Transforming Risk Management at Akawini Copper

Assignment Help Basic Computer Science
Reference no: EM132355886

Discussion- 1

Chapter 29: Transforming Risk Management at Akawini Copper

1. If you were conducting interviews of the Akawini management team so that you could draw objective conclusions for the review described in the chapter, what questions would you ask?

• What are some of risk assessment that needs to be implement in the Akawini copper and how will they impact change in the organization?

• How can one relate the risk involved with the company objectives?

• What are some of suggested improvement that needs to be imposed in the company to minimize some of weaknesses and change of approach in its performance?

• As an executive leader, what are some of critical assurance that one can give to ensure that the company lies on ISO 31000:2009 and also in clause 3 of the risk management?

1. What would you expect to see in the first year risk management transformation plan?

What would be the typical task?

The transition plan which will define the organization in matters of transformational and transactional gaps that align and bound with the implementation of the first phase and suggestion made to commit some of risk assessment.

The typical task is comparison of some of risk which are committed in the implementation phase and moved to the transformational plan.

1. You have been asked to advise the Akawini management team on how they should promote and monitor the transformation of risk management in their business. What performance measures would you recommend they use so that they can monitor progress and performance?

The Akawini management team needs to focus on efficiency which will monitor some of relationship between the services offered and resources used. In this case, the company committee is able to compare the input and output based on the variables that are being produced. Moreover, there is need to consider on quality which determines the customers' expectations. Some of the quality facts ensures that services are timely, accurate and meet the needs of the customers. This measures will only be reviewed if we have some internal and external reflect from the customers as per to the services offered and risk associated with it. Lastly, there is need to consider both the input and output incurred in some of implementation and enhancement plan.

Discussion- 2

Chapter 28: The Reluctant General Counsel

1. What are Jason's option? Can he accept a risk management program that does not involve the legal department?

Jason is able to develop some preliminary list and risk assessment in some of software development though he has not managed to meet with the EVP. Jason makes in different evaluations which has some significant impact with the enterprise risk management. Lastly, Jason is able to involve most of its officials in its ERM in order to give a consistent decision with some of services offered. Based on Jason involvement with the legal department he is able to accept some of risk management program which support his board and the top management that he lead.

1. Do you agree with George's arguments? Are they valid

I rarely agree with George's argument since most of his argument address more on participation of the legal department and this leads to formal risk discussion but when he and his team joins their erupts some form of informal discussion. As a result of this highest percentage of his programs are more of risk and this may not be valid to the executive leadership.

1. How would you proceed, if you were the risk officer?

As the risk officer, I would run the business by involving all the parties with their risk assessment and evaluation as this will specify the potential outcome with the BSC competitors and preliminary programs.

Discussion- 3

Chapter 27: Nerds Galore

1. This is a relatively brief case study; yet the problems faced are quite complex. In your workshop, how did you handle uncertainty in the information you have been given and how does this translate into real- world workshops where not all the answers can necessarily be given at the table?

In regard to the information given, I managed to seek possibility based on the loss of key business features and departures of some vital workers. Moreover, I decided to envision on the best by overestimating some of risks/ problems with the solution though it had some worrying outcome with some of business scenarios. Lastly, there was the idea of reflect on the "hindsight bias" which trace on the illusion of the past events. This information have changed the real- world workshops in such a case that most of those risks/ problems have been managed and solved and this attracts most of recent customers as they are the first priority.

1. What were some of the risk sources that emerged repeatedly in evaluating the risk? How is this helpful?
Increased loss of staff who had the key internal knowledge and steady decline of customer satisfaction were some of uncertain predicaments which erupt in NG Company. It ensures that some of problems/risk are dealt with accordingly and with a close follow -up and still customers are satisfied with their internal turnover with respect to services offered.

1. How would this risk assessment aid in the decision on whether or not to proceed with the new HR strategy?
It will help HR management to point out some of repetitive problems and be in a position of retaining their customers. Nevertheless, it will minimize some of risk which has some reoccurrence in terms of customer compensation and employee satisfaction.

Discussion- 4

1. What is your assessment of the situation?

The company needs to improve some of strategic planning as it is the best option to attract more customers. However, some of services needs to be improved in order to increase the revenue and this is done with respect to the existing clientele. In matters of persuasiveness, the Bim Consultants needs to involve the key staff officials with a motive of providing a strong market thrust which will ensure that exact implementation in some of earnings is well addressed and taken with consideration.

1. What advice would you provide to the board of Bim Consultants?

It is not advisable to involve all of the workers in some of vital meeting and which involves transaction that certain earning of the company but just invite executive committee in some of negotiations.

1. What pitfalls should they be concerned with?

Involving all of the members of staff in any offer that the consultant's beliefs can create profit in the company. Ignoring the customers in some of decision which is based on services offered and increment of price to some of services offered in the firm.

Attachment:- Counter measures to prevent cyber attack.rar

Reference no: EM132355886

Questions Cloud

Discuss challenges of maintaining information security : Discuss the challenges of maintaining information security at a remote recovery location.
Contrast the access control models-discretionary-rule-based : Compare and contrast the following access control models: Discretionary, role-based (both core and hierarchical), rule-based, and mandatory access controls.
Describe law or regulation in general terms : Describe law or regulation in general terms. Describe what system engineers did differently that enabled the organization to show compliance with subject law
Explains briefly about the types of disasters : Disaster Recovery Methodologies-This research paper explains briefly about types of disasters that occur and steps that are utilized in process of recovery.
Transforming Risk Management at Akawini Copper : What are some of risk assessment that needs to be implement in the Akawini copper and how will they impact change in the organization?
E-Mail has become critical component for IG implementation : With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation?
Company security policy : Locate any of the company's security policy Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT,
Equipment-tool request form through non-profit organization : I need a equipment/tool request form through my non-profit organization to home Depot.
Describing the network and your workflow for data analytics : Capstone-Describing the Network and your workflow for your (imaginary) Data Analytics company.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd