Evolution in enterprise risk management

Assignment Help Basic Computer Science
Reference no: EM132603118

Topic: Chapter 7 - "Turning the Organizational Pyramid Upside Down Ten Years of Evolution in Enterprise Risk Management at United Grain Growers"

Overview: Few companies stand out as successful pioneers in enterprise risk management (ERM), especially one that undertook the initiative almost 15 years ago. One such ERM pioneer was United Grain Growers (UGG), a conservative 100-year-old Winnipeg, Canada- based grain handler and distributor of farm supplies. Review the case study in Chapter Seven (7) in the Implementing enterprise risk management: Case studies and best practices textbook to understand the details of their ERM journey.

1. Why does a more participative management style ("tipping the pyramid over") lead to greater responsiveness to customers' needs, increased accountability, and more innovative solutions to challenges than a hierarchical "command and control" structure?

2. Under what circumstances might the hierarchical "command and control" structure produce superior results?

3. What factors do you believe led UGG/ AU to be pioneers in ERM? Was it the industry/ company/ history/ circumstances? Was it a changed organizational "culture" or perhaps good management? Describe the leading factor(s) in your response.

Reference no: EM132603118

Questions Cloud

What does a peer review process look like : Briefly answer each of these questions. Use APA style for any outside references. What does a peer review process look like? When does an assessment require.
Define a marketing strategy that incorporates snovio : Submit a 5 page paper (APA style) that defines a marketing strategy that incorporates Snovio and how value is created in a decentralized world.
How do you determine if an asset is impaired : Depreciation expense is related to assets that have useful lives and are actively used in business operations. How do you determine if an asset is impaired
Define database normalization : Define database normalization.
Evolution in enterprise risk management : "Turning the Organizational Pyramid Upside Down Ten Years of Evolution in Enterprise Risk Management at United Grain Growers"
Designing a new table for database name stock : Assume you are designing a new table for database name STOCK. In the new database it will have two table names PRODUCT and SUPPLIER
How investigators may have used techniques to solve a crime : Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains.
What is highest price the company should be willing to pay : A company manufactures three products, Determine what is the highest price the company should be willing to pay for an additional pound of materials?
Several theories of motivation : There are several theories of motivation, including Individual Differences, Equity Theory and Reinforcement Theory

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Lead a software development team to build a system

You have been asked to lead a software development team to build a system fulfilling the Statement of Need specified in project 1. Your team is employed by a small company. The customer wants a project that balances reasonable development cost, ti..

  What is its steady-state temperature

If the surface emissivity is 1.0 and the surface is not exposed to the sun, what is its steady-state temperature? If the surface is exposed to a solar flux of , and its absorptivity to solar radiation is 0.25, what is its steady-state temperature?

  Lower and upper bound of the interval

The three parameters of the function are the lower and upper bound of the interval, and the number of terms in the sum.

  Implementable crow foot erd

Create a fully labeled and implementable Crow's Foot ERD founded on the given scenario. You must involve all entities, relationships, and cardinalities.

  Explain the use of current technologies fight cyber crime

Explain to the university (in a whitepaper) the characteristics of high-tech crime also known as Internet, cyber, and computer crime. Explain the use of current technologies to both carry out and fight cyber crime.

  State the principle of defense in depth give two

define the principle of defense in depth. give two examples of how the principle might be applied one describing

  Preserve the verifiable integrity of digital evidence

How does this ensure that data are preserved unmodified? How can an analyst show that the original evidence is unmodified?

  Establishment of federal-state and local government laws

What are the issues and root causes that necessitates the enactment and/or establishment of Federal, state and local government laws,

  Object oriented data model and sql query definition

One Individual Assignment DreamHome Case Study, Object Oriented Data Model and SQL Query Definition, Database Operations and Data Recovery

  Weekly income on new sweaters and designer jeans

John makes $200 a week at his summer job and spends his entire weekly income on new sweaters and designer jeans since these are the only

  We have talked about variables for some time now

We have talked about variables for some time now. However, Chapter 6 introduces the concept of an array.

  Calculate the coefficient of variation for data set

Consider the following two sample data sets.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd