Case Study in Enterprise Architecture: Government of Canada
Our papers are 100% unique and written following academic standards and provided requirements. Get perfect grades by consistently using our writing services. Place your order and get a quality paper today. Rely on us and be on schedule! With our help, you'll never have to worry about deadlines again. Take advantage of our current 20% discount by using the coupon code GET20
Order a Similar Paper Order a Different Paper
Refer to the attached documents in the uploads for the references and guidelines.
Assignment Guidelines
When we think of an enterprise we typically think of a traditional business with a specific product or service. However, the term is broader than that, and we can apply EA principles to things as big and abstract as an entire nation. The Government of Canada performed just such an audit on their own IT infrastructure. Through this audit, you will follow along and learn about the process, the steps taken, and how an analysis is performed. First, review the study at
Audit of IT Enterprise Architecture (AU1802). (Links to an external site.)
Consider and address the following:
· What was the purpose of this audit?
· What types of methodologies did the reviewers use in their audit?
· What strengths and weaknesses did they identify?
· What risks were mentioned?
· What factors affect these risks?
· How should these risks be managed?
· What forms of EA governance does Canada employ?
· How should they proceed? What recommendations would you suggest beyond the ones provided?
Your study should be a minimum of two to three pages double spaced (750 words) and include at least three external citations beyond the course textbooks. Your study should address all of the points outlined above.
Parameters
· The assignment should be double-spaced, 12-point Times New Roman font, with one-inch margins
· Use APA for citing references and quotations
Enterprise
Risk Management
Stefan Hunziker
Modern Approaches to
Balancing Risk and Reward
Enterprise Risk Management
Stefan Hunziker
Enterprise Risk Management
Modern Approaches to Balancing
Risk and Reward
Stefan Hunziker
Rotkreuz, Switzerland
ISBN 978-3-658-25356-1 ISBN 978-3-658-25357-8 (eBook)
https://doi.org/10.1007/978-3-658-25357-8
Library of Congress Control Number: 2019936302
Springer Gabler
© Springer Fachmedien Wiesbaden GmbH, part of Springer Nature 2019
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage
and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or
hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does
not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective
laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the
editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors
or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.
This Springer Gabler imprint is published by the registered company Springer Fachmedien Wiesbaden GmbH
part of Springer Nature
The registered company address is: Abraham-Lincoln-Str. 46, 65189 Wiesbaden, Germany
v
Preface
Now more than ever, students, junior staff, instructors, managers and decision-makers
have to understand the value-creating aspect of modern Enterprise Risk Management
(ERM).
Welcome to the world of enterprise risk management (ERM), one of the most popular
and misunderstood of today’s important business topics. It is not very complex. It is not
very expensive. It does add value. We just have to get it right. Until recently, we have been
getting it wrong (Hampton 2009, p. vii).
This is a quote from Professor Hampton, director at St. Peters’ College and former direc-
tor of the Risk and Insurance Management Society (RIMS). His statement is representa-
tive of what still applies to many companies today: ERM is considered as an expensive
and unprofitable “business inhibitor”. Traditionally, it does only embrace a few areas
of the company (in many cases the finance department). Usually, there is no equal
company-wide management of all risk categories in a consistent framework and risk
management is often an independent stand-alone process, which is not linked to deci-
sion-making processes and business planning. In this way, traditional risk management
is unable to generate any benefits and unnecessarily ties up resources in the company. A
positive risk culture, which considers information provided by risk management as being
supportive to management, is often wishful thinking. Modern risk management aims to
be a strategic management tool that creates value for the company. In order for the risk
manager to be welcomed at the strategy table, a rethinking from traditional risk manage-
ment to modern ERM is required.
Didactic Philosophy and Learning Objectives
Amongst other, ERM is a powerful tool that enhances a manager’s and board’s ability to
make better decisions under uncertainty. Pure learning of ERM definitions, theories and
techniques by heart is much less important for students than being able to apply relevant
ERM concepts to practical situations. For this reason, Enterprise Risk Management—
Modern Approaches to Balancing Risk and Reward embraces theory, concepts and
practical examples so that students get a sound understanding of how ERM can be
vi Preface
implemented in practice. I encourage students to make use of the offered learning mate-
rials at the very end of each chapter.
The content of Enterprise Risk Management—Modern Approaches to Balancing Risk
and Reward is applicable to all business sectors, including non-profit, service, selling,
manufacturing, retail and administrative situations. The focus of the textbook is clearly
on improving decision-making under uncertain situations, not on operational risk man-
agement or internal control at very low organisational levels.
My goal is to encourage students to apply modern approaches to good ERM and to
link ERM to decision-making processes. Students begin their understanding of why
ERM matters in today’s complex business environment and progress to more complex
questions of how assessing risk and opportunities by the means of consistent and effec-
tive assessment techniques and how to create a risk culture that enables effective ERM.
To support the student’s learning success, my approach is to introduce concepts accessi-
bly and to complement them with practical examples from diverse companies.
The textbook has been primarily developed for training and continuing education at
university level in German-speaking countries. However, it is also of high practical rel-
evance. Based on concrete cases of medium-sized and large companies, concepts pre-
sented in Enterprise Risk Management—Modern Approaches to Balancing Risk and
Reward of ERM are transferred into practice. It serves students and practitioners alike
as a source of ideas on how ERM can generate value to all stakeholders. The novelty of
this textbook is reflected primarily in the fact that theoretical and psychological findings
relevant to decision-making situations will be explicitly incorporated.
Acknowledgements
I have received many valuable comments and suggestions for this textbook during the
last few years from ERM professionals, consultants, managers and professors. I cordially
thank each of these contributors. In addition, I wish to thank the following people and
institutions:
• Mr Marcel Fallegger, CMA, CSCA, Lucerne School of Business. Besides his subject
matter expertise, he supported me in all administrative matters.
• Lucerne School of Business for its financial support.
• Springer Gabler. All colleagues from the editorial, production and marketing depart-
ments for their great support in making this textbook possible.
• My relatives, for their patience and understanding of the many “write-related absences”.
Finally, students in my graduate and undergraduate classes on Enterprise Risk
Management have inspired me to write this textbook and contributed many thoughtful
ideas.
