Premium Essay

Risk Assignment

In:

Submitted By themz5369
Words 1343
Pages 6
QUESTION 1.1
Quality Control Risk
Definition:
A speculative (possibility of a positive or negative outcome; not a “pure risk”) uncertainty associated with relying on the quality controls of outsourced supplier.
Application:
There is a risk that Bulldog Trailers Ltd may obtain inferior quality “extras” from suppliers , should the suppliers change their strategy in future and decide reduce their input costs to survive possible recessionary times. (NB: Made those words bold to show my understanding of how risk relates to an uncertainty)
Bulldog Trailers Ltd has no quality control over the “extras” sourced from external suppliers. This is because the “extras” require specialised production technology that the company does not have. It will be difficult for Bulldog Trailers Ltd to verify that the “extras” have been built using consistent standards and specifications, despite the fact that the suppliers are “selected on the basis of quality”.
Reputational Risk
Definition: A speculative uncertainty that is associated with the public’s perception of a company because of quality controls around a product, service delivery and the overall customer experience.
Application: There is a risk that Bulldog Trailers Ltd may have a tainted reputation as the result of the possibility of clients not being satisfied with the quality of the “extras”. The clients may spread the word about the poor quality of the “extras” and return the trailers for a full refund.
Third party risk
Definition: A pure (outcome that can only be bad) uncertainty linked with the reliance on third parties to deliver critical components of the finished product.
Application: There is a risk that the external suppliers may delay delivery of the “extras” to Bulldog Trailers Ltd, which creates a possibility of Bulldog delivering the completed trailer late to the consumer. This may harm the reputation

Similar Documents

Free Essay

Risk Management Hw Assignment #3

...Homework Assignment 3 12 Points Due on Wednesday, February 19, 2014 AT THE BEGINNING OF CLASS Be careful to follow the Guidelines for Homework Document located in the Course Documents Section of Blackboard. Hint: Read the questions carefully and be sure that what you write answers the questions. Many times students give correct information in an answer but that information is not the answer to the question. 1. Refer to the article How Toyota Lost Its Way. a. From an ERM perspective, identify and briefly discuss two types of ERM risks. [4 points] 1.) Operational risk: An example of operational risk would be how Toyotas reputation for designing high quality cars has been damaged. It was damaged due to the dangers of the defective parts that were manufactured. Poor customer service also applies due to foreign communication issues where feedback would take too long to travel back and forth between countries. The slow response resulted in a $16.4 million dollar fine. 2.) Hazard risk: An example of a Hazard risk would be that Toyota is liable for the health and safety of the customers that got into an accident due to the car’s defective parts that were manufactured. This resulted in a number of lawsuits and fatal injuries. b. For each risk you identify, indicate if it is a pure or speculative risk. Justify your answer in both cases. [4 points] 1.) The operational risk mentioned would be considered a pure risk because...

Words: 426 - Pages: 2

Premium Essay

Fin 550 Assignment 2: High Risk Investments

...550 Assignment 2: High Risk Investments http://hwguiders.com/downloads/fin-550-assignment-2-high-risk-investments/ FIN 550 Assignment 2: High Risk Investments FIN 550 Assignment 2: High Risk Investments http://hwguiders.com/downloads/fin-550-assignment-2-high-risk-investments/ FIN 550 Assignment 2: High Risk Investments FIN 550 Assignment 2: High Risk Investments http://hwguiders.com/downloads/fin-550-assignment-2-high-risk-investments/ FIN 550 Assignment 2: High Risk Investments FIN 550 Assignment 2: High Risk Investments http://hwguiders.com/downloads/fin-550-assignment-2-high-risk-investments/ FIN 550 Assignment 2: High Risk Investments FIN 550 Assignment 2: High Risk Investments http://hwguiders.com/downloads/fin-550-assignment-2-high-risk-investments/ FIN 550 Assignment 2: High Risk Investments FIN 550 Assignment 2: High Risk Investments http://hwguiders.com/downloads/fin-550-assignment-2-high-risk-investments/ FIN 550 Assignment 2: High Risk Investments FIN 550 Assignment 2: High Risk Investments http://hwguiders.com/downloads/fin-550-assignment-2-high-risk-investments/ FIN 550 Assignment 2: High Risk Investments FIN 550 Assignment 2: High Risk Investments http://hwguiders.com/downloads/fin-550-assignment-2-high-risk-investments/ FIN 550 Assignment 2: High Risk Investments FIN 550 Assignment 2: High Risk Investments http://hwguiders.com/downloads/fin-550-assignment-2-high-risk-investments/ FIN 550 Assignment 2: High...

