SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Coaching material about fundraising,
managing risk, sustainability strategies
- Managing risk /sustainability strategies
JAIP – Jihočeská agentura pro podporu inovací o.p.s.
Coaching material about managing risk /sustainability strategies
Crisis management and risk assessment of social enterprises (SE)
CRISIS MANAGEMENT - A BRIEF THEORETICAL BACKGROUND
In business, risk management is defined as the process of identifying, monitoring and managing
potential risks in order to minimize the negative impact they may have on an organization. Social
enterprises need to manage risk like any other business. And while the risks that social enterpris-
es face may be similar to those of a traditional business, there might be differences due to the ac-
tivities in-hand or the service users. Risk management is a very complex and systematic process
that should be integrated into its daily activities.
Risks fall into a number of key categories that cover various aspects of business management, for
example, risks can be financial, investment, project, marketing, technological or technical.
Risk management becomes even more important if your company decides to try something new,
such as launching a new product or entering new markets. Common risks include risks associ-
ated with poorly defined objectives, risks associated with employees (their incompetence, insuf-
ficient experience or qualifications), the risk of time tracking for other projects and, last but not
least, financial risks (costs vs. income).
If the company’s management process is set up, it is desirable that its output be a proposal for a
solution to eliminate the damage, on the basis of which a key decision containing the risk man-
agement procedure should be made.
Each risk analysis is associated with several steps, which intersect in almost all the methods used
to assess the risks. These common steps are shown in the following diagram1
1	 Source: own	
2. ANALYSIS AND
EVALUATION
5. RISK
MONITORING
4. IMPLEMENTING
RISK CONTROLS
3. DESIGN OF
ITERNAL
CONTROL
1. RISK
IDENTIFICATION
3
METHODS FOR RISK ASSESSMENT
It is important to consider the degree of risk. There are a number of methods for risk assessment. The
most commonly used methods include:
RISK ASSESSMENT - HSE
This is a method that is not too complicated and is suitable for usually smaller companies with
up to 10 employees. The method is usually recommended by The Health and Safety Executive
from the Great Britain. Method is based on five basic steps:
Step 1: Identify the hazards
Step 2: Decide who might be harmed and how
Step 3: Evaluate the risks and decide on precautions
Step 4: Record your findings and implement them
Step 5: Review your assessment and update if necessary2
RISK ASSESSMENT – OSHA
This method is based on the collection of all company inputs. These inputs include, for example:
information on workplaces, employees, production facilities, accidents at work etc. Hazards are
identified using checklists.
The risk is determined according to the table.3
RISK EVENT
PROBABILITY
SERIOUSNESS OF CONSEQUENCES
Slight damage Medium damage High damage
Unlikely Low Low Medium
Probably Low Medium High
Likely Medium High High
Probability of threat
Highly unlikely – will not appear during the employee’s working career,
Probable - will appear several times during the employee’s working career,
Highly likely - may occur repeatedly during the employee’s working career.
Severity of consequences
Mild damage - injuries and diseases that do not cause long-term pain.
Moderate damage - injuries and diseases causing mild but long-lasting or periodically recurring
pain.
High damage - injuries and illness, causes deep and constant pain or death.
2	https://www.hse.gov.uk/simple-health-safety/risk/steps-needed-to-manage-risk.htm
3	 own graphic design, Source: https://www.guard7.cz/po/metody-hodnoceni-rizik
4
Risk tolerance
The high level of risk is unacceptable, small and medium acceptable.4
RISK ASSESSMENT USING THE CHECK LIST METHOD
Achecklistisaprocedurebasedonasystematiccheckofcompliancewithpredeterminedconditions
and measures. Lists of control questions are usually generated by a professional company or com-
pany management. It is very important that control questions are updated and supplemented ac-
cordingtocurrentregulationsandstandards.Inmostcases,itisacomplexandextensivedocument.
A disadvantage of the checklist is the fact that the list can lead to a mechanical approach without
creating possible alternatives.
The advantage is the identification of danger through a checklist, which is quick and easy.5
SECURITY RISK ASSESSMENT AND AUDIT
This inspection looks for potential risk factors for the company. These can be, for example, acci-
dents, operational problems and other dangerous situations. A kind of health and safety audit, in
which the controller focuses on several areas. Especially for a detailed inspection of equipment,
