Risk Management: Framework, Strategies, and Analysis Report

Verified

Added on  2022/09/15

|18
|5782
|16
Report
AI Summary
Document Page
Running head: RISK MANAGEMENT
Risk Management
Name of the Student
Name of the University
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
RISK MANAGEMENT
Table of Contents
Question 1........................................................................................................................................2
Question 2........................................................................................................................................5
Question 3........................................................................................................................................8
Question 4......................................................................................................................................12
References......................................................................................................................................15
Document Page
2
RISK MANAGEMENT
Question 1
1.1 Explanation of the Risk Identification and Discussion on Three Types of Risks
Risk identification can be defined as the most significant process for determining
different risks, which can potentially avoid the organization, investments or programs from
achievement of the objectives (McNeil, Frey and Embrechts 2015). This specific process
involves documentation as well as communication of the concern. The major objective of this
risk identification procedure refers to the constant identification of different events, which when
take place, might comprise of negative impacts on the overall capability of a project for the core
purpose of obtaining performance goals (Glendon, Clarke and McKenna 2016). These risks
mainly come from the respective project or from external sources. Several kinds of risk
assessment are present, like program risk assessment, which are required for supporting the
investment decisions, proper analyses of different alternatives as well as assessment of the cost
uncertainty or operational cost. It provides with the major scope through which different threats
are being recognized as well as evaluated on top priority for better understanding of the threats
and vulnerabilities (Ho et al. 2015).
The first step of risk identification is to recognize various program objectives and goals
for fostering a common understanding within the team about understanding success of the
program (Aven 2016). Several sources of risks are present and as a result, the respective project
team must review the respective scope of the program, cost estimation, scheduling, technical
maturity, key performance parameter, challenges for performances, stakeholders’ expectation
and current planning and many more. There are three distinct types of risks present that could be
extremely vulnerable for a business or organization and hence it is needed to eradicate these risks
successfully for better execution of the processes and operations. These risks include business
risk, non business risk and financial risk (Olson and Wu 2015). The description of these risks is
provided below:
i) Business Risk: The first as well as the foremost type of risk is business risk. This
particular type of risk is taken by the respective business enterprises themselves for
maximization of shareholder profits and values (Chance and Brooks 2015). The most significant
and important example of this business risk is that an organization undertake the high cost risks
Document Page
3
RISK MANAGEMENT
within marketing for the core purpose of launching any new product and gain maximum sales
and profit.
ii) Non Business Risk: The second important and significant type of risk is non business
risk. These distinct types of risks are not under the control of the organizations. The risks, which
arise out of the economic and political imbalances could be easily termed as the non business
risks and these could often negatively affect the organizational growth and development to a high
level.
iii) Financial Risk: The third distinct and noteworthy type of risk is financial risk. It is
the kind of risk, which includes financial loss to the firms (Hubbard 2020). The financial risks
usually takes place for the losses or instability within the financial market that are being caused
by the movement within stock price, interest rate and currency.
1.2 Discussion of the Risk Description Framework by Hopkins in Telstra Corporation
Limited
Telstra Corporation Limited is one of the most significant and important
telecommunication organization within Australia that is responsible for building and operating
telecommunication networks and markets voice, mobile, pay TVs, Internet accessibility as well
as other product or service. The organization was founded within the year of 1975 and the
headquarters is in Melbourne Australia (Telstra.com.au. 2020). More than 26000 employees are
working in the company and they are adopting several new strategies for eradicating any type of
risk or threat. The risk description framework by Hopkins for the organization of Telstra
Corporation Limited is required for being sure that all types of risks and threats are successfully
eradicated without any type of complexity or issue.
Moreover, the probable risks are highlights and these are being managed with the
respective risk description framework. The main components of this particular framework
include the communications as well as reporting structure or the architecture, the overall strategy
for risk management, which is being set by the organizational strategy and finally the set of
procedures and guidelines or protocols that are being developed (Hopkin 2018). The subsequent
combination of different protocols and guidelines is required to be considered over top priority
and make sure that the existing risks and threats within Telstra are successfully eradicated. As a
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
RISK MANAGEMENT
result, it becomes quite effective and significant to ensure that the probable telecommunication
issues in the networking and network resources are being well identified and actions taken for
them on top priority (Sadgrove 2016). The major risks of the organization include distributed
denial of service attack, targeted attack, human related threat such as insider access and network
device vulnerabilities as well as many more.
The distributed denial of service attack decreases network capacity and increments costs
of traffic by successfully disrupting the service availability for ensuring network accessibility
(Cole, Giné and Vickery 2017). Such attack is also utilized as the main gateway or smokescreen
for one second, more malicious as well as damaging attack. The organization of Telstra might
face subsequent issues related to these issues for evolving and growing in sophistication. The
attackers might utilize their respective smart phone based botnets and using standardized
network protocols for launching the attacks like NTP or Network Time Protocol and BGP or
Border Gateway Protocol (Iqbal et al. 2015). According to the risk description framework by
Hopkins, the organization of Telstra should highlight the risks and threats within time, so that it
becomes easier for them to understand the present situation and understand the level of
vulnerability for any type of misconfiguring service or product.
The several indirect attacks over the telecommunication organization ensure that different
malware activities and techniques are being used by various cyber criminals and target
subscribers or their devices (Hopkin 2018). As a result, the respective confidential data or
information is lost completely and the organization of Telstra would not be able to retrieve them
under any circumstance. With the distinct components of risk description framework, it would
become quite easier for the organization to understand such situations and to eradicate different
aspects of risks and issues for better impersonation and gaining of accessibility towards sensitive
customer and corporate information related to internet provider. The vital steps of risk
management are being considered on top priority and they are being executed sequentially (Agca
et al. 2017). These steps include recognition of different risks, analyses of these risks, assessment
of the risks, treating the risks and finally checking or reviewing the respective risk properly for
Telstra after describing them.
Document Page
5
RISK MANAGEMENT
Question 2
2.1 Critical Discussion on the Three Dimensions in which an ERM can be defined
The COSO or the Committee of Sponsoring Organizations of the Treadway Commission
framework is responsible for defining the multidimensional ERM process that is eventually
applicable to any specific organization (Khan, Rathnayaka and Ahmed 2015). ERM or enterprise
risk management is the core procedure to plan, organize, lead as well as control the major
activities of the business for the purpose of minimizing the overall impacts of risks over the
organizational earnings and capital. This type of management involves operational, strategic and
financial risks, apart from the risks related to the accidental losses. The external factors have
fueled a significant interest by the companies within the risk management process.
There are three dimensions for the enterprise risk management attribute, which include
entity objectives, entity organizational structure and ERM process (DeAngelo and Stulz 2015).
On the basis of these three dimensions, it is needed to ensure that the most basis objectives are
being highlighted.
i) Entity Objectives: The first and the foremost dimension for ERM of entity objectives
involve 4 types of objectives like strategic, operations, reporting as well as compliance. Each of
these goals are required to be understood for highlighting the processes and policies for the
increasing number of industries (Bromiley et al. 2015). Proper compliance is needed to be taken
into considered for top priority for ensuring that the respective strategic objectives are
successfully executed without much issue and complexity. The entity objectives of COSO ERM
framework can be achieved by following different processes, such as ensuring control
environment for ethical and integrity value, proper risk assessment, different control activities,
subsequent execution of information and communication factors with high effectiveness and
efficiency and finally proper monitoring of the policies and procedures (Giannakis and
Papadopoulos 2016). Risk identification and analysis would become successful and security
would be improved to a high level by conducting a proper application change management. As a
result, process level objectives are being successfully incorporated for ensuring significant risks
are identified as well as assessed effectively.
Document Page
6
RISK MANAGEMENT
ii) Entity Organizational Structure: The second significant and important dimension of
enterprise risk management is entity organizational structure (Grace et al. 2015). Since, it
considers all levels of hierarchy in an organization; various aspects are needed to be considered
for this purpose, which include subsidiaries, processes of business units, division level and entity
level. It helps to highlight the mission, vision and strategies of the organization to identify the
major business objectives and ensure that the philosophy and operating style of the management
is well facilitated and use human resources processes and policies on top priority (Carvalho and
Rabechini Junior 2015). The overall organizational structure is responsible for determining the
modes, where the organization is eventually operating as well as performing. The organizational
structure allows the expressed allocations of various responsibilities for several functionalities
and procedures to separate entities like the individual, working group, department and finally
branches of the company (Sadgrove 2016). As a result, the probable risks are being highlighted
on top priority and the organization gets distinct chance for risk identification and prioritization.
iii) ERM Process: The final significant and vital dimension of enterprise risk
management is ERM process. The major components of this particular dimension include
internal environment, setting of different objectives, identification of the events, risks’
assessment, risks’ response, control activities, information as well as communication and
monitoring (Olson and Wu 2015). The first component is internal environment, in which the
internal environmental factors are required to be analyzed, so that the execution process becomes
quite effective and ethical and integrity values are being exercised in the company eventually
(Chance and Brooks 2015). The next component is to set the goals and objectives, so that the
entire procedure of risk management is being executed with the help of several significant and
noteworthy objectives and goals. The next distinct and significant component of the ERM
process is identification of different events. As a result, the vital events and attributes are well
identified and the probable risks are assessed properly. Moreover, the risk responses are also
analyzed and different control activities are needed to be taken into consideration (Cole, Giné
and Vickery 20170. Finally, the respective organization will have to implement information and
communication technology with proper monitoring of the process.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
RISK MANAGEMENT
2.2 Discussion on Risk Architecture and Risk Management Strategy as used in Risk
Management Framework and Measuring with explanation of their relevance in Telstra
Corporation Limited
Telstra Corporation Limited, being the leader of telecommunication organization in
Australia has to deal with different types of risks and threats related to cyber security and hence
there could be several chances for loss of confidential data or information (Telstra.com.au.
2020). As a result, various steps and mitigating actions are needed to be undertaken by the
organization for ensuring that the distinct processes and operations are well executed and would
be providing some of the most important and significant benefits to the company. Two vital
aspects of risk management framework are needed to be analyzed, which are risk architecture
and risk management strategy (McNeil, Frey and Embrechts 2015). The description of these two
aspects are provided in the following paragraphs:
2.2.1 Risk Architecture
The risk architecture defines about the process of different processes, technology and
information of Telstra is being structured properly for making risk management quite effective,
agile and efficient in the entire company as well as its significant relationships (Glendon, Clarke
and McKenna 2016). There are 3 vital areas for risk architecture, which include risk management
procedural architecture, risk management information architecture and risk management
technology architecture. It is extremely vital to understand that these distinct architectural areas
be initially defined in a sequential order. With the implementation of such distinct architecture, it
would be extremely easier for Telstra to identify the vital risks and monitor them properly for
better eradication of the issues and complexities (Aven 2016). Moreover, the performance is
improved after monitoring the regulatory and legal environments of the company with inclusion
of different techniques and possibilities.
2.2.2 Risk Management Strategy
The second significant attribute is risk management strategy that is required to be
considered by the Telstra Corporation Limited. This type of strategy is responsible for providing
a coherent and structured approach for successful identification, assessment and management of
risks (Hubbard 2020). It helps in building within a specific process towards regular up gradation
Document Page
8
RISK MANAGEMENT
as well as reviewing of the assessment on the basis of the new developments or actions taken.
Telstra can develop or implement this type of strategy for ensuring that the respective threats and
risks are successfully eradicated without much complexity or issue under every circumstance. As
a result, the organization would be highly benefitted from risks.
Document Page
9
RISK MANAGEMENT
Question 3
3.1 Evaluation of the term Risk Appetite
Risk appetite can be referred to as the distinct level of risk, which an organization is
prepared for accepting within the pursuit of the major goals, before action is deemed necessary
for proper reduction of risks and threats (Cole, Giné and Vickery 2017). This risk appetite is
responsible for representing a proper a balance within the potential advantages of innovation as
well as the risks, which can alter eventually. According to the ISO 31000 risk management
standard, risk appetite is the type and amount of risk, which a company is prepared for pursuing,
taking or retaining. This specific concept is helpful for guiding the organizational approach
towards risk management and risk (Khan, Rathnayaka and Ahmed 2015). There are some of the
most significant and important examples of such approaches to set risk appetite, which an
organization might adopt for ensuring a response towards risk, which is proportionate provided
in the business objectives.
The major approaches for risk appetite involve adverse, minimal, cautious, open as well
as hungry. As a result, it becomes quite effective to ensure that the respective risks are well
avoided and uncertainty is managed under every circumstance (DeAngelo and Stulz 2015). The
preferences and choices are being analyzed for limited rewards and preference is of low degree
and might have limited potential. It has the willing to consider every potential option and then
select the option, which is most likely to result in the most successful delivery and even
providing an acceptable reward level or value for money (Giannakis and Papadopoulos 2016).
The respective organization would also be eager to be creative and then select options with high
business rewards, in spite of having of greater acceptance towards management decisions and
risks.
A proper and suitable approach should be undertaken by an organization for varying
across the company with separate parts off the business after adopting a proper risk appetite,
which eventually reflects their respective role with the highly achieving risk appetite framework
for ensuring better consistency (Carvalho and Rabechini Junior 2015). Precise measurement is
not at all possible and risk appetite would be stated by a broader statement of approach. The
company might have a proper appetite for few distinct risks and might be averse to the rest of the
risks on the basis of the context as well as distinct potential losses and profits.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
RISK MANAGEMENT
Different measures could be developed for several categories for risks and it might be
aided to a project for learning about the level of delay or any type of financial loss, only to be
permitted for bearing (Grace et al. 2015). The highest level of risk tolerable is needed to be
defined and proper action to be undertaken on priority basis. There are some of the most
important and significant advantages of risk appetite, which is needed for guiding the
organization over the level of risks to be permitted and encouraging consistency of the approach
within the entire company (Agca et al. 2017). Major acceptable levels of risks are being defined
and the resources are not subsequently spent on reduction of risks, which are present at the
acceptable level.
3.2 Critical Discussion of Four Techniques of Risk Assessment used in Microsoft
Corporation with evaluation of Effectiveness and Efficiency as Risk Assessment Tools
Microsoft Corporation is a popular and significant multinational technology organization
of America that has its headquarters in Washington. It subsequently develops, manufactures,
licenses, supports as well as sells the computer software, personal computer systems, consumer
electronics and even related services (Microsoft. 2020). The best known software products of the
organization include Microsoft Windows line of the operating systems, Internet Explorer, the
Microsoft Office Suite and many more. The founders of the company are Bill Gates and Paul
Allen. Since they are a technology organization, there is always a high chance that the risks
related to cyber security and information management are increased to a high level.
The four distinct techniques of risk assessment that can be eventually utilized in the
organization of Microsoft organization include avoidance, reduction, sharing and retention
(McNeil Frey and Embrechts 2015). These four techniques are responsible for ensuring that the
risks are well managed after proper identification, evaluation and even prioritization of the risks.
These are being followed by the economical and coordinated application of different resources
for proper minimization, observing and directing of the profitability or impact of the most
unfortunate events and also expansion of the opportunity realization. These threats can come
from different sources such as financial market and also even threats, legal liabilities, credit risk
accidents and many more from the project failures (Glendon, Clarke and McKenna 2016). The
description of these risk assessment techniques is given below:
Document Page
11
RISK MANAGEMENT
i) Risk Avoidance: The first and the foremost risk assessment technique for Microsoft is
risk avoidance. It involves not performing an activity, which can present risk and refusing to
purchase a specific property or business for avoidance of legal liability would be referred to as a
major example (Ho et al. 2015). This particular technique, although not effective for all types of
risks, can be termed as responsible for reducing the costs and impacts to a high level and loss of
profits. The risk avoidance technique would not be highly effective and efficient as a risk
assessment tool, since it cannot detect the risk, unless and until any issue or harm is being caused
to the respective business (Aven 2016).
ii) Risk Reduction: The second significant and important risk assessment technique for
Microsoft is risk reduction. It is also termed as optimization and it includes proper reduction of
the severity of the likelihood of the threat from occurrence (Hubbard 2020). Any type of risk
management related to the management of processes and operations of the business should be
done after acknowledge of the risks in positive and negative categories. The risks related to cyber
security are termed as negative in nature and would not provide any type of benefit to the
business. In this specific situation, the risks should be reduced completed, so that the confidential
data are not affected (Sadgrove 2016). The risk reduction technique would be referred to act as
highly effective and efficient as a risk assessment tool, since it can easily and promptly assess the
risks for taking proper mitigation actions.
iii) Risk Sharing: The third significant and important risk assessment technique for
Microsoft is risk sharing. It is referred to as the process to share risk with other party for
reducing burden of loss or benefit of profit, after taking proper steps for risk management (Cole,
Giné and Vickery 2017). As it breaks down the risk into different segments or parts, the process
of risk management becomes quite effective and risk transferring reduces vulnerability. Being
the leader of the software industry, Microsoft should share their risks eventually, so that major
causes and issues are not being faced by them (Iqbal et al. 2015). The risk sharing technique
would be referred to act as highly effective and efficient as a risk assessment tool, since it can
share the loss or profit of the loss to a high level and allow the organization in undertaking
different measures for reduction of the risks.
iv) Risk Retention: The final important and noteworthy risk assessment technique for
Microsoft is risk retention. It significantly includes acceptance of the loss and profit from the
Document Page
12
RISK MANAGEMENT
risk, as soon as the incident has taken place (DeAngelo and Stulz 2015). It is a specific viable
strategy for the smaller risks, in which the costs of insuring against the risk will be greater over
time than the total sustained losses. These risks, which are not avoided or transferred are being
retained by default. It involves different risks, which are extremely large or catastrophic for not
being infeasible (Giannakis and Papadopoulos 2016). The risk retention technique would be
referred to act as highly effective and efficient as a risk assessment tool, since it can retain the
risks for Microsoft and they can deal with all types of complexities and issues successfully
without much complexity.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
RISK MANAGEMENT
Question 4
4.1 Critical Evaluation of Three Essential Characteristics of an ERM in Microsoft
Corporation
The framework of enterprise risk management or ERM is responsible for highlighting the
major and the most significant advantages for any particular business and ensure that the most
vital risks and threats are being reduced to a high level (McNeil, Frey and Embrechts 2015). It
acts as a strategy for risk management, so that all types of organizational goals and objectives
related to risks are being fulfilled on top priority. Moreover, the potential events are identified
eventually for all the companies. Microsoft Corporation is a popular and significant technology
based organization and ERM framework helps them to provide new opportunities and chances
for management of different types of risks (Glendon, Clarke and McKenna 2016). Three
significant and noteworthy characteristics of this particular framework of enterprise risk
management for the organization of Microsoft Corporation are described in the following
paragraphs:
i) The first and the foremost characteristic of ERM framework for the organization of
Microsoft Corporation is that the respective risks are being derived from their respective
business objectives and goals (Chance and Brooks 2015). Since they are leading software
multinational organization, it is quite common for them to face different challenges related to
risk management. As a result, the risk management becomes quite easier for them. Moreover,
execution of different processes related to risk management is effective and efficient for them.
ii) The second significant important characteristic of ERM framework for the
organization of Microsoft Corporation is that this particular framework provides a proper
guidance for common approach in the entire organization (Cole, Giné and Vickery 2017). Hence,
it is also referred to as the distinct and vital approach for any type of operational support for risk
management as well as accountable risk ownership.
iii) The third distinct and noteworthy characteristic of ERM framework for the
organization of Microsoft Corporation is that the risks are well communicated with one another
in terms of their impact or effect over the business (Khan, Rathnayaka and Ahmed 2015). As a
Document Page
14
RISK MANAGEMENT
result, the organizational approach for business process execution becomes easier and effective
as compared to others.
4.2 Discussion of the four T’s of Hazard Response as applied in the Microsoft Corporation
Few enterprises try to evaluate the risks and threats for better discussion and description
of the business, so that it becomes quite easier for them to manage and eradicate the risks and
threats successfully without much complexity or issue (DeAngelo and Stulz 2015). Hazard
response is extremely effective and efficient for all organizations and hence ensure that the
probable hazards and risks are vulnerable or not. The major security risks or hazards for cyber
security include limited configuration security, lack of patch management, and increased attack
for communication, inconsistent encryption technique and weakness in the code security
(Carvalho and Rabechini Junior 2015). The organization of Microsoft Corporation should apply
four T’s of hazard response for ensuring that better effectiveness and efficiency is being gained
under every circumstance and these T’s are provided in the following paragraphs:
i) Transferring Risks: The first and the foremost T in the hazard response for the
organization of Microsoft Corporation is transferring risk. This particular aspect can be
subsequently achieved through the utilization of several forms of insurance for a company or the
respective payment to the third parties, who are prepared for taking up the risks, on behalf of
their business (Grace et al. 2015).
ii) Tolerating Risks: The second important and significant T in the hazard response for
the organization of Microsoft Corporation is tolerating risk. This specific attribute takes place,
when any action is not undertaken for mitigation or reduction of risks and threats. It might be
extremely vulnerable as the expense of instituting the risks reduction or mitigation activity is cost
effective or the risks of impact are at the lowest point, for ensuring that they are deemed
acceptable to the specific business of Microsoft (Sadgrove 2016). As soon as the risks are being
tolerated, they must be properly monitored for ensuring any type of future change to make it no
longer tolerable for their services and assets.
iii) Treating Risks: The next distinct and important T in the hazard response for the
organization of Microsoft Corporation is treating the risks. It is a significant methodology to
control risk through distinct actions, which lower the likelihood of the risk taking place or even
Document Page
15
RISK MANAGEMENT
minimization of the impact prior to the subsequent occurrence (Olson and Wu 2015). Moreover,
there exists several distinct and important contingent measures, which could be successfully
developed for reduction of the impact of an event, once it has taken place.
iv) Terminating Risks: The final important and significant T in the hazard response for
the organization of Microsoft Corporation is terminating the risks and threats. It is referred to as
the simplest as well as the most significantly ignored methodology of dealing of risks. It is also
referred to as the core approach, which should be mostly favored where all possible aspects are
being initiated for risk elimination (Aven 2016). It could be done by simply alteration of an
inherently risky procedure or practice for properly removing the risks and also utilizing the
similar process in every business area or segment.
As soon as an asset or resource would be presenting a risk for Microsoft Corporation, it
would become quite distinct that the respective criteria for risks should be removed successfully,
for making the business free from any kind of risk or threat. The risk mitigation strategy is kept
on top priority and proper attributes are followed subsequently (Glendon, Clarke and McKenna
2016). As a result, the above mentioned four T’s in hazard response are needed to be considered
on top priority and ensure that major effectiveness and efficiency is being gained successfully
and without involving any complex situation or option that can be referred to as vulnerable for
the business.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
16
RISK MANAGEMENT
References
Agca, R., Heslinga, S.C., Rollefstad, S., Heslinga, M., McInnes, I.B., Peters, M.J.L., Kvien,
T.K., Dougados, M., Radner, H., Atzeni, F. and Primdahl, J., 2017. EULAR recommendations
for cardiovascular disease risk management in patients with rheumatoid arthritis and other forms
of inflammatory joint disorders: 2015/2016 update. Annals of the rheumatic diseases, 76(1),
pp.17-28.
Aven, T., 2016. Risk assessment and risk management: Review of recent advances on their
foundation. European Journal of Operational Research, 253(1), pp.1-13.
Bromiley, P., McShane, M., Nair, A. and Rustambekov, E., 2015. Enterprise risk management:
Review, critique, and research directions. Long range planning, 48(4), pp.265-276.
Carvalho, M.M.D. and Rabechini Junior, R., 2015. Impact of risk management on project
performance: the importance of soft skills. International Journal of Production Research, 53(2),
pp.321-340.
Chance, D.M. and Brooks, R., 2015. Introduction to derivatives and risk management. Cengage
Learning.
Cole, S., Giné, X. and Vickery, J., 2017. How does risk management influence production
decisions? Evidence from a field experiment. The Review of Financial Studies, 30(6), pp.1935-
1970.
DeAngelo, H. and Stulz, R.M., 2015. Liquid-claim production, risk management, and bank
capital structure: Why high leverage is optimal for banks. Journal of Financial
Economics, 116(2), pp.219-236.
Giannakis, M. and Papadopoulos, T., 2016. Supply chain sustainability: A risk management
approach. International Journal of Production Economics, 171, pp.455-470.
Glendon, A.I., Clarke, S. and McKenna, E., 2016. Human safety and risk management. Crc
Press.
Grace, M.F., Leverty, J.T., Phillips, R.D. and Shimpi, P., 2015. The value of investing in
enterprise risk management. Journal of Risk and Insurance, 82(2), pp.289-316.
Document Page
17
RISK MANAGEMENT
Ho, W., Zheng, T., Yildiz, H. and Talluri, S., 2015. Supply chain risk management: a literature
review. International Journal of Production Research, 53(16), pp.5031-5069.
Hopkin, P., 2018. Fundamentals of risk management: understanding, evaluating and
implementing effective risk management. Kogan Page Publishers.
Hubbard, D.W., 2020. The failure of risk management: Why it's broken and how to fix it. John
Wiley & Sons.
Iqbal, S., Choudhry, R.M., Holschemacher, K., Ali, A. and Tamošaitienė, J., 2015. Risk
management in construction projects. Technological and Economic Development of
Economy, 21(1), pp.65-78.
Khan, F., Rathnayaka, S. and Ahmed, S., 2015. Methods and models in process safety and risk
management: Past, present and future. Process safety and environmental protection, 98, pp.116-
147.
McNeil, A.J., Frey, R. and Embrechts, P., 2015. Quantitative risk management: concepts,
techniques and tools-revised edition. Princeton university press.
Microsoft. 2020. [online]. Accessed from https://www.microsoft.com/en-us [Accessed on 9
April 2020].
Olson, D.L. and Wu, D.D., 2015. Enterprise risk management (Vol. 3). World Scientific
Publishing Company.
Sadgrove, K., 2016. The complete guide to business risk management. Routledge.
Telstra.com.au. 2020. [online]. Accessed from https://www.telstra.com.au/ [Accessed on 9 April
2020].
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]