Words: 1650 - Pages: 7

Premium Essay

Bus 519 Assignment 3: Risk Workshop and Risk Register ( Eqi in Siwa )

...BUS 519 Assignment 3: Risk Workshop and Risk Register ( EQI in SIWA ) https://homeworklance.com/downloads/bus-519-assignment-3-risk-workshop-risk-register-eqi-siwa/ Due Week 6 and worth 240 points Note: The assignments are a series of papers that are based on the same case, which is located in the Student Center of the course shell. The assignments are dependent upon one another. Write an eight to ten (8-10) Risk Workshop and Risk Register Component paper in which you: 1. Identify the required pre-workshop activities. 2. Prepare a risk workshop agenda based on Figure B-8, Sample Agenda for a First Risk Assessment / Two – Day Risk Workshop (Appendix B of the Hillson and Simon text). Include suggested time intervals for each activity and justify why each agenda item is relevant for this case. 3. Determine the top five (5) threats in a risk register following Figure B-11, Sample Simplified Risk Register Format (Appendix B of the Hillson and Simon text). Include information from the case for each threat. 4. Justify the assignment of probability and impacts for each threat identified in criterion number 3 of this assignment. 5. Document the top three (3) opportunities in a risk register following Figure B-11, Sample Simplified Risk Register Format (Appendix B of the Hillson and Simon text). Include information from the case for each opportunity. 6. Justify the assignment of probability and impacts for each opportunity identified in criterion number 5 of this assignment...

Words: 407 - Pages: 2

Premium Essay

Bus 519 Assignment 3: Risk Workshop and Risk Register ( Eqi in Siwa )

...BUS 519 Assignment 3: Risk Workshop and Risk Register ( EQI in SIWA ) https://homeworklance.com/downloads/bus-519-assignment-3-risk-workshop-risk-register-eqi-siwa/ Due Week 6 and worth 240 points Note: The assignments are a series of papers that are based on the same case, which is located in the Student Center of the course shell. The assignments are dependent upon one another. Write an eight to ten (8-10) Risk Workshop and Risk Register Component paper in which you: 1. Identify the required pre-workshop activities. 2. Prepare a risk workshop agenda based on Figure B-8, Sample Agenda for a First Risk Assessment / Two – Day Risk Workshop (Appendix B of the Hillson and Simon text). Include suggested time intervals for each activity and justify why each agenda item is relevant for this case. 3. Determine the top five (5) threats in a risk register following Figure B-11, Sample Simplified Risk Register Format (Appendix B of the Hillson and Simon text). Include information from the case for each threat. 4. Justify the assignment of probability and impacts for each threat identified in criterion number 3 of this assignment. 5. Document the top three (3) opportunities in a risk register following Figure B-11, Sample Simplified Risk Register Format (Appendix B of the Hillson and Simon text). Include information from the case for each opportunity. 6. Justify the assignment of probability and impacts for each opportunity identified in criterion number 5 of this assignment...

Words: 407 - Pages: 2

Free Essay

Week 4 Assignment 2: Organizational Risk Appetite and Risk Assessment

...Week 4 Assignment 2: Organizational Risk Appetite and Risk Assessment Abstract This report will touch on what is needed to prepare in case of untimely disaster and what should be done when the worse has happen and you need to recover. We will take a look at what the business impact analysis look like and the company risk assessment for our company and look for risk that can be handled and risk the most be avoided and try to come up with a plans and policies for how to handle all future risks and problems. ”Business Impact Analysis (BIA) determines the importance of the organization’s activities by assessing the impact over time, if they are interrupted, and establishes continuity and recovery objectives”. (Engemann & Henderson, 2012) When looking to make a Business Impact Analysis we need to talk a look at all the resources of our company and what they do for the company. Then we figure what each piece need in the event of a crisis and how long and how much money it will take to get back on line so let take a look at the most valuable piece of equipment and work our way to the most expandable piece of equipment. The first and most important is the 3 file servers which is the central storage and the managing of data files to the company. These servers house not only private information on the company but also customer information. This means if they are damage or found missing work is loss and vital customer data is either gone or in a worse case stolen. This...