Stefan Hunziker
vii
1 Introducing ERM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Why ERM Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Definition of ERM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 Risk Definition in the ERM Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.4 ERM Frameworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.5 Challenges to ERM Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2 Countering Biases in Risk Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.1 Motivational Biases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.1.1 Affect Heuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.1.2 Attribute Substitution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.1.3 Confirmation Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.1.4 Desirability of Options and Choice . . . . . . . . . . . . . . . . . . . . . . . . 22
2.1.5 Optimism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.1.6 Transparency Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.2 Cognitive Biases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.2.1 Anchoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.2.2 Availability Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.2.3 Dissonance Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.2.4 Zero Risk Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.2.5 Conjunction Fallacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.2.6 Conservatism Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.2.7 Endowment and Status Quo Bias . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.2.8 Framing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.2.9 Gambler’s Fallacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.2.10 Hindsight Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.2.11 Overconfidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.2.12 Perceived Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Contents
viii Contents
2.3 Group-Specific Biases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.3.1 Authority Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
2.3.2 Conformity Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.3.3 Groupthink . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.3.4 Hidden Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
2.3.5 Social Loafing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3 Creating Value Through ERM Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.1 Balance Rationality with Intuition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.2 Embrace Uncertainty Governance as Part of ERM . . . . . . . . . . . . . . . . . . . 52
3.3 Collect Risk Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
3.3.1 Identify Sources, Events and Impacts of All Risks . . . . . . . . . . . . 55
3.3.2 Develop an Effective and Structured Risk Identification
Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
3.3.3 Identify Risks Enterprise-Wide . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
3.3.4 Treat Business and Decision Problems not as True Risks . . . . . . . 59
3.3.5 Don’t Let Reputation Risk Fool You . . . . . . . . . . . . . . . . . . . . . . . 61
3.3.6 Focus on Management Assumptions . . . . . . . . . . . . . . . . . . . . . . . 64
3.3.7 Conduct One-on-One Interviews with Key Stakeholders . . . . . . . 76
3.3.8 Complement with Traditional Risk Identification . . . . . . . . . . . . . 83
3.4 Assess Key Risk Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
3.4.1 Identify Key Risk Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
3.4.2 Quantify Key Risk Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
3.4.3 Support Decision-Making . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
3.4.4 Differentiate between Decisions and Outcomes . . . . . . . . . . . . . . 115
3.4.5 Overcome the Regulatory Risk Management Approach . . . . . . . . 115
3.4.6 Overcome the Separation of Risk Analysis and
Decision-Making . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
3.4.7 Assess Impact on Relevant Objectives . . . . . . . . . . . . . . . . . . . . . . 118
3.4.8 Avoid Pseudo-Risk Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . 120
3.4.9 Develop Useful Risk Appetite Statements . . . . . . . . . . . . . . . . . . . 121
3.4.10 Make Uncertainties Transparent and Comprehensible . . . . . . . . . 128
3.4.11 Exploit the Full Decision-Making Potential of ERM . . . . . . . . . . 133
3.4.12 Align ERM with Business Planning . . . . . . . . . . . . . . . . . . . . . . . 136
3.4.13 Replace Standard Risk Reporting . . . . . . . . . . . . . . . . . . . . . . . . . 141
3.4.14 Disclose Risks Appropriately . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
3.5 Assess and Improve ERM Quality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
3.5.1 Test ERM Effectiveness Appropriately . . . . . . . . . . . . . . . . . . . . . 149
3.5.2 Increase ERM Maturity Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
ixContents
4 Setting up Enterprise Risk Governance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
4.1 Comply with Laws and Check Relevant Governance Codes . . . . . . . . . . . . 165
4.2 Consider ERM-Frameworks Thoughtfully . . . . . . . . . . . . . . . . . . . . . . . . . 168
4.2.1 Motivation for Risk Management Standards . . . . . . . . . . . . . . . . . 168
4.2.2 ISO 31000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
4.2.3 COSO ERM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
4.2.4 Similarities and Differences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
4.2.5 Limitations of ERM Frameworks . . . . . . . . . . . . . . . . . . . . . . . . . 174
4.3 Develop a Sound Risk Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
4.3.1 Risk Policy and Corporate Strategy . . . . . . . . . . . . . . . . . . . . . . . . 177
4.3.2 Risk Policy as the Basis for Dealing with Risks . . . . . . . . . . . . . . 178
4.3.3 Limitations of Risk Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
4.4 Enhance Risk Culture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
4.4.1 Relate Risk Culture to Corporate Culture . . . . . . . . . . . . . . . . . . . 184
4.4.2 Understand How Risk Culture Evolves . . . . . . . . . . . . . . . . . . . . . 188
4.4.3 Increase Risk Culture Maturity Level . . . . . . . . . . . . . . . . . . . . . . 189
4.5 Organise ERM Properly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
4.5.1 Does a Best-Practice ERM Organisation Exist? . . . . . . . . . . . . . . 197
4.5.2 ERM Organisation Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
4.5.3 Some Thoughts on Roles and Responsibilities . . . . . . . . . . . . . . . 201
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
5 Looking at Trends in ERM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
5.1 Emerging Digital Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
5.1.1 Impact of Disruptive Technologies . . . . . . . . . . . . . . . . . . . . . . . . 210
5.1.2 Digital Risk Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
5.2 Digitization of ERM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
5.3 Using Multiple Sources of Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
5.4 Increasing Demand for Analytic Skill Sets . . . . . . . . . . . . . . . . . . . . . . . . . 222
5.5 Increasingly Sophisticated Software Tools . . . . . . . . . . . . . . . . . . . . . . . . . 225
5.6 Networked Economy and Collective ERM . . . . . . . . . . . . . . . . . . . . . . . . . 227
5.7 Improving ERM Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
1© Springer Fachmedien Wiesbaden GmbH, part of Springer Nature 2019
S. Hunziker, Enterprise Risk Management,
https://doi.org/10.1007/978-3-658-25357-8_1
Learning Objectives
When you have finished studying this chapter, you should be able to:
• Define the term ERM and its key attributes
• Contrast ERM with traditional risk management
• Explain which characteristics distinguish the term risk in the ERM approach
• Explain why ERM is important to support decision-making processes
• Describe the main challenges of ERM
1.1 Why ERM Matters
Many, if not all corporate activities are linked to uncertainties of future developments
that can result in either new threats or opportunities. The volatile nature of markets
(e.g. for raw materials) and business environments (e.g. regulatory changes, behav-
iour of competitors) poses a great challenge to the existence and success of companies.
Introducing ERM 1
Contents
1.1 Why ERM Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Definition of ERM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 Risk Definition in the ERM Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.4 ERM Frameworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.5 Challenges to ERM Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2 1 Introducing ERM
The growing complexity and dynamics of the context in which companies nowadays
operate has caused a relentless increase in the level of risk in all areas of corporate
management and business activities. As a result, the discipline and practice of risk
management has enforced itself gradually in various sectors and industries, as well as
across different company sizes (Verbano and Venturini 2013).
Risk management within corporations has gone through various stages starting in the
post-World War II times. Whereas historically risk management activities were mostly
uncoordinated with a strong focus on the mitigation of financial risk by the means of
insurance and derivative instruments to protect the company against financial loss,
a more holistic approach has emerged in the 1990s. This advanced approach is rather
intended to achieve a coordinated management of all significant risk sources a company
might be exposed to (McShane et al. 2011; Mishkin and Eakins 2018). Simultaneously
the concept of Enterprise Risk Management (ERM) has emerged in the early 1990s as
a programme that manages the total risk exposure in one integrated and comprehensive
tool (Hampton 2015, p. 18). Clearly, one of the main advocate of ERM adoption in the
1990s has been the release of the COSO Framework in 2004 (Committee of Sponsoring
Organizations of the Treadway Commission) “Enterprise Risk Management—Integrated
Framework” (COSO 2004). In the 2000s Risk management became even more important
mainly due to negative events with high public awareness such as September 11th, cor-
porate accounting fraud and the financial crisis.
Although ERM was a much-debated business topic in the 2000s, there has also been
severe critique. In particular, with the evolvement of the financial crisis in 2008 and 2009
that resulted in many corporate failures and bankruptcies, the effectiveness of ERM pro-
grammes within firms was heavily questioned. Critics brought forward the argument that
the effectiveness of ERM had not yet been proven, and consequently, the promotion and
implementation within companies slowed down shortly after the financial crisis (Hoyt
and Liebenberg 2011, p. 796).
In the meantime, most of the criticism has fortunately faded. Specifically, over the last
couple of years, the perspective on ERM has significantly changed. Many organisations
have recently implemented policies and processes and started to intensively apply mod-
ern ERM practices. The main reason for that is that ERM has substantially evolved as a
management tool and is no longer seen as a pure regulatory requirement to prevent nega-
tive events. In fact, academics and risk professionals appreciate ERM as a value adding
function (Lam 2017, pp. 34–37). Various empirical studies (e.g. Smithson and Simkins
2005; Hoyt and Liebenberg 2011; Eckles et al. 2014) have been undertaken which con-
firm that companies with ERM systems in place have a significantly higher company
value than non-ERM companies. Ultimately, from a very modern perspective, value crea-
tion is the sole reason for implementing an ERM programme. This is also the only cor-
rect answer to the “why Enterprise Risk Management”-question from an economic point
of view: If ERM consumes more resources than the value it creates, companies should
refrain from implementing it.
3
To be more concrete, the most important features of modern ERM which all con-
tribute to the value creation are briefly introduced. First and foremost, value creation is
facilitated if ERM is directly linked or built into to the decision-making processes within
the company, which in turn affect the prosperity of an organisation. ERM creates value
by allowing firms to gain a more optimised risk-return trade-off of their decisions. A
commonly misunderstood characteristic of ERM in this context is that the goal of risk
management is to minimise total risk exposure. However, ERM is about determining the
ideal level of risk to maximise value: Some risks might be deliberately taken in order to
exploit opportunities and hence to create a higher return (Romeike 2018, p. 14). Thus, a
key reason why to deal with ERM is the improved internal decision-making by consider-
ing and balancing the upside and downside potential of each decision and by providing a
more rational basis for decisions.
A second key reason for implementing ERM is to gain a comprehensive view on all
risks, opportunities and their respective interdependencies. This enables both the senior
management’s and the board’s capability to oversee total risk exposure and its poten-
tial effect on certain business objectives. The availability of transparent and fully quan-
tified risk exposures offers new opportunities for effective strategic decision-making
and risk taking which is in line with the corresponding risk appetite statements (Farrell
and Gallagher 2014, pp. 628–629). Moreover, the risk aggregation approach enables
the management of residual risks rather than dealing with single independent risks.
Companies adopting aggregation techniques may benefit from a risk diversification
effect and can make advantage of natural risk hedges. Thus, only a few remaining risk
needs to be managed which is more efficient and effective way than dealing with each
single risk independently (McShane et al. 2011).
In addition, ERM has recently been observed to be of great benefit to organisations
because it has led to:
• Stabilised earnings which improve shareholder’s value;
• Decreased cost of capital via improved ratings from credit rating agencies
• Better exploitation of equity (risk) capital
• Lessened dynamics in stock price, which also improves shareholder’s value;
• Boosted investors’ confidence (still a much-debated and controversial topic);
• Enhanced competitive advantage through the identification of significant risks which
can be actively managed.
So far, we keep in mind that ERM can add value to the company. If you were asked, why
a firm should deal with ERM, your very first answer would definitely be value creation
through improved decision-making. Before we can embark on our journey into the con-
crete process of ERM implementation, we have to define ERM properly and in particular
the often misunderstood term “risk”.
1.1 Why ERM Matters
4 1 Introducing ERM
1.2 Definition of ERM
In theory, a vast amount of ERM definitions is available, but essentially many of these
descriptions comprise similar aspects. Hampton (2015) states that the ERM concept is
a comprehensive and complex system that concerns major areas of a company and for
that reason, many definitions of ERM exist (p. 19). In order not to lose oneself in the
numerous definitions, it makes sense to have a closer look at the two most well-known
risk management frameworks and their definitions, published by the Committee of
Sponsoring Organizations of the Treadway Commission (COSO) and the International
Organization for Standardization (ISO). Both frameworks have been recently updated in
2017 (COSO) and 2018 (ISO), respectively. According to the COSO ERM Framework,
ERM is defined as:
The culture, capabilities, and practices, integrated with strategy-setting and its execu-
tion, that organizations rely on to manage risk in creating, preserving, and realizing value.
(COSO 2017, p. 10)
As we can easily notice, COSO puts emphasis not only on the capabilities, techniques
and tools, but also on the very important cultural aspects. Many risk professionals have
argued in the last couple years that cultural aspects are perhaps even more relevant for
an effective risk management than the existence and implementation of ERM techniques
per se (Levy et al. 2010, p. 2; Vazquez 2014, p. 10). A second aspect of COSO’s ERM
definition stands out—it shall be integrated with strategy-setting and its execution. Thus,
COSO stipulates that ERM should be linked to business objectives in order to create
value, which is fully in line with our main reasoning of “why ERM” (see Sect. 1.1). In
contrast, ISO defines Risk Management as (even if ISO promotes a modern, integrated
risk management approach, the term ERM is not mentioned at all in the guidelines):
…coordinated activities to direct and control an organization with regard to risk. (ISO
31000:2018, p. 1)
Although ISO’s definition does not explicitly comprise the link between risk manage-
ment and value creation, it specifies the purpose of risk management in the principles
section as the creation and protection of value, quite similar to COSO’s approach (ISO
2018, p. 2). In addition, ISO clearly states that culture significantly impacts all aspects of
risk management what is again in line with COSO’s view on ERM. Overall, both defini-
tions represent a sound basis for modern ERM as they both promote the link between
ERM and value creation. As such, both definitions perfectly serve the purpose of the
textbook at hand and we could stop discussing approaches. For the sake of not relying
only on definitions created by risk management frameworks and norms, here are a few
others which don’t fundamentally deviate from COSO and ISO.
The Risk Management Society (RIMS) for example defines ERM as
5
…a strategic business discipline that supports the achievement of an organization’s objec-
tives by addressing the full spectrum of its risks and managing the combined impact of
those risks as an interrelated risk portfolio. (Hopkin 2017, p. 53)
This definition puts emphasis on the aspect of having a unified and integrated approach
where separate management of individual risks is abandoned and risks are treated holisti-
cally throughout the whole organisation (Hopkin 2017, p. 98; Segal 2011, p. 3). Again,
in line with the two former ones, the reference of the link to the company’s objectives is
obvious. This is similarly confirmed by Segal (2011, p. 3) and by Hunziker (2018, p. 2)
who describe that modern ERM is a comprehensive approach to identify, evaluate, man-
age and disclose important risks in order to increase company value.
Based on the previous discussion, the following deliberately brief definition is best
suited to this textbook:
u ERM embraces enterprise-wide coordinated activities with which companies identify,
assess, actively manage and report all key risks in order to create value for the firm.
At this point, we conclude that many ERM definitions have been created by consultants,
risk professionals, agencies and legislative bodies. Modern definitions of ERM typically
postulate a company-wide (i.e. in all areas and across all risk categories) identification,
assessment and management of risks plus a clear link between ERM and the strategy,
business objectives, decision-making processes and ultimately value creation.
1.3 Risk Definition in the ERM Approach
In practice, firms often expect that ERM as a comprehensive approach inevitably leads
to the management of hundreds or even thousands of risks. Particularly in the US, after
COSO ERM was released in 2004, there had initially been a great deal of scepticism that
ERM might be nothing else but an extended task that ties up many resources. Since the
COSO ERM framework is generally based on the COSO framework for Internal Control,
firms felt confirmed by that. However, ERM does clearly not aim to assess, manage and
monitor all risks identified by a company. ERM has a different focus and deals only with
so-called key risks.
Basically, a risk can evolve to a key risk over time or it is being considered as a key
risk by the time of its first assessment. We define a key risk as a risk that exceeds a sig-
nificance threshold in the case of risk occurring set by the company and thus can sig-
nificantly affect one or several business objectives and subsequently can impact company
value or any another financial benchmark. Let’s consider the following example:
1.3 Risk Definition in the ERM Approach
6 1 Introducing ERM
Example
The Swiss company FarAway AG operating in the travel industry markets holiday
trips in Switzerland in business unit A and holiday trips to the euro zone in business
unit B, mainly Germany and Austria. The risk database includes the following two
risks, among others:
• petty cash theft
• entry of a new competitor
As a financial benchmark, FarAway AG defined an acceptable lower bound of 8%
EBIT margin for the next business year (excepted EBIT margin is 10%).
After a first risk assessment, the following worst-case scenarios for both risk look
as follows:
• petty cash theft, worst case −0.01% on expected EBIT margin (= 9.99% after risk
impact)
• loss of market share, worst case −4% on expected EBIT margin (= 6% after risk
impact)
Based on that simple analysis, FarAway AG concluded that petty cash theft is cur-
rently no key risk and therefore not included in the further ERM process, instead put
on a watch list. In contrast, loss of market share is considered as a key risk due to the
severe threat it poses on the financial objectives of FarAway AG.
We conclude that ERM will never have to deal with several hundreds or thousands risks,
as this can certainly be the case while maintaining an Internal Control system of a large
company. A practicable ERM approach thus requires meaningful criteria, which risks
qualify as key risks and which are only stored in a database as a “watch list”, but are
not included in the ERM model. Practical experience shows that, regardless of the size
and industry of a company, many traditional risk management approaches fail because of
their complexity and attempt to incorporate and manage all risks instead of focusing on
key risks.
Another challenge in properly defining risk for the purpose of ERM is the fact that
managers tend to think predominantly about the (financial) impacts of risks. These con-
siderations are clearly important, but not sufficient. To develop effective risk strategies,
we need to know the sources (causes) of each risk. The relevant question to define risks
effectively shall be: How can we prevent a risk from occurring so that it does not have
any financial impact? The answer is to create a plausible story, embedded in a cause-
effect chain. The cause at the very beginning of that story is usually the starting point for
discussing effective risk mitigation strategies. Let’s consider again our practical example:
7
Example
FarAway AG identified and assessed the key risk “loss of market share”. The worst
case is a loss of −4% EBIT margin. The Chief Financial Officer (CFO) of FarAway
AG claimed that this risk must be categorised as a financial risk due to its significant
impact on the financial performance. In a meeting with the risk manager, however,
he learned that every risk is to be categorised by its source rather than its impact to
develop preventive risk mitigation measures.
The Chief Risk Officer (CRO) together with the CFO created a simplified cause-
effect chain for that specific key risk:
Due to missing out on a timely tracking of new trends and customer needs in the
travel industry, the competitors may gain a competitive advantage over FarAway
AG with new and innovative offers. This may lead to less customer satisfaction of
our customer base and to less new customers. In turn, this has a negative impact on
our revenues and consequently leads to a loss of 4% EBIT margin in a worst case
scenario.
The CRO showed understanding and agreed to change that risk from the financial
category to the strategic risk category. “Now we can think of preventive measures”, he
suggested.
Thirdly, it is obvious that many risks can have both an upside potential (opportunity)
and a downside potential (risk), possibly to varying degrees. However, the term risk is
traditionally negatively interpreted. Questions such as “What can go wrong?” and “What
can we (financially) lose?” are the main focus in many risk management workshops.
The assessment of a potential impact and a corresponding probability of occurrence is
still prevailing in practice (Hampton 2009, pp. 4–5). The following figure illustrates the
modern approach to define risk as a possible positive and/or negative deviation of an
expected outcome. This understanding of risk is crucial for a realistic assessment of the
total risk exposure at company-wide level.
Looking at Fig. 1.1, it becomes apparent that different risks involve different upside
and downside potentials. For example, the debtor default risk and the IT failure risk do
not have a symmetrical risk/opportunity distribution, but are strongly downside-oriented
(unrewarded risks). On the other hand, the early recognition of changing customer needs
or market entry with new products can become a strategic competitive advantage with
disproportionate potential opportunities (rewarded risks with an expected positive out-
come). To decide which risk strategy is adequate for each risk, an ERM model deals with
various positive and negative scenarios, covering the best case and the worst case at both
ends of the possible ranges. Let’s assume a company only takes into account the negative
scenarios of all risks in its ERM model. This would sum up to a severe overvaluation of
the overall risk exposure, since the positive scenarios (opportunities) and their diversifi-
cation effects on entity level are not considered in the risk assessment.
1.3 Risk Definition in the ERM Approach
8 1 Introducing ERM
The following example illustrates risk balancing between two business areas, and how
ERM can help create value for the company.
Example
The Swiss travel company FarAway AG identified the risk of an unexpected change in
the CHF/€ currency pair as another key risk. The news from the Swiss National Bank
(SNB) on January 15, 2015 that the minimum exchange rate of CHF 1.20 per euro
would be raised hit the company unexpectedly. The minimum price was introduced at
a time of strong overvaluation of the Swiss franc and great uncertainty on the finan-
cial markets. The aim of this temporary measure was to protect the Swiss economy
from financial loss. One reason for the SNB’s move was that the overvaluation had
been somewhat generally reduced since the introduction of the minimum price and
companies had been able to adjust to this new situation (SNB 2015).
The impact of the appreciation of the CHF against the euro was twofold: business
unit A lost around 20% of sales in 2015, as fewer holidays were booked in “expen-
sive” Switzerland. However, the company recorded a significant 10% increase in sales
in the important euro business. If both effects are offset against each other, this has a
net positive impact at company-wide level. Traditional risk management would have
significantly overestimated this risk, as only the negative impact from business unit A
would have been included in the overall risk assessment (Hunziker 2018, p. 12–13).
Suppliers
Customer
needs
Debtors
Opportunity potential of all key risks
Risk potential of all key risks
Market
entry
Key risks business unit A
IT failure
Currencies
Fire
Key risks business unit B
Customer
needs
Fig. 1.1 Risk in the ERM approach. (based on Hunziker 2018, p. 11)
9
We conclude that the term “risk” in the modern ERM approach must be understood as an
enabler to seize opportunities, as it directly and measurably compares the opportunities
and the downside risk associated with a business goal or a strategic option. In addition,
dependencies between risks must be identified and communication about risks must be
promoted. If risk is defined in this way (deviation from expected), ERM leads to better
decisions, as they can be evaluated more rationally and realistically.
1.4 ERM Frameworks
There are many options for the practical implementation of ERM. While companies
have recently increased their ERM activities and developed approaches by themselves,
consulting and auditing firms as well as standards bodies have published many ERM
guidelines, and specialised expert teams and rating agencies included ERM as a specific
assessment criterion into their rating systems (Hoyt and Liebenberg 2011, p. 795). As
COSO ERM (2017) and ISO 31000:2018 are by far the best-known and most widely
used aids to implement ERM, we will focus on these two frameworks. Basically, we
have to answer the following two questions:
• Which of these two frameworks is better suited for a modern ERM implementation?
• What is the relationship between this textbook and the COSO ERM/ISO 31000
frameworks?
The answer of the first question is not quite straightforward and needs some elabora-
tion. The following brief assessment of the two frameworks is only related to the recently
updated versions of COSO ERM 2017 and ISO 31000:2018. Generally speaking, the
two frameworks lag behind the extant literature and research on proper risk manage-
ment. Surprisingly, to date no empirical studies as to whether the two standards actually
work in practice, i.e. create value for companies, are available. In light of the fact that
ISO:31000 and COSO ERM have existed many years, no publications with concrete case
studies that have successfully implemented COSO ERM or ISO 31000 as a whole can be
found.
Although both frameworks postulate a strong link between ERM and business objec-
tives, they both approach the “story of risk management” differently: ISO 31000 is much
shorter and contains only 16 pages and starts with core risk management definitions. ISO
recommends in note form to examine and understand its external and internal context
such as mission, vision, strategy and the complexity of networks and dependencies (ISO
2018, p. 6). In contrast, COSO ERM is written in much more detail and contains about
110 pages without appendices. It aims to gain a sound understanding of corporate strate-
gies as a starting point for ERM implementation, followed by a risk analysis that allows
risks to be aligned with the corresponding strategies. Moreover, COSO released in 2018
a supplement to its framework. The compendium includes many practical examples for
1.4 ERM Frameworks
10 1 Introducing ERM
implementing their 20 principles of the COSO ERM framework. Again, this supplements
puts emphasis on the link between ERM, strategy setting and value creation.
COSO ERM has been criticised by many practitioners as too extensive, only top-
down oriented, too lengthy and too “prescriptive”. To understand this, we need to know
who developed COSO ERM: Essentially, the main contributors to the framework are
large US accounting and auditing associations that share a common interest in a highly
compliance-oriented ERM that emphasises the importance of internal control and inter-
nal auditing. On the contrary, ISO 31000 is much more generic in nature. As a result, it
can be used to support both a top-down and bottom-up approach to ERM.
To finally answer the first question: Neither COSO ERM nor ISO 31000 fully cover
all modern ERM topics in a way companies can easily implement. However, both frame-
works basically support a modern, value-creating view on ERM (see also Sect. 1.2). In
principle, they can be used complementarily, as they complement each other in many
areas, are considered mature, holistic and largely consistent. However, it should be noted
that such frameworks in general have to reflect the consensus of many different opin-
ions and hence can per definition only be valid for the “average company”. Significant
innovations don’t find their way into ERM frameworks, because they are usually not
capable of winning a majority. Thus, every risk professional should be aware of both
frameworks. They are helpful guidelines and can—to a certain extent—support a sound
ERM implementation.
To answer the second question: Neither COSO ERM nor ISO 31000 reflect all rel-
evant topics in this textbook. Or to put it differently: Both frameworks can not fully
replace the textbook at hand. Where appropriate, the two frameworks are referenced and
examples are discussed. At this point, we note that both frameworks basically do support
the paradigm of modern, value-creating risk management. To give the reader an impres-
sion of how this book differs from the recommendations of the frameworks, a few exam-
ples are discussed below (Hunziker 2018, pp. 6–7):
• Although both frameworks emphasise the importance of the connection to strategic
management, it remains unclear how the economic benefit (i.e. the value contribu-
tion) can be justified or measured in practice. In light of the fact that many companies
(still) do not recognise the benefits of ERM enough, this is very crucial.
