Published online by Cambridge University Press: 12 August 2017
Introduction
Once the context within which risks are being analysed is clear, and a full risk taxonomy available, it is time to start identifying risks. The point of the risk identification process is to decide which of the many risks that might affect an organisation currently do so, or may do so in future. Part of the risk identification process also involves determining the way in which risks will then be analysed, in particular whether a qualitative or quantitative approach will be used. These, and other factors, are included in a risk register, discussed in Section 8.5.
Risk identification should be done as part of a well-defined process. This ensures not only that as many risks as possible are identified, but also that they are properly recorded.
There are four broad areas to risk identification. The first concerns the tools that can be used, whilst the second concerns the ways in which the tools are employed. Identification also includes an initial assessment of the nature of the risk, and also the way in which the risk is recorded. Each of these aspects is discussed in turn.
Risk Identification Tools
In this section, a range of potential risk identification tools is discussed. These can generally be used in a number of ways and simply describe the starting point for the generation of ideas. Some common tools are described below.
SWOT Analysis
SWOT – standing for strengths, weaknesses, opportunities and threats – analysis is one of the best known techniques for strategy development. However, it can also be used to identify risks. Having said this, its scope is much broader, covering not just the negative aspects of the risks but the positive prospects for future strategies.
Strengths and weaknesses are internal to the organisation whilst opportunities and threats are external. In this way, SWOT analysis ensures that both the internal and external risk management contexts of an organisation are considered.
It is important to recognise what constitutes a strength or a weakness. In particular, strengths only matter if they can be used to take advantage of an opportunity or to counter a weakness; conversely, weaknesses are important only if they result in exposure to a threat.
Some broad categories for SWOT analysis are given in Table 8.1.
To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Find out more about the Kindle Personal Document Service.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.