machines, tools, etc.
This audit is usually performed by an experienced employee, mostly focusing on occupational
safety. The purpose of this inspection is primarily to identify conditions and circumstances that
could potentially lead to injury or other accident. It is possible to use the prepared list of ques-
tions and the matrix for risk scoring.
WHAT-IF SENSITIVITY ANALYSIS
What-If Analysis (WFA, W-I) is a simple analytical technique used in decision-making and risk
management. Its principle is based on the search for the potential impacts of selected situations.
In essence, it is a structured brainstorming, where within the spontaneous discussion are sought.
What if analysis is usually attended by a group of experienced people who asks questions or ex-
presses the possible impacts of questions using “what if …”.
What-if analysis, on the other hand, is very flexible and can be adapted to the specific purpose.
Steps of What-If analysis:
1.	 Defining areas of interest
2.	 Defining target interests of the problems (e.g. financial risks, environmental issues,
safety at work, etc.)
3.	 Generating questions (if)
4.	 Generating answers (what happens)
5.	 Generating measures on situations (decisions, actions, etc.)6
4	https://www.guard7.cz/po/metody-hodnoceni-rizik
5	 https://m.jh.cz/filemanager/files/132160.pdf
6	 https://managementmania.com/en/what-if-analysis
5
Point method
One of the most used methods in risk assessment is the point method. The degree (sometimes
also referred to as the magnitude) of a risk is a combination of the probabilities of the risk occur-
ring and the possible severity of the consequence of the risk. Risks are always related to a specific
job position and job. The protected value is then human life and health.
Table for assessing the probability of a threat
LIKELIHOOD SCORE- L COMMENT VALUE
Very common Permanent threat 1
Frequent occurrence Very often recurrence of events, but it is not a permanent threat 2
Occasional occurrence The event occurs several times per work shift 3
Possible occurrence The event is not very likely, but it cannot be ruled out 4
Unlikely to occur The occurrence of an adverse event is quite rare 5
Almost impossible occurrence The occurrence of an event is almost impossible 6
CONSEQUENCES – C COMMENT VALUE
A - injury negligible No treatment required outside the workplace 4
B - slight injury Requiringtreatmentoutsidetheworkplace,orincapacityforworkwithin
30 days without consequences
3
C - severe injury Requiring treatment outside the workplace, or incapacity for work for
more than 30 days
2
D - critical injury Disability or death as a result of injury 1
Risk score
GROUP VALUE COMMENT
I.	 Group 1-4 Unacceptable risk - the activity must not be started or continued
until the risk is reduced.
II.	 Group 5-9 Undesirable risk - safety measures and control of their observance
are necessary. Without this, it is not possible to carry out endangered
work activities.
III.	 Group 10-16 Acceptable risk - not very significant risk. It needs to be monitored and
controlled.
IV.	 Group 18-24 Acceptable risk - no special measures required.
Calculate the risk score by multiplying the consequence by the likelihood: C (consequence) × L
(likelihood) = R (risk score)
6
LIKELIHOOD OF RISK - L CONSEQUENCES - C
A=4 B=3 C=2 D=1
1 very common 4 3 2 1
2 common occurrence 8 6 4 2
3 occasional occurrence 12 9 6 3
4 possible occurrences 16 12 8 4
5 unlikely to occur 20 15 10 5
6 almost impossible occurrence 24 18 12 6
Acceptability of risk (safety) must have at least 2 levels (acceptable, unacceptable), it can also be
multi-level. The more acceptable the degree of risk, the finer the gradation.
Resulting safety - risk assessment
According to the resulting value of risk, they are assigned to the appropriate group.7
Risk Management should be a continuous and ever-improving process integrated into the overall
strategy of the organization. It also aims to promote employee responsibility, measurement and
fair remuneration of work and, as a result, also contributes to greater work efficiency. All risk
management activities should have a proactive and positive impact. It is very desirable to lead
risk management in the company through the improvement of existing activities, rather than
through controlling and finding errors or fines.
It is not possible to say broadly which way companies should take in measuring risks. Every com-
pany is an individual in the market and should be approached in the same way in the case of risk
management. It is always good for the control mechanisms in the company to carefully consider
which method and integration of risks between the day-to-day running of the company.
At the end of this chapter, it would be good to state that risks are an everyday part of life, both
private and business. It is necessary to work with them, eliminate them and learn from them.
7	 Table: own graphic design. Text: https://www.guard7.cz/po/metody-hodnoceni-rizik

Contenu connexe

Tendances

SocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidenceSocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidence
M S Ashok
 
SocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidenceSocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidence
Murari Thayi, PgMP, PMP
 
Communications processes guide
Communications processes guideCommunications processes guide
Communications processes guide
leydicm
 

Tendances (20)

Measuring the Impact and ROI of community/social investment programs
Measuring the Impact and ROI of community/social investment programsMeasuring the Impact and ROI of community/social investment programs
Measuring the Impact and ROI of community/social investment programs
 
2016 and 2017 Return on Investment, Development Impact
2016 and 2017 Return on Investment, Development Impact2016 and 2017 Return on Investment, Development Impact
2016 and 2017 Return on Investment, Development Impact
 
Research Report: Trends, Forecasts and Impacts
Research Report:  Trends, Forecasts and ImpactsResearch Report:  Trends, Forecasts and Impacts
Research Report: Trends, Forecasts and Impacts
 
Stakeholder Analysis
Stakeholder AnalysisStakeholder Analysis
Stakeholder Analysis
 
CSI Trends and forecasts
CSI Trends and forecastsCSI Trends and forecasts
CSI Trends and forecasts
 
2014/2015 Trends and Forecasts - Corporate Social Investment and Development
2014/2015 Trends and Forecasts - Corporate Social Investment and Development2014/2015 Trends and Forecasts - Corporate Social Investment and Development
2014/2015 Trends and Forecasts - Corporate Social Investment and Development
 
Community engagement 101
Community engagement 101Community engagement 101
Community engagement 101
 
Management Concepts
Management ConceptsManagement Concepts
Management Concepts
 
SocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidenceSocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidence
 
SocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidenceSocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidence
 
2016 and 2017 CSI Trends and Forecasts
2016 and 2017 CSI Trends and Forecasts2016 and 2017 CSI Trends and Forecasts
2016 and 2017 CSI Trends and Forecasts
 
entrepreneurship networking module for leadership
entrepreneurship networking module for leadership entrepreneurship networking module for leadership
entrepreneurship networking module for leadership
 
Manage Stakeholder Relations
Manage Stakeholder RelationsManage Stakeholder Relations
Manage Stakeholder Relations
 
Management Information System PL2
Management Information System PL2 Management Information System PL2
Management Information System PL2
 
Measuring impact and return on investment of social investments for the grant...
Measuring impact and return on investment of social investments for the grant...Measuring impact and return on investment of social investments for the grant...
Measuring impact and return on investment of social investments for the grant...
 
SPYWDP good practice template.docx
SPYWDP good practice template.docxSPYWDP good practice template.docx
SPYWDP good practice template.docx
 
B-M EMEA Communicating Change
B-M EMEA Communicating Change B-M EMEA Communicating Change
B-M EMEA Communicating Change
 
Media management functions
Media management functionsMedia management functions
Media management functions
 
Communications processes guide
Communications processes guideCommunications processes guide
Communications processes guide
 
Checklist Communication Strategy Development
Checklist Communication Strategy DevelopmentChecklist Communication Strategy Development
Checklist Communication Strategy Development
 

Similaire à Coaching material about fundraising, managing risk, sustainability strategies - managing risk_sustainability strategies.pdf

HSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptHSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.ppt
GkMechanical
 
2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx
waleed50405
 
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docxAbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
ransayo
 

Similaire à Coaching material about fundraising, managing risk, sustainability strategies - managing risk_sustainability strategies.pdf (20)

RISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxRISK MANAGEMENT.pptx
RISK MANAGEMENT.pptx
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Various steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim mirazVarious steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim miraz
 
Risk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptxRisk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptx
 
Risk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptxRisk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptx
 
Risk-Analysis-Power-Point (2).pptx
Risk-Analysis-Power-Point (2).pptxRisk-Analysis-Power-Point (2).pptx
Risk-Analysis-Power-Point (2).pptx
 
Risk management osh
Risk management oshRisk management osh
Risk management osh
 
Risk Management Process.ppt
Risk Management Process.pptRisk Management Process.ppt
Risk Management Process.ppt
 
HSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptHSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.ppt
 
Risk Management.docx
Risk Management.docxRisk Management.docx
Risk Management.docx
 
Risk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisRisk Assessment and Job Safety Analysis
Risk Assessment and Job Safety Analysis
 
Risk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RARisk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RA
 
2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx
 
Safety training: Risk Assessment & Job Safety Analysis
Safety training: Risk Assessment & Job Safety AnalysisSafety training: Risk Assessment & Job Safety Analysis
Safety training: Risk Assessment & Job Safety Analysis
 
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docxAbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
 