• ISO 31000 and COSO ERM do not manage to establish a practical link between risk
appetite and decision-making processes. Risk appetite are concrete statements of what
types of risks (or the amount of uncertainty) a company consciously accepts regarding
potential impact and probability of occurrence in order to achieve its business objec-
tives. Both ISO and COSO struggle to explain how a company can discuss and set
its “risk appetite” properly. First, the statements on risk appetite made by COSO are
rather confusing and unrealistic. COSO ERM suggests that companies can formulate
very simple, qualitative risk appetite statements, such as “we do not accept serious
risks that could endanger our strategy”. These kind of statements are useless for deci-
sion-makers as they cannot be broken down into concrete recommendations for action
11
at lower organisational levels. If risk appetite is not reflected in the decisions which
impact business objectives on a daily base, risk appetite statements are not actionable.
• ISO 31000:2018 does not use the term risk appetite at all. Instead, the phrase “risk
criteria” is used: “The organization should specify the amount and type of risk that it
may or may not take, relative to objectives. It should also define criteria to evaluate
the significance of risk and to support decision-making processes” (ISO 2018, p. 10).
As the term risk appetite is well-known by most organisations and annual reports fre-
quently contain risk appetite statements, guidance how to concretely set risk appetite
would be helpful (IRM 2018, p. 11).
• Risk identification should also include a scanning process of the external environ-
ment, but COSO ERM is strongly internally focused. Many risks are neglected if
no external screening (competitors, trends, legal developments, international market
developments, etc.) is carried out. Moreover, COSO ERM ignores so-called “black
swan” events, i.e. risks with a very low probability of occurrence and a high potential
for negative impact.
• COSO uses the term “risk event” throughout the framework. By definition, a risk
event can suddenly become acute. However, there are many risks that manifest them-
selves slowly, sometimes over months or even years (e.g. changes in customer needs).
These so called emerging risks cannot be reflected in “risk events”. In addition, the
downside risk (what can go wrong?) dominates COSO’s view on risk. This can lead to
a significant overestimation of the overall business risk if opportunities are excluded
from the risk assessment.
• Practitioners may find ISO 31000 too generic in the sense of that the effort needed to
define and develop their own ERM framework is too time-consuming, too costly and
too less supported by the framework.
To sum up, we appreciate both frameworks as valuable sources for modern ERM imple-
mentation. As both frameworks partially lack the incorporation of well-accepted empiri-
cal evidence on methods, approaches and techniques in risk management, the textbook at
hand aims to contribute to closing these gaps as far as possible.
1.5 Challenges to ERM Implementation
Although we now know the main benefits of modern ERM, the potential is not yet being
fully exploited in practice. Risk management is still perceived mainly as a regulatory
requirement without significant added value. There are various reasons for this (see also
Segal 2011, pp. 28–31).
First, historically grown so called risk silos in the company must be eliminated.
Traditionally, risks have been managed by assigning risk responsibilities to specific
business unit leaders. For example, the CFO manages risks related to the organisation’s
financial risks (interest rates, liquidity, currencies). The Chief Operating Officer (COO)
1.5 Challenges to ERM Implementation
12 1 Introducing ERM
deals with risks in his or her area of responsibility, i.e. production and distribution. The
Chief Information Officer (CIO) is responsible for cyber risks and IT failure risks, and
so on. Each of these functional leaders is charged with managing risks related to their
key areas of responsibility. Each “silo leader” is responsible for identifying, assessing
and managing risks within their silo (Beasley 2016, p. 1). ERM language and techniques
have grown consistently within these silos, but not across the various silos. This often
impedes to assess enterprise-wide risk exposures due to inconsistencies of the diverse
assessment techniques applied in the risk silos.
The “E” in the term ERM requires an enterprise-wide risk assessment. However,
in practice, some business areas or support functions may not be considered relevant
enough from an overall perspective because they appear financially unimportant. As very
common in the audit profession, companies might apply a similar concept of material-
ity in planning and performing ERM activities. Very often, the scope of ERM projects
is defined according to certain significance thresholds. For example, a company could
assess the relative contribution (economic relevance) of each business area to the over-
all firm performance. For reasons of resource constraints, ERM processes are then often
not implemented in the areas defined as economically less important. However, this can
severely undermine the effectiveness of an ERM. A risk can originate, for example, in
rather unobtrusive, stable and smaller business areas and may impact the company as a
whole later on.
Thirdly, many companies strongly focus on financial risk management and financial
risks, which can be explained, among other things, by the recent financial crisis (global
phenomenon) and currency crisis (i.e. in Switzerland due to the strong Swiss franc).
From an ERM perspective, the question arises as to whether financial risks must indeed
be of highest priority for all companies. The management of financial risks is undoubt-
edly important, but for most non-financial companies, it often accounts for only an insig-
nificant amount of overall risk exposure. Various studies have shown that strategic risks
have by far the greatest impact potential on company value, followed by operational risks
(e.g. Smit and Trigeorgis 2004). Thus, for non-financial companies, most significant risk
sources can usually be identified in the development and implementation of the corporate
strategy. In most cases, risks and opportunities of technological change, the digitization
of business models, changing customer needs, growing competition or wrong decisions
in strategic project prioritization are far more important than pure financial risks spring-
ing from interest rates or currencies.
Fourthly, many practitioners and consultants obstinately believe that strategic and
operational risks cannot be quantified. However, only an appropriate quantification of all
risk categories allows a meaningful prioritization, assessment and management of risks
and opportunities. Since the well-known techniques of financial risk management can-
not be easily transferred to other risk categories, quantification of other risks does not
happen. In addition, other arguments are brought forward against risk quantification,
e.g. missing historical data, complexity of risks, non-applicability of stochastic models
and spurious accuracy. Other approaches, such as scenario analyses or Failure Mode and
13
Effects Analysis (FMEA), which draw on human intuition and subject matter expertise,
are not or too less used.
Finally, the training and professional experience of many risk managers is another
challenge to ERM. As a rule, the background and experience of the risk manager (or the
person in charge of risk management) significantly influences the specific approach of
ERM implementation. For example, risk managers with predominant experience in the
financial industry, equipped with training in mathematics, statistics and quantitative risk
modelling, are more focused on financial risks than on strategic risks.
With these challenges in mind, we proceed with the next chapter outlining the very
relevant topic on how to counter motivational, cognitive and group-specific biases in risk
analysis. Although a great deal of empirical evidence already exists on these biases, it is
still predominantly neglected in the practical application of ERM.
Key Aspects to Remember
Define the term ERM and its key attributes
ERM is an enterprise-wide coordinated process with which companies identify,
assess and actively manage all key risks in order to create value for all stakehold-
ers. An up-to-date ERM approach thus addresses risks in all business areas and
across all risk categories and considers the aggregated impact of those risks as an
interrelated risk portfolio on business objectives.
Contrast ERM with traditional risk management
Unlike ERM, many traditional risk management approaches fail because of their
complexity, their silo approach and their attempt to manage hundreds of risks at
the same time. Moreover, risk is traditionally only negatively interpreted and there-
fore diversification effects of upside risk potentials are neglected. Modern ERM
assesses risks and opportunities on an enterprise-wide level by the means of a con-
sistent “ERM language” which is understood across the company. Moreover, ERM
is directly linked to decision-making processes.
Explain which characteristics distinguish the term risk in the ERM approach
In the ERM approach, the primary causes of risk, which may be strategic, opera-
tional and financial, are relevant for the development of effective risk mitigation
strategies. It is crucial not to confuse cause with impact. By definition, risks can
both have an upside potential (better than expected) and downside potential (worse
than expected). Risk assessments thus deal with scenario development, covering
the sources and impacts (plausible story) of specific risks and result in providing
1.5 Challenges to ERM Implementation
14 1 Introducing ERM
realistic “quantified uncertainty ranges” between the worst and best case scenario
of each risk.
Explain why ERM is important to support decision-making processes
An integrated ERM approach enables decision-makers to include risk/return-con-
siderations in their judgements. Measured in terms of aggregated risk exposure and
contrasted with risk appetite, it becomes clear whether a company takes too few
risks and thus misses promising strategic opportunities (and vice versa). If compa-
nies understand how to manage their risk exposures, lower borrowing costs from
better ratings, higher firm value through better decisions, and greater capital effi-
ciency can result.
Describe the main challenges for ERM implementation
Although ERM emerged as an important business topic in practice, major chal-
lenges still pose a threat to successful ERM implementation. First, a stronger focus
on strategic risks is required. Many important risk sources spring from strategic
choices and strategy implementation. Second, all risks must be consistently quan-
tified to enable prioritization and evaluation. Thirdly, the background and expe-
rience of the risk manager in charge heavily determine the success of an ERM
programme. Finally, ERM has to cover all relevant business areas of the company,
even allegedly unimportant ones.
Critical Thinking Questions
1. Why is it important to differentiate between risk and uncertainty?
2. What role do cultural aspects play for the success and value creation of ERM?
3. What types of risks typically have an asymmetric risk distribution?
4. What is the main purpose of the 2017 updated COSO ERM Framework? To
what extent does the framework meet these intentions?
5. Why is it considered difficult to assess strategic and operational risks
quantitatively?
References
Beasley, M. S. (2016). What is Enterprise Risk Management? Poole College of Management,
Enterprise Risk Management Initiative, 1–6.
15
Committee of Sponsoring Organizations of the Treadway Commission (COSO) (2017). Enterprise
Risk Management – Integrating with Strategy and Performance. Jersey City, NJ: AICPA.
Committee of Sponsoring Organizations of the Treadway Commission (COSO) (2004). Enterprise
Risk Management –Integrated Framework. Jersey City, NJ: AICPA.
Eckles, D. L., Hoyt, R. E., & Miller, S. M. (2014). The impact of enterprise risk management on
the marginal cost of reducing risk: Evidence from the insurance industry. Journal of Banking &
Finance, 43 (C), 247–261.
Farrell, M., & Gallagher, R. (2014). The Value Implications of Enterprise Risk Management
Maturity. The Journal of Risk and Insurance 82 (3), 625–657.
Hampton, J. J. (2015). Fundamentals of Enterprise Risk Management. How top companies assess
risk, manage exposure, and seize opportunity (2nd Ed.). New York: American Management
Association.
Hampton, J. J. (2009). Fundamentals of Enterprise Risk Management. How top companies assess
risk, manage exposure, and seize opportunity. New York: American Management Association.
Hopkin, P. (2017). Fundamentals or Risk Management. Understanding, evaluating, and imple-
menting effective risk management (4th Ed.). London: Kogan Page.
Hoyt, R. E., & Liebenberg, A. P. (2011). The value of enterprise risk management. The Journal of
Risk and Insurance, 78 (4), 795–822.
Hunziker, S. (2018). Erfolgskriterien von Enterprise Risk Management in der praktischen
Umsetzung. In S. Hunziker & J. O. Meissner (Eds.), Ganzheitliches Chancen- und
Risikomanagement. Interdisziplinäre und praxisnahe Konzepte (pp. 1–28). Wiesbaden: Springer
Gabler.
Institute of Risk Management (IRM) (2018). A Risk Practitioners Guide to ISO 31000: 2018.
London: IRM.
ISO (2018). ISO 31000:2018 – Risk management Guidelines. Geneva, Switzerland: ISO.
Lam, J. (2017). Implementing Enterprise Risk Management. From Methods to Applications. New
Jersey: John Wiley & Sons.
Levy, C., Lamarre, E., & Twining, J. (2010). Taking control of organizational risk culture.
McKinsey Working Papers on Risk.
McShane, M. K., Nair, A., & Rustambekov E. (2011). Does Enterprise Risk Management Increase
Firm Value? Journal of Accounting, Auditing and Finance, 26 (4), 641–658.
Mishkin, F. S., & Eakins, S. G. (2018). Financial Markets and Institutions (9th Ed.). Harlow, UK:
Pearson.
Romeike, F. (2018). Risikomanagement. Wiesbaden: Springer Gabler.
Segal, S. (2011). Corporate Value of Enterprise Risk Management: The Next Step in Business
Management. New Jersey: John Wiley & Sons, Inc.
Smit, H. T. J., & Trigeorgis, L. (2004). Strategic Investment – Real Options and Games. Princeton:
Princeton University Press.
Smithson, C., & Simkins, B. J. (2005). Does Risk Management Add Value? A Survey of the
Evidence. Journal of Applied Corporate Finance, 17 (3), 8–17.
Schweizerische Nationalbank (SNB) (2015). Medienmitteilung: Nationalbank hebt Mindestkurs
auf und senkt Zins auf -0,75%. Zürich.
Vazquez, R. (2014). Five steps to a risk-savvy culture. Risk Management, 61 (9), 10–11.
Verbano, C., & Venturini, K. (2013). Managing Risks in SMEs: A Literature Review and Research
Agenda. Journal of Technology Management & Innovation, 8 (3), 186–197.
References
17© Springer Fachmedien Wiesbaden GmbH, part of Springer Nature 2019
S. Hunziker, Enterprise Risk Management,
https://doi.org/10.1007/978-3-658-25357-8_2
Countering Biases in Risk Analysis 2
Contents
2.1 Motivational Biases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.1.1 Affect Heuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.1.2 Attribute Substitution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.1.3 Confirmation Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.1.4 Desirability of Options and Choice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.1.5 Optimism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.1.6 Transparency Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.2 Cognitive Biases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.2.1 Anchoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.2.2 Availability Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.2.3 Dissonance Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.2.4 Zero Risk Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.2.5 Conjunction Fallacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.2.6 Conservatism Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.2.7 Endowment and Status Quo Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.2.8 Framing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.2.9 Gambler’s Fallacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.2.10 Hindsight Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.2.11 Overconfidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.2.12 Perceived Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.3 Group-Specific Biases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.3.1 Authority Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
2.3.2 Conformity Bias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.3.3 Groupthink . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.3.4 Hidden Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
2.3.5 Social Loafing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
18 2 Countering Biases in Risk Analysis
Learning Objectives
When you have finished studying this chapter, you should be able to:
• know the different biases in risk analysis
• understand the importance of biases in risk analysis
• recognise the need to counter biases throughout the risk process
• understand the limitations of debiasing strategies
• establish some real examples for your management and employees
There is always an easy solution to every human problem — neat, plausible, and wrong.
(Henry Louis Mencken)
Throughout the whole ERM process, it’s crucial to recognise that many risks do not
manifest themselves by exogenous events, but rather by people’s behaviour and choices.
Only by applying the intellectual capacity to question our current future prospects and
long-lived assumptions, we can obtain the means to manage the real risks to which com-
panies are exposed (Wolf 2012). As already explained, the primary objective of ERM is
to increase the quality of decisions by systematically analysing opportunities and risks.
Such risk analyses should make decision-making situations in companies more transpar-
ent and help to present uncertainties more realistically. Paradoxically, however, the input
factors for risk analyses are just as subject to biases as the decision situation itself. This
means that risk analyses only contribute to the quality of a decision if the risk manager
is aware of the most important motivational, cognitive and group-specific biases and can
reduce them by taking appropriate countermeasures.
Identifying and quantifying risks are two of the most important ERM activities in
which risk managers and related personnel engage. Behavioural decision research over
the last 50 years has found that these two risk management process steps are prone to
many motivational and cognitive biases. People usually overestimate some risks and
their corresponding probabilities and underestimate others. Biases are an inherent chal-
lenge to all decisions and deeply rooted in human behaviour. Thus, the question in ERM
activities is not whether biases exist, but rather how these distortions within the risk
management decision-making process can be effectively managed.
In the following, a distinction is made between cognitive and motivational biases. The
former refer to false mental processes that lead to deviant behaviour from socially well-
accepted normative principles (however, it is strongly believed that this type of bias is
important for evolutionary reasons). The latter include conscious or unconscious distor-
tions of opinions due to different incentives like social pressure, organisational environ-
ment and self-interest (Montibeller and von Winterfeldt 2015, p. 1230).
Unfortunately, the vast amount of literature has dealt only with cognitive biases
and has neglected motivational biases which are harder to account for in an ERM pro-
gramme. In many cases in literature, motivational biases are mistakenly classified as
192.1 Motivational Biases
cognitive biases. Some of the biases of both groups can be alleviated or amplified in
group decision-making processes. To account for the importance of group-specific activi-
ties in ERM processes (e.g. risk management workshops), a separate chapter particularly
covers group-specific biases.
After the explanation of each bias, specific measures are suggested which the risk
manager can apply or propose to mitigate or eliminate the negative effects. These proce-
dures and attempts to counter biases are known as “debiasing techniques”.
2.1 Motivational Biases
Let us first look at motivational biases. These biases are judgments that are influenced
by the desirability or undesirability of events, consequences, outcomes or decisions in a
company. This includes, for example, the deliberate attempt by experts to provide opti-
mistic forecasts for a preferred action or outcome. Another example is underestimat-
ing the cost of a project to deliver bids that are more competitive. Selected motivational
biases which are believed to severely impact risk analysis are presented below.
