Premium Essay

Risk Communication

In:

Submitted By wilm4fun
Words 2156
Pages 9
Risk Communication
On March 28, 1979, America’s worse commercial nuclear accident occurred – a partial meltdown of the reactor core at the Three Mile Island nuclear power plant near Middletown, Pennsylvania. In the early hours and days of the Three Mile Island accident, nobody knew for sure what was happening. Metropolitan Edison, owner of the nuclear plant, put their best face on and tried to make the most reassuring statements it could given what was known at the time. So as the news got worse, Metropolitan Edison had to keep going back to the public and the authorities to say, if effect, “it’s worse than we thought.” Coordination lacked between local, state, and federal regulatory agencies and neither Met Ed nor the Nuclear Regulatory Commission had a “disaster” public information plan. News reports reflected this communication gap with utter confusion and misinformation. The imprecise reports and inaccurate information led to panic, and more than one hundred thousand residents, mostly children and pregnant women, fled the area. It was believed that clear, understandable information was all that was needed to make people see that the risks were lower than many feared. This paper will define risk communication; explain how risk communication methods are developed; and discuss a well-known risk communication campaign.
Sound and thoughtful risk communication can assist public officials in preventing ineffective, fear-driven, and potentially damaging public responses to serious crises such as the Three Mile Island nuclear power plant accident. Historically, risk communication was largely a one-way form of communicating, with the public being told what the experts thought to be important. Today, risk communication is an interactive process of exchange of information and opinion among individuals, groups, and institutions; often involves multiple messages

Similar Documents

Premium Essay

Food Risk Communication

...FOOD RISK COMMUNICATION, PROBLEMS AND ISSUES CONFRONTING COMMUNICATORS INTRODUCTION Risk communication is an integral part of risk analysis and an inseparable element of the Risk Management Framework (RMF). Risk communication helps to provide timely, relevant and accurate information to, and obtain information from, members of the risk analysis team and external stakeholders, in order to improve knowledge about the nature and effects of a specific food safety risk. Successful risk communication is a prerequisite for effective risk management and risk assessment. It contributes to transparency of the risk analysis process and promotes broader understanding and acceptance of risk management decisions. Risk communication is defined as an interactive exchange of information and opinions throughout the risk analysis process concerning risk, risk-related factors and risk perceptions among risk assessors, risk managers, consumers, industry, the academic community and other interested parties, including the explanation of risk assessment findings and the basis of risk management decisions (Codex Alimentarius Commission). The risk communication process Risk communication can be difficult to do well. It requires specialized skills and training, to which not all food safety officials have had access. It also requires extensive planning, strategic thinking and dedication of resources to carry out. Since risk communication is the newest of the three components of risk analysis to have...

Words: 1828 - Pages: 8

Premium Essay

Effect of a Virtual Project Team Environment on Communication-Related Project Risk

...International Journal of Project Management 28 (2010) 422–427 www.elsevier.com/locate/ijproman Effect of a virtual project team environment on communication-related project risk April H. Reed *, Linda V. Knight 1 Department of Management Information Systems, College of Business, East Carolina University, United States College of Computing and Digital Media, DePaul University, United States Received 25 March 2009; received in revised form 13 July 2009; accepted 4 August 2009 Abstract Over 150 Information Technology practitioners participated in a study of differences in communication risk between traditional project teams and those that operate virtually, with some team members physically remote. Contrary to prior research, results indicate the level of risk from inadequate communication is not significantly greater when team members are not grouped in one location. Further, despite increased dependence of virtual teams on technology for communication, there was no evidence of significantly more project risk due to technological failure. However, virtual team projects exhibited notably more risk due to insufficient knowledge transfer. A plausible explanation is decreased implicit or informal knowledge transfer in virtual environments. We conclude that the possibility of insufficient knowledge transfer should be included in virtual project risk management plans, and consideration should be given in such projects to the extent to which knowledge that is traditionally shared implicitly...