Words: 2047 - Pages: 9

Premium Essay

Bus 519 Assignment 3: Risk Workshop and Risk Register ( Eqi in Siwa )

...BUS 519 Assignment 3: Risk Workshop and Risk Register ( EQI in SIWA ) Follow Below Link to Download Tutorial https://homeworklance.com/downloads/bus-519-assignment-3-risk-workshop-risk-register-eqi-siwa/ For More Information Visit Our Website ( https://homeworklance.com/ ) Email us At: Support@homeworklance.com or lancehomework@gmail.com Due Week 6 and worth 240 points Note: The assignments are a series of papers that are based on the same case, which is located in the Student Center of the course shell. The assignments are dependent upon one another. Write an eight to ten (8-10) Risk Workshop and Risk Register Component paper in which you: 1. Identify the required pre-workshop activities. 2. Prepare a risk workshop agenda based on Figure B-8, Sample Agenda for a First Risk Assessment / Two – Day Risk Workshop (Appendix B of the Hillson and Simon text). Include suggested time intervals for each activity and justify why each agenda item is relevant for this case. 3. Determine the top five (5) threats in a risk register following Figure B-11, Sample Simplified Risk Register Format (Appendix B of the Hillson and Simon text). Include information from the case for each threat. 4. Justify the assignment of probability and impacts for each threat identified in criterion number 3 of this assignment. 5. Document the top three (3) opportunities in a risk register following Figure B-11, Sample Simplified Risk Register Format (Appendix B of the Hillson and Simon...

Words: 432 - Pages: 2

Premium Essay

Fin 402 Week 4 Individual Assignment Risk

...Risk and Return Tradeoff Memo Analyzing the risk and return tradeoffs associated with Casa Bonita’s portfolio Diversity is an important part of any portfolio; diversity in the industries chosen for investment and in the level of risk undertaken are the two most important factors when considering how to construct a corporate investment portfolio.(3) Casa Bonita is a growing company and it is important that we invest our capital wisely if we are planning to use the gains to fund expansion and corporate growth. As corporate officers we have a duty to our employees, our customers, and the corporate community to be measured and knowledgeable about every investment decision we make. Investment decisions should almost be methodical, however due to the nature of the stock market it is hard to be methodical as there is a certain level of predictability that must be present for us to become methodical in our investment decision making. Decisions made during the simulation As the Treasury Analyst for Casa Bonita during the simulation it was my job to build the corporate investment portfolio in a manner that would produce the largest amount of returns while taking the minimum amount of risk. Initially the market conditions were great with multiple stocks expected to perform above average, however it was still important to include stocks that would perform well even in an economic downturn in our portfolio. The inclusion of “recession proof” securities provides stability, or a foundation...

Words: 742 - Pages: 3

Premium Essay

Assignment One Application of Risk Management Techniques

... namely sales personnel, could be the biggest vulnerability, but by training, utilizing AD password controls and maintaining accountability the risk of their laptop being lost, stolen or compromised decreases sharply. This is a risk that can be easily evaluated through mitigation, keeping the employees accountable for their equipment, and minimizing cost to the enterprise. With such a wide geographical area the sales employees workstations may be infected or compromised without their knowledge, which would be rare, but plausible. This can be worked with, but will leave residual risk. Equipment can be provided to users such as laptop desk locks or even increades security using biometrics. A cost-benefit analysis should be performed. The routers at the remote sites may be susceptible to intrusion attacks, if no Intrusion Detection/ Prevention system is in place. As a remote site it is also possible that iOS patches and the like may not be current. Documentation, vulnerability monitoring and mitigation by adding preventative measures, such as encryption are advisable at production and headquarters site. As the servers house a proprietary Management system, it is of the highest priority that these servers be secured, physically and logically and be protected against attacks. The risk that this will go down is inherent. WE can...