51_operational_risk
51_operational_risk51_operational_risk
51_operational_risk
 
Chapter2 risk management process
Chapter2  risk management processChapter2  risk management process
Chapter2 risk management process
 
Risk Management in Business
Risk Management in BusinessRisk Management in Business
Risk Management in Business
 
Risk management
Risk managementRisk management
Risk management
 
Risk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationRisk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix Presentation
 

Plus de Brodoto

Plus de Brodoto (20)

Welcome_ Social Entrepreneurship Conference 2022.pptx
Welcome_ Social Entrepreneurship Conference 2022.pptxWelcome_ Social Entrepreneurship Conference 2022.pptx
Welcome_ Social Entrepreneurship Conference 2022.pptx
 
Introduction CE responsible Anja Prislan.pptx
Introduction CE responsible Anja Prislan.pptxIntroduction CE responsible Anja Prislan.pptx
Introduction CE responsible Anja Prislan.pptx
 
Introduction DelFin Dana Günther.pptx
Introduction DelFin Dana Günther.pptxIntroduction DelFin Dana Günther.pptx
Introduction DelFin Dana Günther.pptx
 
Sonja Westphal Project Sustify.pdf
Sonja Westphal Project Sustify.pdfSonja Westphal Project Sustify.pdf
Sonja Westphal Project Sustify.pdf
 
Project Dispense Solidali.pdf
 Project Dispense Solidali.pdf Project Dispense Solidali.pdf
Project Dispense Solidali.pdf
 
Robert Boehm Perdix Reations.pptx
Robert Boehm Perdix Reations.pptxRobert Boehm Perdix Reations.pptx
Robert Boehm Perdix Reations.pptx
 
Monika Tothne Almassy HospiEdu.pptx
Monika Tothne Almassy HospiEdu.pptxMonika Tothne Almassy HospiEdu.pptx
Monika Tothne Almassy HospiEdu.pptx
 
Sustify pitch 5 min.pdf
Sustify pitch 5 min.pdfSustify pitch 5 min.pdf
Sustify pitch 5 min.pdf
 
Social Impact Measurement – Approaches and Difficulties .pptx
Social Impact Measurement – Approaches and Difficulties .pptxSocial Impact Measurement – Approaches and Difficulties .pptx
Social Impact Measurement – Approaches and Difficulties .pptx
 
Tools for Social Business in Rural Regions .pptx
 Tools for Social Business in Rural Regions .pptx Tools for Social Business in Rural Regions .pptx
Tools for Social Business in Rural Regions .pptx
 
Financial Ecosystem for the promotion of Social Entrepreneurship in rural reg...
Financial Ecosystem for the promotion of Social Entrepreneurship in rural reg...Financial Ecosystem for the promotion of Social Entrepreneurship in rural reg...
Financial Ecosystem for the promotion of Social Entrepreneurship in rural reg...
 
Framework model for support of social economy in CE regions .pptx
Framework  model for support of social economy in CE regions .pptxFramework  model for support of social economy in CE regions .pptx
Framework model for support of social economy in CE regions .pptx
 
Sara Teglia Impronta Etica.pdf
Sara Teglia Impronta Etica.pdfSara Teglia Impronta Etica.pdf
Sara Teglia Impronta Etica.pdf
 
Beatrix Bedo Impact Hub.pdf
Beatrix Bedo Impact Hub.pdfBeatrix Bedo Impact Hub.pdf
Beatrix Bedo Impact Hub.pdf
 
Strategic use of ICT and communication tools, Module 1,2,3.pdf
Strategic use of ICT and communication tools, Module 1,2,3.pdfStrategic use of ICT and communication tools, Module 1,2,3.pdf
Strategic use of ICT and communication tools, Module 1,2,3.pdf
 
Strategic use of ICT and communication tools, Module 1.pdf
Strategic use of ICT and communication tools, Module 1.pdfStrategic use of ICT and communication tools, Module 1.pdf
Strategic use of ICT and communication tools, Module 1.pdf
 
Strategic use of ICT and communication tools, Module 2.pdf
Strategic use of ICT and communication tools, Module 2.pdfStrategic use of ICT and communication tools, Module 2.pdf
Strategic use of ICT and communication tools, Module 2.pdf
 
Strategic use of ICT and communication tools, Module 3.pdf
Strategic use of ICT and communication tools, Module 3.pdfStrategic use of ICT and communication tools, Module 3.pdf
Strategic use of ICT and communication tools, Module 3.pdf
 
