external risks facing the global economy today and discuss these with your fellow
students on the discussion forum.
11Self-assessment
(1) With the aid of examples, discuss the factors that determine the successful implementa-
tion of a sound system of economic risk management.
(2) “Climate change is widely recognised as one of the key environmental challenges facing
the world today.” Discuss this statement as it relates to environmental risk management.
(3) Discuss why employment is an essential determinant of legal risk.
(4) Distinguish between macro-political and micro-political risks.
(5) List the eight sources of market risk and opportunity.
(6) Discuss the benefits of market risk management.
(7) Discuss the trends in the implementation of social risk management.
SUMMARY
In Topic 4 we discussed the six macro factors that affect the business operating environment:
362
economic risk, environmental risk, legal risk, political risk, market risk, and social risk. The
scope of external assessment embraces the analysis of opportunities and threats affecting
a business. Economic factors have a direct impact on the potential attractiveness of a busi-
ness. Furthermore, concerns about climate change have led to a widening array of laws and
incentive structures that affect how businesses operate.
Activity 11.2
Access the RSK2601 presentation folder on myUnisa, under Additional Resources. Work
through the presentation, videos and Eskom case study. The presentation is a summary of
the module and indicates how it can be practically applied. Discuss what you have learnt
in the module from the presentation with your fellow students on the discussion forum.
91 RSK2601/1
BIBLIOGRAPHY
AIRMIC, Alarm & IRM. 2010. A structured approach to ERM (ERM) and the requirements of ISO
31000. Retrieved from: Layout 1 (ferma.eu) (Accessed 27/05/2021).
Cadbury, A. 1992. Report of the Committee on the Financial Aspects of Corporate Governance.
London: Gee & Co.
Chapman, RJ. 2013. Simple tools and techniques for enterprise risk management. 2nd edition.
Hoboken, NJ: John Wiley & Sons (ISBN 9781118742426) (Paperback).
Committee of Sponsoring Organizations of the Treadway Commission (COSO), Internal Control–
Integrated Framework. 2013. Retrieved from: https://www.coso.org/Documents/990025P-
Executive-Summary-final-may20.pdf (Accessed 27/05/2021).
Corporate Governance and the Financial Crisis. 2010. OECD Steering Group on Corporate
Governance. Retrieved from: https://www.oecd.org/daf/ca/corporategovernanceprin-
ciples/44679170.pdf (Accessed 27/05/2021).
Deloitte. 2016. King IV bolder than ever. Retrieved from: https://www2.deloitte.com/content/
dam/Deloitte/za/Documents/governance-risk-compliance/ZA_King_IV.pdf (Accessed
02/02/2017).
Gitman, LJ. 2010. Principles of managerial finance: global and South African perspectives. Cape
Town: Pearson.
IoDSA. 2002. The King Report on Corporate Governance (King II). Sandton.
IoDSA. 2009. The King Code of Governance in South Africa (King III). Sandton.
IoDSA. 2016. The King IV Report on Corporate Governance for South Africa (King IV). Sandton.
ISO. 2009. ISO 31000: 2009 Risk management – principles and guidelines. Geneva.
OECD. 2004. Principles of corporate governance. Retrieved from: https://www.oecd.org/
corporate/ca/corporategovernanceprinciples/31557724.pdf (Accessed 27/05/2021).
Peccia, T. 2001. Designing an operational risk framework from a bottom-up perspective.
In C. Alexander (ed.), Mastering risk. Volume 2: Applications. Harlow: Financial Times,
Prentice-Hall.
Principles for enhancing corporate governance. 2010. Basel Committee on Banking Supervi-
sion. Retrieved from: www.bis.org/publ/bcbs176.htm (Accessed 10/04/2013).
PwC. 2009. Kings Council. King III at a glance. Corporate Governance Series. Retrieved from:
http://www.pwc.co.za/en/assets/pdf/steeringpoint-kingiii-03-sept09.pdf (Accessed
04/03/2014).
PwC. 2016. A summary of the King IV Report on Corporate Governance for South Africa,
2016. King IV: An outcomes-based corporate governance code fit for a changing world.
Retrieved from: http://www.pwc.co.za/kingIV (Accessed 01/02/2017).
South Africa. The Companies Act 61 of 1973.
South Africa. The Companies Act 71 of 2008.
363 UK Cadbury Commission Report on Corporate Governance of 1992.
92
Valsamakis, AC, Vivian, RW & du Toit GS. 2010. Risk management. 4th edition. Sandton:
Heinemann.
Young, J. 2006. Operational risk management: the practical application of a qualitative approach.
4th edition. Pretoria: Van Schaik.
93 RSK2601/1