Words: 376 - Pages: 2

Premium Essay

Nt1310 Unit 3 Assignment 1 Identification Risk Analysis

...2. Identified Risks There are a number of organisations that maintain a database of vulnerabilities. The list below is not exhaustive, but the vulnerabilities listed in this report have been extracted from Cve.mitre.org (n.d.). 2.1 The Catastrophic List These vulnerabilities were identified during the assessment and need urgent remediation as they pose a serious security risk to the organisation. ID Vulnerability Description Risk Category Remediation Method V001 A firewall is on the edge of the network acting as the first line of defence against any attempts to access the network without permission. However, the network not optimally protected, as the firewall is poorly managed. Catastrophic: Attempts to scan or penetrate network will not be detected all the time. • Operating system firewall installed where required. • Hardware firewall...

Words: 718 - Pages: 3

Premium Essay

Week 2 Assigment

...Week 2 Assignment: Understanding Effective Money Management Assessment A, Part 1: Creating a Personal Financial Statement - Assets | 1 point | Car: Bluebook value $1250.00Cash: $378.00Savings Accounts: $826.00 | Assessment A, Part 2: Creating a Personal Financial Statement - Debts | 1 point | Rent: $750.00Electric/ Gas bill: $131.75Cable/ internet/ Phone bill: $80.42Credit Card: $31.00Cell phone bill: $72.37 | Assessment A, Part 3: Identify Money Management Tool | 1 point | Explain to Monica how the money management tools were identified. | Students should explain how they evaluated various cash management products and services. | Assessment A, Part 4: Creating a Personal Financial Statement – Steps | 1 point | Drag the steps listed on the right into their correct sequences on the left. When done click the Send button | Step 1: I got all my financial stuff together – bills, loans, bank statements, etc. | Step 2: I balance my checkbook. | Step 3: I decided what were my assets and what were my debts. | Step 4: I enter my assets in the program. | Step 5: I enter my debts in the program. | Step 6: The program gave me a Net worth figure at the end. | Assessment B: Creating a Monthly Cash Flow Statement ...

Words: 255 - Pages: 2

Free Essay

Misconceptions of Algebra

...Diagnostic Algebra Assessment Definitions Categories Equality Symbol Misconception Graphing Misconception Definition Concept of a Variable Misconception Equality Symbol Misconception As algebra teachers, we all know how frustrating it can be to teach a particular concept and to have a percentage of our students not get it. We try different approaches and activities but to no avail. These students just do not seem to grasp the concept. Often, we blame the students for not trying hard enough. Worse yet, others blame us for not teaching students well enough. Students often learn the equality symbol misconception when they begin learning mathematics. Rather than understanding that the equal sign indicates equivalence between the expressions on the left side and the right side of an equation, students interpret the equal sign as meaning “do something” or the sign before the answer. This problem is exacerbated by many adults solving problems in the following way: 5 × 4 + 3 = ? 5 × 4 = 20 + 3 = 23 Students may also have difficulty understanding statements like 7 = 3 + 4 or 5 = 5, since these do not involve a problem on the left and an answer on the right. Falkner presented the following problem to 6th grade classes: 8 + 4 = [] + 5 All 145 students gave the answer of 12 or 17. It can be assumed that students got 12 since 8 + 4 = 12. The 17 may be from those who continued the problem: 12 + 5 = 17. Students with this misconception may also have difficulty with the idea that adding...