Coaching material about strategic use of ICT and Communication Tools.pdf
Coaching material about strategic use of ICT and Communication Tools.pdfCoaching material about strategic use of ICT and Communication Tools.pdf
Coaching material about strategic use of ICT and Communication Tools.pdf
 
Coaching material about innovation process.pdf
Coaching material about innovation process.pdfCoaching material about innovation process.pdf
Coaching material about innovation process.pdf
 

Dernier

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Coaching material about fundraising, managing risk, sustainability strategies - managing risk_sustainability strategies.pdf

  • 1. Coaching material about fundraising, managing risk, sustainability strategies - Managing risk /sustainability strategies JAIP – Jihočeská agentura pro podporu inovací o.p.s.
  • 2. Coaching material about managing risk /sustainability strategies Crisis management and risk assessment of social enterprises (SE) CRISIS MANAGEMENT - A BRIEF THEORETICAL BACKGROUND In business, risk management is defined as the process of identifying, monitoring and managing potential risks in order to minimize the negative impact they may have on an organization. Social enterprises need to manage risk like any other business. And while the risks that social enterpris- es face may be similar to those of a traditional business, there might be differences due to the ac- tivities in-hand or the service users. Risk management is a very complex and systematic process that should be integrated into its daily activities. Risks fall into a number of key categories that cover various aspects of business management, for example, risks can be financial, investment, project, marketing, technological or technical. Risk management becomes even more important if your company decides to try something new, such as launching a new product or entering new markets. Common risks include risks associ- ated with poorly defined objectives, risks associated with employees (their incompetence, insuf- ficient experience or qualifications), the risk of time tracking for other projects and, last but not least, financial risks (costs vs. income). If the company’s management process is set up, it is desirable that its output be a proposal for a solution to eliminate the damage, on the basis of which a key decision containing the risk man- agement procedure should be made. Each risk analysis is associated with several steps, which intersect in almost all the methods used to assess the risks. These common steps are shown in the following diagram1 1 Source: own 2. ANALYSIS AND EVALUATION 5. RISK MONITORING 4. IMPLEMENTING RISK CONTROLS 3. DESIGN OF ITERNAL CONTROL 1. RISK IDENTIFICATION
  • 3. 3 METHODS FOR RISK ASSESSMENT It is important to consider the degree of risk. There are a number of methods for risk assessment. The most commonly used methods include: RISK ASSESSMENT - HSE This is a method that is not too complicated and is suitable for usually smaller companies with up to 10 employees. The method is usually recommended by The Health and Safety Executive from the Great Britain. Method is based on five basic steps: Step 1: Identify the hazards Step 2: Decide who might be harmed and how Step 3: Evaluate the risks and decide on precautions Step 4: Record your findings and implement them Step 5: Review your assessment and update if necessary2 RISK ASSESSMENT – OSHA This method is based on the collection of all company inputs. These inputs include, for example: information on workplaces, employees, production facilities, accidents at work etc. Hazards are identified using checklists. The risk is determined according to the table.3 RISK EVENT PROBABILITY SERIOUSNESS OF CONSEQUENCES Slight damage Medium damage High damage Unlikely Low Low Medium Probably Low Medium High Likely Medium High High Probability of threat Highly unlikely – will not appear during the employee’s working career, Probable - will appear several times during the employee’s working career, Highly likely - may occur repeatedly during the employee’s working career. Severity of consequences Mild damage - injuries and diseases that do not cause long-term pain. Moderate damage - injuries and diseases causing mild but long-lasting or periodically recurring pain. High damage - injuries and illness, causes deep and constant pain or death. 2 https://www.hse.gov.uk/simple-health-safety/risk/steps-needed-to-manage-risk.htm 3 own graphic design, Source: https://www.guard7.cz/po/metody-hodnoceni-rizik