Words: 4167 - Pages: 17

Premium Essay

Advantages for Moving Corporate E-Mail to the Cloud

...productivity from flexibility or mobile accessibility. Regardless of where employees are, enterprise communications functionality can be delivered in real time. The business efficiency raises productivity because employees are able to make contributions to their work anytime, anywhere. Collaboration is increased as a lot less time are wasted. The further benefit from this advantage is that this help build up client relationship with increased client intimacy since it is appeared to them as the communication is made from the professional office. http://www.communigate.com/Papers/NB47_Communigate.pdf http://www.slideshare.net/XOCommunications/cloud-communications-top5-advantages 2) Reduced cost on software updates is another advantage. No more previous troublesome downloading or installing for communication software. Could communication suppliers are responsible to do all of the updates. So, work efficiency increased because people are only focusing on main competencies to the business. http://www.telepresence24.com/?p=1913 3) Cost savings. The reason capital expense will decrease is that cost associated with network and equipment for cloud communication are mainly operating cost rather than management activities or other sophisticated internal IT requirements. No initial capital investment required to set up the infrastructure or in-house expert. The risks associated as a consequence are as follows: 1) The first concern comes to me is date security issue...

Words: 590 - Pages: 3

Premium Essay

Communication in Science

...Chapter 6: Communication Chapter Outline 1. Introduction of topics and concepts to be discussed in the chapter. a. Mission b. Principles i. Customer Focus ii. Leadership Commitment iii. Inclusion of Communications in Planning and Operations iv. Information Collection, Analysis and Dissemination v. Media Partnership c. Conclusion 2. Case Studies a. Risk Communication During the Washington D.C. Sniper Crisis b. The Homeland Security Advisory System c. A Comparison of Leadership Between Two Outbreaks of Smallpox in the United States: New York City, 1947, and Milwaukee, 1894 3. Additional Sources of Information 4. Glossary of Terms 5. Acronyms 6. Discussion Questions a. General b. Washington, DC Sniper c. Homeland Security Advisory System d. Smallpox Outbreaks 7. Suggested Out of Class Exercises Introduction Communications has become an increasingly critical function in emergency management. The dissemination of timely and accurate information to the general public, elected and community officials and the media plays a major role in the effective management of disaster response and recovery activities. Communicating preparedness, prevention and mitigation information promotes actions that reduce the risk of future disasters. Communicating policies, goals and priorities to staff, partners and participants enhances support and promotes a more efficient disaster...

Words: 23767 - Pages: 96

Premium Essay

Wireless Technology

...well being of the business based on how they are managed. Positive Effects In the workplace, there are certain amenities that will allow for increased productivity compared to an atmosphere without them. The wireless networks in tandem with the technology that utilizes their benefits such as smartphones, tablets and wireless computers to make communication more efficient. By making it easier to connect with coworkers, there becomes a new array of possibilities that present themselves. The reduction in the amount of travel that is required to get the same amount of work done plays a huge part in all of this, in fact the article states “…the IAAP poll also showed that 86 percent of surveyed execs think that workers will be more accessible for collaboration in the future – even while on vacation.” Telecommunicating has become a phenomenon in the modern workplace that allows workers to work remotely from home or from a local café, increasing productivity. Negative Effects The “side-effects” that play a huge role as well, in a negative aspect, are distraction and the security. There are inevitably going to be security risks when wireless technology is introduced, the possibility of leaks becomes almost impossible to thwart...

Words: 532 - Pages: 3

Premium Essay

Audit Test Bank Ch 13 &14

...Decision Making Blooms: Remember Difficulty: 1 Easy Learning Objective: 13-02 Be able to identify and describe the types of documents and records used in the inventory management process. Topic: Types of Documents and Records   3. Sale of finished goods is a part of the inventory management process.  FALSE   AACSB: Analytic AICPA BB: Industry AICPA FN: Decision Making Blooms: Remember Difficulty: 1 Easy Learning Objective: 13-03 Understand the functions in the inventory management process. Topic: The Major Functions   4. Once the controls in the inventory system have been tested, the auditor sets the level of control risk.  TRUE   AACSB: Analytic AICPA BB: Industry AICPA FN: Risk Analysis Blooms: Remember Difficulty: 1 Easy Learning Objective: 13-06 Know how to assess control risk for the inventory system. Topic: Control Risk Assessment   5. The major control procedure for preventing fictitious inventory transactions from being recorded is proper segregation of duties.  TRUE   AACSB: Analytic AICPA BB: Industry AICPA FN: Decision Making Blooms: Apply Difficulty: 1 Easy Learning Objective: 13-07 Know key internal controls and develop relevant tests of controls for inventory transactions. Topic: Control...

Words: 15455 - Pages: 62

Premium Essay

Case Analysis: the Ipremier Company - Denial of Service Attack

...to the rule. Created by two college students in 1996, the web-based company had solidified its business position as a top online retailer of high-end, luxury goods with $32 million in sales and $2.1 million in profit for 2006. Consumers bought directly from iPremiere using credit cards, which were then stored on the company’s servers. In 2007, computer hackers launched a Denial of Service (DoS) attack on iPremiere’s website, temporarily shutting down the website and taunting iPremiere with emails. The possibility of hackers breaching its security firewall is extremely troubling because it puts customer financial information at risk and the loss of this public trust would be disastrous for iPremiere. The purpose of this paper is to assess why iPremiere was vulnerable to attack, examine their approach to both IT risk management and crisis communications and offer recommendations that foster customer trust and company profitability in the future. SWOT Analysis A brief SWOT analysis shows that iPremier’s strengths include good placement in the e-commerce marketplace and a highly experienced and productive team of managers and software developers dedicated to meeting company expectations. Weaknesses include weak IT security and outdated crisis management procedures. Opportunities revolve around maximizing its financial position in an e-commerce field focused on luxury, high-end retail items, while cyber hackers and potential lawsuits from other companies and customers pose considerable...

Words: 1167 - Pages: 5

Premium Essay

Metabical

...METABICAL In this case, Cambridge Sciences Pharmaceuticals (CSP) developed a new weight-loss drug named Metabical. In order to manufacture Metabical and launch it into market successfully, CSP had made market research, product experiment, and market communications strategy. Based on my analysis, CSP’s plan should be a medium risk strategy. The reasons were, it would be a little difficult to target the right customers in overweight segmentation, and people did not have any measuring standards for Metabical. The first reason was it would be a little difficult to target the right customers in overweight segmentation. Metabical was the first prescription drug which targeted at overweight group. Before Metabical was developed, there was no drug for the Body Mass Index (BMI) between 25 and 30 (Gonzalez, 2014, p. 25). Until CSP noticed in this segment that would be a potential market, then they advanced Metabical. But there were different preference customers in the overweight group which could divide by age, gender, psychographic data and educational level. In other words, if CSP wanted to locate the right customers accurately, it would have to do amount market surveys. The second reason was people did not have any measuring standards for Metabical, which indicated they were not familiar with this new product that might lead people not to trust Metabical at the first place. To build credibility and good reputation always needed...

Words: 375 - Pages: 2

Premium Essay

Contemporary  Challenges  for  It  Managers

...Contemporary  Challenges  for  IT  Managers Tutorial  3 Topic(s): Globalisation,  Outsourcing  /  Offshoring Instructions: Due:  Tutorials  1-4  due  4:00pm  on  Friday  of  Week  4 Where  to  submit:  Moodle 1. What  information  is  provided  or  issues  raised  by  the  video  on  the  slide  titled“Globalisation  –  Video  1”  in  the  “Globalisation”  lecture? 2. What  is  Globalisation? * Globalization is a new contemporary stage of development of capitalism over the world. It is a process of social change in which geographic and cultural barriers are reduced. Also is the process of transformation of local or regional things or phenomena into global ones. 3. What  information  is  provided  or  issues  raised  by  the  video  on  the  slide  titled “Globalisation  –  Video  2”  in  the  “Globalisation”  lecture? 4. How  was  early  globalisation  characterised? * The first phase of globalisation in the late nineteenth century was characterised by an integration of markets through an exchange of goods that was facilitated by the movement of capital and labour across national boundaries. * The second phase of globalisation is characterised by an integration of production with linkages that are wider and deeper. 5. Describe  the  forces  that  drove  globalisation. * Berlin Wall/ Communism * Windows * World Wide Web (WWW) * Work Flow Software / Standards * Uploading * Outsourcing * Offshoring ...

Words: 712 - Pages: 3

Premium Essay

Risk Assessment

...strategy that made use of technological innovation and automation of their systems. However, as GFI experienced a steady growth in its financial operation, a significant security risk lack within its network. GFI relies on its application servers; the Oracle database and the email system that are the backbone of the GFI financial operations. The financial and cash flow system of the company solely depends on the network, any network breakdown, and system failure would be catastrophic for the business and its clients. The recent multiple cyber attacks on the GFIs network and the 2012 Oracle server attack that left the company integrity, confidentiality and availability venerable for several days. Although the servers were restored, the damage was extensive and lead GFI to pay for clients damages in their loss of data confidentiality. Another attack left the entire GIF network down that lead to losses in revenues and intangible customer confidence to the tunes of over a million US dollars. Risk Assessment Purpose The aim of this risk assessment is to evaluate the details of GFI network security. Further, the risk assessment is to come up with a structured qualitative assessment of GFIs network environment and provide possible solutions for mitigating the sensitivity, threats, vulnerabilities, risks and safeguards of the GFIs network. Besides, the assessment will recommend on a potential cost-effective assurance that will combat the threats and associated exploitable...

Words: 2661 - Pages: 11

Premium Essay

Discuss Critically the Opportunities and Risks of Distance in International Expansion

...technological advancements in communication and transportation have given firms the opportunity to expand internationally by accessing untapped markets and resources. However, companies routinely exaggerate the attractiveness of foreign markets, which leads to expensive mistakes. This essay shall discuss the opportunities and risk associated with distance in international expansion. According to Ghemawat (2001), distance between two countries can manifest itself along four basic dimensions: cultural, administration, geographic and economic. Geographic distance, for instance, affects the costs of transportation and communications and is particularly importance to companies that deal with heavy or bulky products. Cultural distance, by contrast, affects consumer’s product preferences. It is a crucial consideration for any consumer goods or media company but it is much less important for a cement or steel business. Administrative distance involves historical and political associations shared by countries that greatly affect trade between them. Economic distance states that the wealth or income of consumers is the most important economic attribute, which creates distance between countries and has a marked effect on the levels of trade and types of partners a country trades with. The opportunities and risk associated with distance are based on the four dimension stated above where differences in each dimension can either be an opportunity to exploit or a risk to consider when companies...

Words: 732 - Pages: 3

Premium Essay

Involvement Theory

...Question 2: “High involvement products are always high risk and always expensive”. Using examples, discuss the validity of this statement and reflect upon strategies that marketers might employ to reduce level of risk in a purchase decision situation. Involvement is defined as a person’s perceived relevance of the object based on their inherent needs, values and interest (Solomon et al., 2006). It has a major influence on consumers’ decision-making and communication behaviors (Michaelidou and Dibb, 2006). There are two types of involvement that consumers would have when purchasing for a product/ service: enduring involvement (Zaischkowsky, 1985), which refers to the importance of the product to the consumer’s self-concept and situational involvement (Dholakia, 1997), which refers as a term suggests, occurs only in specific situations. Risk has been linked directly with the level of involvement. There are 6 types of risks (Jacoby & Kaplan, 1972) including monetary, social, psychological, functional, physical and time. In this essay, the link between “high involvement products” and “high risk” would be examined. Then the implication for marketers to reduce the level of risk in a purchase decision situation would be mentioned. First of all, the decision making process would be used as the primary key to access this issue. It is the process that consumers go through when purchasing for a product/ service with 5 stages including problem recognition, information search,...

Words: 1285 - Pages: 6

Free Essay

Risk Management

...Big Three: General Motors (GM), Ford, and Chrysler and presents the risk factors that could potentially undermine GM again. GM made an enormous mistake when they ignored their customers’ demands for fuel efficient vehicles. GM primarily focused on the production and distribution of sport utility vehicles (SUV) because they could make a larger profit off of such a vehicle. With the downfall of the economy, customers were not looking to purchase a large vehicle that would be additionally costly in terms of fuel so they turned to such foreign competitors as Toyota. When all was said and done, GM incurred a financial loss of $69.6 billion. (Wikipedia) Learning from its mistakes, this paper will explore how the biggest risk facing GM is a repeat in history: bankruptcy as a result of foreign competition. GM must address the demands of a changing economy by a very focused, responsive, and resilient approach. Risk Register for GM Risk Source Severity (1-3) + Likelihood (1-3) + Controllability(1-3) = Risk Level 1. Loss of employees 3 1 2 6 2. Loss of site 3 2 2 7 3. Loss of power 2 3 3 8 4. Loss of computing 2 2 2 6 5. Transportation disruptions 2 2 2 6 6. Loss of records 2 1 2 5 7. Inability to deliver supplies 2 1 2 5 8. Foreign Competition 3 3 3 9 1 represents the lowest risk and 3 represents the highest risk (1 = controlled, 3 = not controlled) Foreign Competition As evidenced...

Words: 2098 - Pages: 9

Premium Essay

Jit2 Task

...I developed a risk response for each risk describing how things can be done in order to reduce possible damage to the corporation. Technology Risk – In order to reduce technology risk to the business the company should secure all computers and data with latest encryption technologies. Also the company should look into installing and upgrading anti-virus and ant-spyware applications. Company employees should be trained to understand current IT policies and procedures, so that they can help with the process of preventing data loss. Equipment Risk Security Risk – In order to prevent physical security risks the company should controls such as management, physical, and technical. Management controls include developing policies that regulate entrance and exit procedures and requirements for visitor’s access. Physical controls consist of installing locks, doors and fences around areas that require restricted access. They should also consider hiring security guards to deal with access control. Technical controls involve the use od ID badges, sign-in sheets, and cameras. These devices help to monitor activity of people in the facility and will alert security if unauthorized access is detected. These three controls will help to prevent security breaches in the facility. Communication Risk - When dealing with foreign customers' employees should take refresher course on foreign languages and customs. In may be in the best interest of the company to hire consultants to help guide...

Words: 406 - Pages: 2

Premium Essay

Financial Statement

...establishes standards and provides guidance to auditors in fulfilling that responsibility, as it relates to fraud, in an audit of financial statements conducted in accordance with generally accepted auditing standards (GAAS).2 .02 The following is an overview of the organization and content of this section: • • • Description and characteristics of fraud. This section describes fraud and its characteristics. (See paragraphs .05 through .12.) The importance of exercising professional skepticism. This section discusses the need for auditors to exercise professional skepticism when considering the possibility that a material misstatement due to fraud could be present. (See paragraph .13.) Discussion among engagement personnel regarding the risks of material misstatement due to fraud. This section requires, as part of planning the audit, that there be a discussion among the audit team members to consider how and where the entity's financial statements might be susceptible to material misstatement due to fraud and to reinforce the importance of adopting an appropriate mindset of professional skepticism. (See paragraphs .14 through .18.) 1 The auditor's consideration of illegal acts and...

Words: 25387 - Pages: 102