2.1.1 Affect Heuristics
Affect heuristics are a sort of mental abbreviation in which people make decisions that
are strongly influenced by their current emotions. Essentially, everyone’s personal affect
(a psychological term for emotional reaction) plays a crucial role. Emotions influence all
kinds of decisions, large and small ones. After all, it seems obvious that someone is more
likely to take risks or try new things when he or she feels happy. Likewise, individuals
are less likely to make difficult decisions when they are depressed. If someone relies on
his “gut feeling” to make an important decision, this is typically an example of affect
heuristics (Montibeller and von Winterfeldt 2015, p. 1235).
Affect-based assessments are more pronounced when people do not have the
resources or time to think. Rather than looking at risks and rewards independently, peo-
ple with a negative attitude, e.g. towards an internationalization strategy of a company,
may assess their benefits (opportunities) as low and their risks as high. This leads to a
more negative risk-benefit correlation than would be observed under conditions without
time pressure (Finucane et al. 2000).
One study for example found that tobacco, alcohol and food additives are all per-
ceived as high-risk and low-reward topics. In contrast, X-rays, vaccines and antibiotics
are considered low-risk and high-reward (Fischhoff et al. 1978). The important aspect
of this result is that the positions have always been classified as both low-risk and high-
reward (or vice versa), even if some positions are actually high-risk/high-reward or low-
risk/low-reward. This result occurs because smoking, drunkenness and food additives
trigger negative emotional reactions, while the other activities trigger positive emotions.
20 2 Countering Biases in Risk Analysis
Therefore, we do not really consider the true risks and opportunities; we automatically
choose the more positive option (low risk and high reward) for concepts with positive
associations and do the opposite for those with negative associations (The Decision Lab
n. d.).
Various approaches can help to reduce the negative consequences of affect heuris-
tics. Risk managers can check whether decision-makers focus too much on a single risk
assessment proposal. They can bring critical decisions to a panel with alternative view-
points to discuss risks and opportunities. In this way, it is possible to avoid underesti-
mating the risks of an idea that somebody is very attached to. Companies can also use
decision-making tools that allow various factors to be weighted and evaluated. Within
the scope of risk identification, risks and potential risk scenarios should be formulated as
neutrally as possible. In risk assessments, it may be necessary to have risk scenarios to
be assessed by different people with different backgrounds, interests and incentives.
For example, this could be supported by an ERM committee. Such a committee usu-
ally consists of specialists and experts from different divisions and business units. This
means that the assessment of losses or financial consequences resulting from a potential
occurrence of risk should be much more well-founded and complete than the assessment
by individual, possibly unrelated employees.
2.1.2 Attribute Substitution
Attribute substitution is an attempt to solve a complex problem with a heuristic attrib-
ute that is a false substitution. Concretely, people involved in risk analysis may sub-
stitute a difficult problem for an easier one incorrectly and without being aware of it.
Attribute substitution is a generic model that is applicable in many different areas and
can be easily remembered. Essentially, attribute substitution is the collapse of attention
from a broader, complex question to one that is narrower, but more easily answered
(Smith and Bahill 2009, p. 2). Attribute substitution may take many forms. Examples
include the substitution of an emotion such as fear. The problem of attribute substitu-
tion is that it often causes inaccurate (risk) assessments of emotional themes such as
dread risks (terrorism, plane crash, pandemic situation).
For example, when individuals are offered insurance against their own death in a ter-
rorist attack while on a foreign trip, they are willing to pay more for it than they would
for insurance that covers death of any kind on that trip, although the latter risk obviously
includes the former risk. Kahneman concludes that the attribute of fear is being substi-
tuted for an assessment of the total risk exposure of being abroad. Fear of a terrorist
attack is perceived as more significant risk than fear of dying on a trip (Kahneman 2007).
Kahneman and Frederick propose three conditions for attribute substitution (2002):
• It is not expected that substitution will take place when answering factual questions
that can be retrieved directly from memory or about current experiences.
21
• An associated attribute is easily accessible, either because it is automatically assessed
in normal perception or because it has been primed.
• Substitution is not recognised and corrected by the reflective system. For example,
when asked, a bat and a ball cost CHF 1.10 together. The racket costs CHF 1 more
than the ball. How much does the ball cost? Many respondents erroneously answer
with CHF 0.10. One explanation regarding attribute substitution is that instead of
working out the sum, respondents split the sum of CHF 1.10 into a large and a small
amount, which is easy to do. Whether they think this is the correct answer depends on
whether they check the calculation with their reflective system.
There is unfortunately no simple solution for the substitution attributes in the ERM
process. First of, it is important to become aware of the fact that people tend to sub-
stitute simpler but related risk assessments in place of more complex risk assessments.
Subsequently, examples of this bias can be presented to managers and decision-makers
to demonstrate their own behaviour. Some suggestions made by Smith and Bahill (2009)
in the context of ameliorating attribute substitution in systems engineering might be
adapted to risk analysis (pp. 15–16): To counter the risk to mistakenly replace a complex
risk phenomenon with an easier, but wrong one, is to deliberately create risk analogies of
greater complexity in addition to the current (easy) risk scenario. The idea behind this is
that the development and discussion of risk analogies of greater complexity can be use-
ful because they offer new perspectives on the same risk and reduce the risk to come to
quickly to a too simple, substituted solution.
A second (partial) remedy of attribute substitution is to draw on subject matter experts
in risk analysis processes. A subject matter expert is characterised by long lasting practi-
cal experience that positively impacts perceptual abilities, recognition skills and enables
faster decision-making. In addition, experts have stronger self-monitoring capabilities
which allows them to recognise when they make for example false and too easy judge-
ments on risks. As Smith and Bahill (2009) point out, “such noncollapsing situational
awareness should serve to prevent erroneous attribute substitution” (p. 16).
2.1.3 Confirmation Bias
Confirmation bias is one of the most common cognitive biases for decision-makers. This
type of bias tends to interpret information based on an earlier assumption rather than let-
ting the data speak for itself (Wolf 2012). It shows the tendency to select and consider
only (risk) information that confirms our existing beliefs and assessments. For example,
suppose a manager believes that men will respond positively to a new service and sends
surveys to men who have tested the service. Confirmation biases can lead him to inter-
pret this survey in a way that confirms his preconceived notion. On an organisation-wide
level, the data that underlie a decision process can be flawed. Without conscious, system-
atic probing, data selection is prone to confirmation bias (Baer et al. 2017).
2.1 Motivational Biases
22 2 Countering Biases in Risk Analysis
The confirmation bias can occur in different stages of the ERM process. During the
risk identification process, there is a risk that only factors that confirm an initial pre-
selection will be taken into account. For example, cyber risk exposure can be confirmed
due to the high media presence. This is despite the fact that a company has no online
presence at all and is already very well prepared when dealing with the Internet. The
distortion can also occur during risk analysis and quantification. Once an assessment has
been carried out, facts are sought that support it.
As a manager or risk manager, it is a rare luxury to have all the relevant data before
making an informed decision. More often, we have to deal with incomplete information,
which leaves us open to confirmation bias. To avoid this trap, it is recommended to take
some time before making important decisions and ask ourselves what would have hap-
pened if we had made the opposite choice. One approach to effectively counter that bias
is to collect specific data to defend an opposite view of specific risk scenarios and then
compare it with the data that supported the first risk assessment. Next, risk managers can
reassess the decision against the larger record. Still, the perspectives may be incomplete,
but the risk assessment will be much more balanced (Redman 2017).
To further reduce the confirmation bias, risk managers should review the following
countermeasures. It is highly recommended that different subject matter experts on the
same topic are involved when making decisions on risks. For example, when it comes to
probability assessments, it is worth having the same risk scenario assessed independently
by different experts. It is also advisable to remove the time pressure from decisions and
to deal intensively with an important risk/reward decision that have considerable con-
sequences on business objectives. Finally, a corporate culture that allows for different
views and opinions supports the critical engagement with risks.