  • 4. 4 Risk tolerance The high level of risk is unacceptable, small and medium acceptable.4 RISK ASSESSMENT USING THE CHECK LIST METHOD Achecklistisaprocedurebasedonasystematiccheckofcompliancewithpredeterminedconditions and measures. Lists of control questions are usually generated by a professional company or com- pany management. It is very important that control questions are updated and supplemented ac- cordingtocurrentregulationsandstandards.Inmostcases,itisacomplexandextensivedocument. A disadvantage of the checklist is the fact that the list can lead to a mechanical approach without creating possible alternatives. The advantage is the identification of danger through a checklist, which is quick and easy.5 SECURITY RISK ASSESSMENT AND AUDIT This inspection looks for potential risk factors for the company. These can be, for example, acci- dents, operational problems and other dangerous situations. A kind of health and safety audit, in which the controller focuses on several areas. Especially for a detailed inspection of equipment, machines, tools, etc. This audit is usually performed by an experienced employee, mostly focusing on occupational safety. The purpose of this inspection is primarily to identify conditions and circumstances that could potentially lead to injury or other accident. It is possible to use the prepared list of ques- tions and the matrix for risk scoring. WHAT-IF SENSITIVITY ANALYSIS What-If Analysis (WFA, W-I) is a simple analytical technique used in decision-making and risk management. Its principle is based on the search for the potential impacts of selected situations. In essence, it is a structured brainstorming, where within the spontaneous discussion are sought. What if analysis is usually attended by a group of experienced people who asks questions or ex- presses the possible impacts of questions using “what if …”. What-if analysis, on the other hand, is very flexible and can be adapted to the specific purpose. Steps of What-If analysis: 1. Defining areas of interest 2. Defining target interests of the problems (e.g. financial risks, environmental issues, safety at work, etc.) 3. Generating questions (if) 4. Generating answers (what happens) 5. Generating measures on situations (decisions, actions, etc.)6 4 https://www.guard7.cz/po/metody-hodnoceni-rizik 5 https://m.jh.cz/filemanager/files/132160.pdf 6 https://managementmania.com/en/what-if-analysis
  • 5. 5 Point method One of the most used methods in risk assessment is the point method. The degree (sometimes also referred to as the magnitude) of a risk is a combination of the probabilities of the risk occur- ring and the possible severity of the consequence of the risk. Risks are always related to a specific job position and job. The protected value is then human life and health. Table for assessing the probability of a threat LIKELIHOOD SCORE- L COMMENT VALUE Very common Permanent threat 1 Frequent occurrence Very often recurrence of events, but it is not a permanent threat 2 Occasional occurrence The event occurs several times per work shift 3 Possible occurrence The event is not very likely, but it cannot be ruled out 4 Unlikely to occur The occurrence of an adverse event is quite rare 5 Almost impossible occurrence The occurrence of an event is almost impossible 6 CONSEQUENCES – C COMMENT VALUE A - injury negligible No treatment required outside the workplace 4 B - slight injury Requiringtreatmentoutsidetheworkplace,orincapacityforworkwithin 30 days without consequences 3 C - severe injury Requiring treatment outside the workplace, or incapacity for work for more than 30 days 2 D - critical injury Disability or death as a result of injury 1 Risk score GROUP VALUE COMMENT I. Group 1-4 Unacceptable risk - the activity must not be started or continued until the risk is reduced. II. Group 5-9 Undesirable risk - safety measures and control of their observance are necessary. Without this, it is not possible to carry out endangered work activities. III. Group 10-16 Acceptable risk - not very significant risk. It needs to be monitored and controlled. IV. Group 18-24 Acceptable risk - no special measures required. Calculate the risk score by multiplying the consequence by the likelihood: C (consequence) × L (likelihood) = R (risk score)
  • 6. 6 LIKELIHOOD OF RISK - L CONSEQUENCES - C A=4 B=3 C=2 D=1 1 very common 4 3 2 1 2 common occurrence 8 6 4 2 3 occasional occurrence 12 9 6 3 4 possible occurrences 16 12 8 4 5 unlikely to occur 20 15 10 5 6 almost impossible occurrence 24 18 12 6 Acceptability of risk (safety) must have at least 2 levels (acceptable, unacceptable), it can also be multi-level. The more acceptable the degree of risk, the finer the gradation. Resulting safety - risk assessment According to the resulting value of risk, they are assigned to the appropriate group.7 Risk Management should be a continuous and ever-improving process integrated into the overall strategy of the organization. It also aims to promote employee responsibility, measurement and fair remuneration of work and, as a result, also contributes to greater work efficiency. All risk management activities should have a proactive and positive impact. It is very desirable to lead risk management in the company through the improvement of existing activities, rather than through controlling and finding errors or fines. It is not possible to say broadly which way companies should take in measuring risks. Every com- pany is an individual in the market and should be approached in the same way in the case of risk management. It is always good for the control mechanisms in the company to carefully consider which method and integration of risks between the day-to-day running of the company. At the end of this chapter, it would be good to state that risks are an everyday part of life, both private and business. It is necessary to work with them, eliminate them and learn from them. 7 Table: own graphic design. Text: https://www.guard7.cz/po/metody-hodnoceni-rizik