Premium Essay

Identification and Analysis of Risks

In:

Submitted By qihailanghuan
Words 1950
Pages 8
Introduction
This report identified five dimensions of risks that would potentially influence the valuation of the early-stage biotechnology investment. This report then compared and contrasted the real and financial options that could be used in risk management strategies for Wahoo Genomics under certain assumptions. After analyzing the differences and similarities between the real and financial options, the report proposed to set up a coherent risks management strategy under prescribed assumptions.

1. Identification and Analysis of Risks
1.1 Technological Risk
Generally, there are five dimensions of risks that companies face, including technological risk, economic risk, financial risk, performance risk and legal/regulatory risk (Triantis 2000). Among the five dimensions of risks, the technological risk affects the valuation of Wahoo Genomics’ early-stage biotechnology investment most. The technology risk arises often in the R&D stages, especially for companies in the pharmaceutical industry (Triantis 2000). All of the five stages of Wahoo Genomics’ R&D events involve a high level of technological risks. For instance, 95% of new animal drugs are abandoned during the phase of preclinical trial stage. Such high failure rate indicates a high level of R&D outcome risk, and such risk is compensated by potential high returns for investors. Specifically, a high volatility estimate reflects management’s expectations of the probability that the drug can successfully be marketed in April 2007(Shockley et all. 2002). The less the likelihood of success in each stage is, the higher the volatility will be. When the volatility is assumed to be 50%, the value of the project is $17 million; the value increases to $25 million when volatility changes to 150%, holding other factors constant (Shockley et all. 2002). However, the value of the project cannot exceed

Similar Documents

Premium Essay

Nt1310 Unit 3 Assignment 1 Identification Risk Analysis

...2. Identified Risks There are a number of organisations that maintain a database of vulnerabilities. The list below is not exhaustive, but the vulnerabilities listed in this report have been extracted from Cve.mitre.org (n.d.). 2.1 The Catastrophic List These vulnerabilities were identified during the assessment and need urgent remediation as they pose a serious security risk to the organisation. ID Vulnerability Description Risk Category Remediation Method V001 A firewall is on the edge of the network acting as the first line of defence against any attempts to access the network without permission. However, the network not optimally protected, as the firewall is poorly managed. Catastrophic: Attempts to scan or penetrate network will not be detected all the time. • Operating system firewall installed where required. • Hardware firewall...

Words: 718 - Pages: 3

Premium Essay

Risk Management Info

...Identify – Risk identification allows individuals to identify risk so that the operations staff becomes aware of potential problems. Not only should risk identification be undertaken as early as possible, but it should also be repeated frequently. There are multiple types of risk assessments, including program risk assessments, risk assessments to support an investment decision, analysis of alternatives, and assessments of operational or cost uncertainty. Risk identification needs to match the type of assessment required to support risk-informed decision making. Brainstorming is also a good method to use to identify risks. Everyone involved with the project to be included in risk identification. Review the project scope, cost estimates, schedule, technical maturity, key performance parameters, performance challenges, stakeholder expectations vs. current plan, external and internal dependencies, implementation challenges, integration, interoperability, supportability, supply-chain vulnerabilities, ability to handle threats, cost deviations, test event expectations, safety, and security. Review historical data from similar projects, stakeholder reviews, and risk lists provide valuable insight into areas for consideration of risk. Analyze and prioritize – Risk analysis transforms the estimates or data about specific risks that developed during risk identification into a consistent form that can be used to make decisions around prioritization. Risk prioritization enables...

Words: 480 - Pages: 2

Premium Essay

Business

...Risk mitigation techniques Risk management involves the process of continuous identification of the risk factors and devising way and methods of dealing with them. The identification process can be done using different types of models depending on the type of organization being analyzed (Chapman, 1996). Dr. Kallman a professor of risk management, has several techniques which he has discussed regarding the risk management which will be compared with other techniques recommended by other authors like Victoria Duff. Understand the risk According to Dr. Kallman on risk management, he has given the following techniques to be used. Dr. Kallman says that before giving the mitigation techniques to the risk, there must be identification of the risks. A risk manager should understand the type of risks which are likely to face a firm and list them down. This is what we call risk identification. For one to know this, there must be clear understanding of the companies’ goals, mission and objective. From these factors, the risk that is likely to face an organization can be identified easily. When the risks have been identified, they can be categorized to three distinct groups such as, operational, strategic and economic. Strategic risks include those risks with long term varied effects on the firm and they are composed of factors like, the reputational risk, quality risk and brand risk. The next set of risk is operational risks which include things like the hazards which expose the business...

Words: 1398 - Pages: 6

Premium Essay

Risk Assessment

...Risk assessment is a structured and methodical process, which is reliant on the correct identification of hazards and a suitable assessment of risks ascending from them, with a sight to making inter-risk comparisons for purposes of their control and prevention. Information technology, as a technology with the fastest rate of development and application in all branches of business, requires adequate protection to provide high security. The focus of the safety analysis applied on an information system is to recognize and evaluate threats, vulnerabilities and safety characteristics. IT assets are uncovered to risk of harm or losses. IT security includes protecting information stored electronically. That protection implies data integrity, availability and confidentiality. According to“Risk Assessment of Information Technology Systems” (2009) risk assessment is the most critical part of Information Security Management (ISM).  Risk Management and Risk Assessment involves analysis, planning, implementation, control and monitoring of implemented measurements, and Risk Assessment, as part of Risk Management. It involves several processes: · Risk identification, · Relevant risk analysis, · Risk evaluation The main purpose of Risk Assessment is to make a choice whether a system is acceptable, and which measures would provide its acceptability. For every organization using IT in its business process it is important to conduct the risk assessment. Numerous threats and vulnerabilities...

Words: 742 - Pages: 3

Premium Essay

Risk Management Process

...Risk Management process- Comparison with Individuals and Corporate Entities:Literally speaking, risk management is the process of minimizing or mitigating the risk. It starts with the identification and evaluation of risk followed by optimal use of resources to monitor and minimize the same.Risk generally results from uncertainty. In organizations this risk can come from uncertainty in the market place (demand, supply and Stock market), failure of projects, accidents, natural disasters etc. There are different tools to deal with the same depending upon the kind of risk.Ideally in risk management, a risk prioritization process is followed in which those risks that pose the threat of great loss and have great probability of occurrence are dealt with first. Refer to table below: | | IMPACT | ACTIONS | SIGNIFICANT | Considerable Management Required | Must Manage and Monitor Risks | Extensive Management essential | MODERATE | Risk are bearable to certain extent | Management effort worthwhile | Management effort required | MINOR | Accept Risks | Accept but monitor Risks | Manage and Monitor Risks |   | LOW | MEDIUM | HIGH | | LIKELIHOOD | The above chart can be used to strategize in various situations. The two factors that govern the action required are the probability of occurrence and the impact of the risk. For example a condition where the impact is minor and the probability of occurrence is low, it is better to accept the risk without any interventions. A condition...

Words: 1191 - Pages: 5

Premium Essay

Very Good Dude

...RISK MANAGEMENT GUIDE FOR DOD ACQUISITION Sixth Edition (Version 1.0) [pic] AUGUST, 2006 Department of Defense Preface The Department of Defense (DoD) recognizes that risk management is critical to acquisition program success (see the Defense Acquisition Guidebook (DAG), Section 11.4). The purpose of addressing risk on programs is to help ensure program cost, schedule, and performance objectives are achieved at every stage in the life cycle and to communicate to all stakeholders the process for uncovering, determining the scope of, and managing program uncertainties. Since risk can be associated with all aspects of a program, it is important to recognize that risk identification is part of the job of everyone and not just the program manager or systems engineer. That includes the test manager, financial manager, contracting officer, logistician, and every other team member. The purpose of this guide is to assist DoD and contractor Program Managers (PMs), program offices and Integrated Product Teams (IPTs) in effectively managing program risks during the entire acquisition process, including sustainment. This guide contains baseline information and explanations for a well-structured risk management program. The management concepts and ideas presented here encourage the use of risk-based management practices and suggest a process to address program risks without prescribing specific methods or tools....

Words: 12584 - Pages: 51

Premium Essay

Risk Breakdown Structure

...Use a Risk Breakdown Structure (RBS) to Understand Your Risks David Hillson, PhD, PMP, FAPM, MIRM, MCMI, Director of Consultancy, Project Management Professional Solutions Limited Introducing the Risk Breakdown Structure (RBS) The risk management process aims to identify and assess risks in order to enable the risks to be understood clearly and managed effectively. The key step linking identification/assessment of risks with their management is understanding. This is, however, the area where the project manager or risk practitioner gets least help from current guidelines or practice standards. There are many commonly used techniques for risk identification (see, for example, the risk management chapter of A Guide to the Project Management Body of Knowledge (PMBOK® Guide, Project Management Institute, 2000). These identification techniques, however, tend to produce an unstructured list of risks that often does not directly assist the project manager in knowing where to focus risk management attention. Qualitative assessment can help to prioritize identified risks by estimating probability and impacts, exposing the most significant risks; but this deals with risks one at a time and does not consider possible patterns of risk exposure, and so also does not provide an overall understanding of the risk faced by the project as a whole. In order to understand which areas of the project might require special attention, and whether there are any recurring risk themes, or concentrations...

Words: 3206 - Pages: 13

Premium Essay

Risk Management

... Risk Management Plan Version My signature indicates approval of this Risk Management Plan. Prepared by: Project Manager Approved by: Project Sponsor Approved by: Agency CIO Table of Contents 1 Purpose 3 2 Risk PLanning Process 3 2.1 Risk Management Planning 3 2.2 Risk Identification Process 3 2.3 Risk Analysis 3 2.4 Risk Response Planning 3 2.5 Risk Monitor and Control 3 3 Risk Planning Detail 4 3.1 Methodology 4 3.2 Risk Roles and Responsibilities 4 3.3 Budget 5 3.4 Risk Management Activities 5 3.5 Risk Categories 6 3.6 Definitions of Risk Probability and Impact 6 3.7 Reporting 7 4 Issue Management 8 Attachment A: Department of Information Technology (DoIT) Risk Categories 9 Attachment B: Sample Risk Register 10 Revision History |Date |Version |Description |Author | | | | | | | | | | |