Chapter 9 - Evaluating and Reporting Risk (techniques) Flashcards

1
Q

What is expert judgement?

A

Expert judgement relies on the skills and experience of relevant specialists, either in isolation or working as a group. For example, an IT specialist should have a good understanding of the types of IT-related risk events to which an organisation may be exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can a focus group assist with risk identification?

A

Focus groups may comprise a mix of specialists, such as IT, finance and HR specialists or functional and departmental managers, such as operation managers or marketing managers. The idea behind a focus group is to share a range of different perspectives and experiences to achieve a consensus view.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a survey and checklist?

A

A checklist is a verification document formed based on the company’s existing standards and regulated processes, the monitoring of which is essential at any time. A survey is a form of collecting simple, unstructured information.

A checklist ensures that particular types of risk event are not forgotten. Experts, focus groups or survey respondents may accidentally overlook certain types of risk event. A checklist ensures that all relevant sources of risk are given consideration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the benefits of checklists?

A
  • Cheap and efficiency way of collating large amounts of information
  • Simple and easy to use - ensures that relevant sources of risk are not missed
  • Can be adapted to individual areas of risk focus (such as health ahd safety, environment, etc)
  • Useful for putting diverse sources of information into a common format
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the disadvantages of checklists?

A
  • may be completed too quickly and therefore without much thought by someone who considers that their time is better spent elsewhere
  • may be completed by someone who has their own reasons for suppressing risk information
  • may be ambigious to the reader
  • ‘form filling’ exercise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the advantages of a physical inspection?

A

There is a clear advantage when a workplace and its employees are visited, particularly by someone who has the specialised knowledge to take a professional view of what is there. A formal inspection report will normally conclude with recommendations to improve the control environment and reduce the probability and impact of loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the disadvantages of an inspection?

A
    • An inspector can only see risk exposures that are visible on the day of the visit. A visit is a snapshot in time and can capture only the activity of the day.
    • An inspection programme can be expensive, especially when visits are needed across many different workplaces.
    • Some of an organisation’s greatest types or sources of risk may be those where third-party suppliers provide goods and services. The organisation may have difficulty obtaining authority to conduct detailed inspections in third-party premises unless this permission is negotiated within the original contract.
    • Risk-management is and should remain the responsibility of every manager and employee throughout an organisation. Regular visits by an inspector, if not carefully managed, could encourage managers and employees to believe that they can abdicate responsibility for risk-management to the inspector.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are analytical approaches and name four examples.

A

Analytical approaches use a range of research and logic structuring methods to make risk identification more scientific and less prone to human error. Techniques include:

  • The structured what-if technique (SWIFT)
  • The Delphi technique
  • Root-cause analysis
  • System and process mapping
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the structured what-if technique (SWIFT)?

A

The structured what-if technique (SWIFT) is a systematic, team-oriented technique commonly used for the identification of health-and-safety and environmental-related risks in areas such as chemical processing and manufacturing. The technique uses a series of structured ‘what-if’ and ‘how-could’ type questions to consider deviations from the normal operation of systems and processes. The activity is supported by checklists to help identify potential risk events. SWIFT relies on expert input from the team to identify risk events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Delphi technique?

A

The Delphi technique is an information-gathering tool that is used to reach a consensus of experts on a subject, in this case the identification of risk events.

Each expert participates anonymously and a facilitator uses a questionnaire to solicit ideas about the important points related to the subject. The responses are summarised and re-circulated to the experts for further comment. Consensus may be reached in a few – or many – rounds of this process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the advantages and disadvantages of the Delphi technique?

A

+ve’s
- reduce bias due to anonymity and prevents any one person from having undue influence
- a range of experts can be used

-ve’s
- time consuming, especially if a consensus is hard to reach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Outline the steps for a typical risk identification process via the Delphi technique

A
  1. Agree the function, department, project or process to be analysed.
  2. Select a panel of experts and keep the membership anonymous.
  3. Send out background information and a questionnaire that asks them to identify the relevant risks.
  4. Facilitator compiles responses.
  5. Facilitator sends out compiled information to experts for comment. Experts invited to revise their views based on responses.
  6. Repeat until a consensus is reached.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a root-cause analysis?

A

Root-cause analysis - focuses on investigating the root causes of risk events. It may be applied to hypothetical risk-event scenarios or actual risk events that have occurred, either within the organisation or in similar organisations.

Root-cause analysis is based on the assumption that many risk events have multiple causes. For example, a fire risk event needs material to burn, a spark and oxygen before it can cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a common investigation technique used when conducting system and process mapping?

A

A common investigation technique is fault-tree analysis, which looks at what might cause a systems or process flow to fail. The fault tree does not look at the system or process leading to the end result. Instead, it tries to identify potential system or process failures (risk events) and then looks backwards to search out the possible causes of those failures.

The aim is to identify key points of failure and whether these can be overcome by adapting other parts of the system or process flow.

An advantage of the fault-tree approach is that it can highlight connected risk events that could combine to cause much larger risk events

A disadvantage of the fault-tree approach is that it can take a lot of time and money to flow-chart systems and processes and then analyse them for points of failure that may cause risk events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the benefits of loss event and near miss investigations?

A

Loss events and near misses are learning opportunities. Whenever they occur, an organisation may decide to identify the causes of these events using techniques such as root-cause analysis. These investigations may help an organisation to identify new risks; they may also signify an increase in exposure to a previously identified risk or a control weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Outline the three techniques to identify emerging risks

A
  1. PEST analysis - Political, Economic, Social and Technological
  2. SWOT analysis
  3. World Economic Forum Global Risk Report - source of current and emerging risks
17
Q

What does a risk register typically include?

A
  • a description of the risk event that has been identified;
  • the risk category that the risk event is linked to;
  • the person responsible for managing the risk event on a day-to-day basis, often known as the risk owner;
  • a qualitative probability and impact assessment of the risk event; and
  • any actions currently under way to control the probability or impact of the risk event.

More comprehensive risk registers many include:
* a qualitative probability and impact assessment of inherent risk;
* a qualitative probability and impact assessment of the residual risk;
* any maximum exposure limit that has been assigned for residual risk exposure;
* information on the potential causes of the risk event;
* information on the potential financial and non-financial impacts of the risk event;
* any risk metrics that are used to monitor the organisation’s exposure to the risk event; and
* recent trends in terms of any movements in residual risk exposure up or down.

18
Q

Outline some risk-reporting tools

A
  • Heat maps
  • Loss and near-miss databases
  • Risk, control and performance indicators
  • Risk dashboards and balanced scorecards
  • Narrative reporting