Professional Documents
Culture Documents
Chapter 7:
Assessing Risk
Written Report
A Partial Fulfillment of the Requirements
In
Bachelor of Science in Business Administration
Major in Financial Management
Prepared by:
Ingrid Dominique U. Navarro
FM 4-6
Prepared for:
Prof. Isabelita D. Bondoc
Professor
May 2018
WHAT CAUSES RISK?
1. Control Environment
The control environment is the set of standards, processes and structures that provide the
basis for carrying out internal control across the organization. The board of directors and
senior management establish the tone at the top regarding the importance of internal
control including expected standards of conduct. Management reinforces expectations at
the various levels of the organization. The control environment comprises the integrity and
ethical values of the organization; the parameters enabling the board of directors to carry
out its governance oversight responsibilities; the organizational structure and assignment
of authority and responsibility; the process for attracting, developing and retaining
competent individuals; and the rigor around performance measures, incentives and
rewards to drive accountability for performance. The resulting control environment has a
pervasive impact on the overall system of internal control.
2. Risk Assessment
Every entity faces a variety of risks from external and internal sources. Risk is defined as
the possibility that an event will occur and adversely affect the achievement of objectives.
Risk assessment involves a dynamic and iterative process for identifying and assessing risks
to the achievement of objectives. Risks to the achievement of these objectives from across
the entity are considered relative to established risk tolerances. Thus, risk assessment
forms the basis for determining how risks will be managed.
3. Control Activities
Control activities are the actions established through policies and procedures that help
ensure that management’s directives to mitigate risks to the achievement of objectives are
carried out. Control activities are performed at all levels of the entity, at various stages
within business processes, and over the technology environment. They may be preventive
or detective in nature and may encompass a range of manual and automated activities such
as authorizations and approvals, verifications, reconciliations and business performance
reviews. Segregation of duties is typically built into the selection and development of
control activities. Where segregation of duties is not practical, management selects and
develops alternative control activities.
From iPhones to virtual desktops, the changes in the way IT services are delivered and
managed has resulted in big changes in the way people interact with and exploit
technology, as business leaders, as consumers, and as users. Companies have responded to
the need to hold and manage rapidly increasing volumes of data by outsourcing data
management to third parties
As companies engage in more and more joint ventures and partnerships, the need to
share and disseminate commercially sensitive data is also increasing. Yet as many
organisations currently fail to identify and manage their own sensitive data appropriate.
The counterpoint of risk is opportunity and IT functions which can effectively manage their
risks will enable their businesses to radically outperform those companies which are put
off by or simply not up to the challenge. Companies where IT feels empowered to influence
commercial decision-making by demonstrating how business enablement can be driven by
effective management of technology risks, will prosper greatly at the expense of those
companies where ignorance or fear of new or changing technology risk areas either
prevents them from moving into new areas, or results in failures when they attempt to. This
is the time for IT leaders to step up and put themselves and their function at the centre of
driving their business forward.
III. Strengths, Weaknesses, Opportunities and Threats
A great way to identify strategic risks and core operational and financial risk is through an
analysis that risk managers call a “SWOT ANALYSIS”
Scenario analysis is the process of estimating the expected value of a portfolio after a given
period of time, assuming specific changes in the values of the portfolio's securities or key
factors take place, such as a change in the interest rate. Scenario analysis is commonly used
to estimate changes to a portfolio's value is response to an unfavorable event, and may be
used to examine a theoretical worst-case scenario.
V. WAR GAMING
A wargame (also war game) is a strategy game that deals with military operations of
various types, real or fictional. Wargaming is the hobby dedicated to the play of such games,
which can also be called conflict simulations, or consims for short.
When used professionally by the military to study warfare, "war game" may refer to a
simple theoretical study or a full-scale military exercise. Hobby wargamers have
traditionally used "wargame", while the military has generally used "war game"; this is not
a hard rule. Although there may be disagreements as to whether a particular game qualifies
as a wargame or not, a general consensus exists that all such games must explore and
represent some feature or aspect of human behaviour directly bearing on the conduct of
war, even if the game subject itself does not concern organized violent conflict or
warfare.Business wargames exist as well, but in general, they are only role-playing games
based on market situations
Even without a formal risk assessment, standard reports provided by outside experts
can provide great insight into where your business’s deepest challenges lurk.
References:
UNC Finance and Operations (2018) University of North Carolina at Chapel Hill.
Retrieved from https://finance.unc.edu/departments/internal-
controls/components-ic-process/
Computer Weekly (2000-2018) Retrieved from
https://www.computerweekly.com/opinion/The-impact-of-technological-change-
on-risk-management
CBS Interactive Inc (2018) Retrieved from
https://www.cbsnews.com/news/analyzing-your-businesss-strengths-weaknesses-
opportunities-and-threats/
Investopedia (2018) Retrieved from
https://www.investopedia.com/terms/s/scenario_analysis.asp#ixzz5F52LX1rA
Wikipedia (2018) Retrieved from https://en.wikipedia.org/wiki/Wargaming