Words: 797 - Pages: 4

Free Essay

Prg/211 Calorie Count Tool

...Team B Calorie Count Tool PRG/211 May 5, 2014 Team B Calorie Count Tool PROBLEM STATEMENT Team B was asked to develop a program which would calculate the user’s daily intake of calories and measure those calories against the overall calories expended. The core purpose of this program will do two primary functions. First, it will record the user intake of calories as acquired through meals throughout the day. Second, the user will record caloric output associated with physical activity. This information will be calculated together to determine the caloric surplus or deficit for the user. In order for the program to execute accurately, and provide customized results, the user will be required to input personal data to include gender, age, weight, and height. This additional information is essential to determine the user’s default caloric burn rate, otherwise known as the basal metabolic rate (BMR). The BMR and the calories burned as a result of physical activity will be calculated against the intake of calories to determine the overall success for the user. As the program is executed it must: * Record user name, age, height, weight to enable more accurate calculations * Record the users specific caloric values entered for each meal * Record the user activity and caloric burn values for that activity * Calculate the basal metabolic rate (BMR) for the individual * Subtotal the total caloric values for the day * Combine the physical activity and...

Words: 1524 - Pages: 7

Premium Essay

Student

...Problem Solving with Computing Homework - WEEK 2 [30 points] This is a review of some of the material from Chapter 2 and lectures from class. No credit for answers that are copies or near verbatim transcripts – please use your own words1 and document sources where appropriate. 1 This will apply to all assignments in this class. Answer the following questions: Chapter 2 1. Short Answers [1 point each, 2 points total] 1. What does a professional programmer usually do first to gain an understanding of a problem? The first thing that a professional programmer usually do first to gain an understanding of a program is to closely relate customer (Interview ) to inquire or gather information about the problem. 2. What two things must you normally specify in a variable declaration? The two things normally specified in a variable declaration are the variable type and identifier. 2. Algorithms / Pseudocode [1 point each, 5 points total] 1. Design an algorithm that prompts the user to enter his or her height and stores the user’s input in a variable named height. Declare height Display “Enter Your Height” Input Height Display “Height” 2. Write assignment statements that perform the following operations with the variables a and b. - Adds 2 to a and stores the result in b. - Subtracts 8 from b and stores the result in a Set b=2+a Set a=b-8 3. Write a pseudocode statement that declares the variable cost so it can hold real numbers. Floating Point-Variable...

Words: 1823 - Pages: 8

Free Essay

Mobile Service Provider

...11108944 Name: ASHWINI KUMAR Roll No. : RE3R02B32 PART- A 1. Ans :- (a) unary and ternary operator Unary operator:- It pecedes an operand . The operand (the value on which the operator operates ) of the unary operator must have arithmetic or pointer type and the result is the value of the argument. Example:- If a=5 then +a means 5 If a=0 then +a means 0. If a=-4 then +a means -4. Ternary operator:- It precedes an operand. The operand of the unary operator must have arithmetic type and the result is the negation of the operand’s value. Example:- If a=5 then –a means -5 If a=0 then –a means 0 If a=-4 then –a means 4. (b) Assignment and equalto operator Assignment operator:- Equal to operator: An assignment operator assigns value In this we put the To a variable. value as it is. Example – Example- a*=5 means a=5*5. Int a; a=5 means a is initialized with 5 if(a==5) { return true; } return false; (c) Expression and statement Expression:- An expression is any valid combination of operators , constants , and variables. Example:- ...

Words: 399 - Pages: 2

Free Essay

Book Report

...Selection statements Selection is used to select which statements are to be performed next based on a condition being true or false. Relational expressions In the solution of many problems, different actions must be taken depending on the value of the data. The if statement in C I used to implement such s decision structure in its simplest form – that of selecting a statement to be executed only if a condition is satisfied. Syntax: if(condtion) statement executed if condition is true When an executing program encounters the if statement, the condition is evaluated to determine its numerical value, which is then interpreted as either true or false. If the condition evaluates to any non-0 value (positive or negative), the condition is considered as a “true” condition and the statement following the if is executed; otherwise this statement is not executed. Relational Operators In C Relational operator | Meaning | Example | < | Less than | age < 30 | > | Greater than | height > 6.2 | <= | Less than or equal to | taxable <= 200000 | >= | Greater than or equal to | temp >= 98.6 | == | Equal to | grade == 100 | != | Not equal to | number !=250 | In creating relational expressions, the relational operators must be typed exactly as given in the above table. Thus, although the following relational expressions are all valid: age > 40 length <= 50 temp >= 98.6 3 < 4 flag == done day != 5 The following are invalid: length =< 50 ...

Words: 1617 - Pages: 7