2.1.4 Desirability of Options and Choice
Desirability bias refers to the tendency to give socially desirable answers instead of
choosing answers that reflect true views. The distortion of responses due to this personal-
ity trait becomes an important issue when, for example, unwanted risks or risks that may
jeopardise a project are being discussed. If a person knows that he or she is being moni-
tored, it is more likely that he or she will primarily indicate the risks that are known or
easy to manage. This obviously distorts the risk relevant data (Grinnell and Unrau 2018,
p. 488). Accordingly, the bias leads to over- or underestimating of probabilities, conse-
quences, values, or weights in a direction that favours a desired alternative (Montibeller
and von Winterfeldt 2015, p. 1235).
Precautions should be taken to mitigate the negative effects of the desirability of
options. Basically, it helps (again) to involve different stakeholders in decision-making
situations (Montibeller and von Winterfeldt 2015, p. 1235). With regard to ERM, for
example, opinions of experts from other departments or business units can be consulted
during risk assessments. The collected risk scenarios and associated risk data can also
23
be validated by experts. It is advisable to implement incentives and responsibilities that
fundamentally reduce this bias. Those people who are responsible for achieving business
objectives are basically more focused on a comprehensive identification and analysis of
the risks.
In addition, it is a crucial task to ask the right questions in the consciousness of this
bias. Thus, suggestive questions should be consistently avoided. It is also important to
create a corporate culture in which risks can be discussed openly. This includes ensur-
ing that the disclosure of risks has no negative impact on employees. This means that the
level (impact) of the risks would play only a minimal or no role when it comes to remu-
neration. Rather, the far-sighted management of relevant risks intentionally accepted in
order to pursue business objectives should be assessed. Presenting concrete examples of
such biases at the beginning of decision-making processes can also increase awareness.
2.1.5 Optimism
This cognitive bias occurs when the desirability of a result leads to an increase in entry
expectations. It is often referred to as “wishful thinking” or “distortion of optimism”.
The bias is particularly evident when people assess the impact or consequences of a risk
scenario. It is the tendency to judge positive results too optimistically or the tendency not
to identify the potentially negative results or to not see them completely (Emmons et al.
2018, p. 58). Unwanted optimism can therefore lead to unnecessary risks being taken.
For example, we usually underestimate the risk of being involved in a car accident
or falling ill. At the same time, we expect to live longer than is indicated by objective
data. We also think that we are more successful in our job than we are (Sharot 2011,
p. R941). The same distortion can also be seen in everyday business or in projects. Many
large projects are budgeted far too low because decision-makers face an optimism bias.
This often has negative financial consequences. Despite this, some of today’s elementary
buildings would hardly have been realised if cost truth had prevailed right from the start.
Accordingly, this distortion can also have positive effects.
The following factors make the optimism bias more likely to occur (Cherry 2018a).
• Infrequent risk scenarios are more likely to be influenced by the distortion of opti-
mism. People tend to think that they are less likely to be affected by events such as
floods just because they are usually not everyday events.
• People experience the distortion of optimism more when they think that the events are
under direct control of the individual. It is not the case that people believe that things
will work magically, they rather think that they have the skills and know-how to do so.
• The distortion of optimism is more likely to occur when the negative risk scenarios
are perceived as unlikely. For example, if a person believes that companies rarely go
bankrupt, they are rather unrealistically optimistic about these specific risks.
2.1 Motivational Biases
24 2 Countering Biases in Risk Analysis
Research has shown that people who are anxious are less likely to be confronted with the
optimism bias. It has also been found that experiencing certain risk events can reduce the
distortion of optimism. Related to ERM, the occurrence and consequences of a risk can
thus reduce the value of experience and thus the optimism bias. After all, it is less likely to
experience the bias if one regularly compares one’s behaviour with that of others in deci-
sion-making situations. In this context, it can help to establish valuation rules and place
hypothetical bets against the desired event (Montibeller and von Winterfeldt 2015, p. 1235).
Researchers also have tried to help people reduce the distortion of optimism, espe-
cially to promote healthy behaviours and reduce risky behaviours. However, they have
found that reducing or eliminating the bias is indeed incredibly difficult. Attempts to
reduce the optimism bias through measures such as educating participants about risk fac-
tors, encouraging them to consider risky examples, and educating subjects have led to
little change (Cherry 2018a).
In the context of risk analysis, the following approach might reduce the optimism
bias: Similar to the previous biases, it is crucial to take an outside view on risk scenarios
by considering additional perspectives of subject matter experts. One effective approach
that supports this idea is called “prospective hindsight”, in which participants of risk
assessments imagine that a specific business objective has not been accomplished and
then identify all the possible risks why this happened. This exercise enables people iden-
tify possible risks and opportunities in their assessments that may not come to mind oth-
erwise (see similar Singh and Ryvola 2018).
2.1.6 Transparency Bias
Gleißner (2017) states that a transparent identification and presentation of risks is not
necessarily in the personal interest of each manager and decision-maker (p. 14). Various
reasons for this can be found that lead to both conscious and unconscious non-identifica-
tion of risks. For example, it can be assumed that people who are prepared to take fraud-
ulent (business-damaging) actions do not support complete transparency. They probably
do not want past fraudulent actions to be uncovered, nor do they want such actions to be
thwarted in the future.
Furthermore, the transparent presentation of risks can weaken a manager’s own posi-
tion. It is possible that some projects would be discontinued if all risks were presented
transparently. Specifically if an employee or even a manager is dependent on a project
and wants to advance his or her career with it, a conscious non-identification is to be
assumed. However, lack of communication about the benefits of ERM can also lead to
uncertainty on the part of employees, who consciously and unconsciously conceal risks.
Increasing managers’ motivation to be accurate is a key remedy. This can be done by
making them aware of potential biases, or by incentivizing them for the accuracy of their
feedback. Rewards for accurate feedback on risks and rewards does not sound intuitive at
first. The key idea here is to reward people to be more transparent and precise about risk,
25
independent from the scale (impact) of the risk. Training, bonuses or other incentives
could be offered for increasing the transparency in risk assessments. If such incentive
systems are adequately established, superiors can also recognise who is reporting hon-
estly and correctly which also increases visibility.
Gamification might be a very promising approach to counter transparency bias. In
fact, very little research on the relationship of game mechanisms and ERM transparency
is available. However, motivating people to be transparent in risk assessments could be
enhanced by awarding specific “transparency rewards”: Collecting points, unlocking
new levels, receiving fictitious titles and other approaches could play an important role.
Internal and external leaderboards support these transparency efforts. In this context, it is
important that incentives should not only be implemented at the individual level, but also
at the team and department level (Hossain and Li 2013).
2.2 Cognitive Biases
Cognitive biases are systematic errors in thinking that may affect input into decisions
and judgments that people make. Basically, from an evolutionary standpoint, these
instincts provide mechanisms to make rapid decisions in important and complex situa-
tions based on previously observed patterns (Rees 2015, p. 12). One must be careful not
to confuse cognitive biases with logical fallacies. A logical fallacy is based on an error
in a logical argument, while a cognitive bias is related to false thought processing often
arising from challenges with attention, attribution, memory or other mental stumbling
blocks.
2.2.1 Anchoring
To arrive at a decision an individual usually starts from an anchor number and then
adjusts that number or estimate by correcting it up or down (Wolf 2012). A decision
maker must be careful not to use this as a shortcut that can lead to wrong decisions.
People have the habit that they like to think automatically. Sometimes we avoid making
decisions because it is too much of a burden. Anchoring could be an easy way to make
decisions based on one particular piece of information. When decision makers focus on
or give too much weight to one piece of information without considering other crucial
factors, serious mistakes are made (Friedman 2017).
Information overload and lack of time make people more susceptible to anchoring. If
there are no clear points of orientation available to the decision-maker, the person prefers
to seek for an anchor. If an anchor is not readily available, a decision-maker will prob-
ably consider the first one when some numbers, statistics or other information is pre-
sented. Any projection of the future is to some extent based on historical data and also
2.2 Cognitive Biases
26 2 Countering Biases in Risk Analysis
includes some anchoring. As the balanced and conscious decision-making on risks and
rewards is a centrepiece of ERM, it is important that risk-based decisions are not based
on anchors that may significantly bias risk perception and risk assessments.
Example
Anchoring is not a curiosity only occurring in research laboratories; it can be just as
powerful in the real world. In an experiment conducted a few years ago, real estate
agents were given the opportunity to assess the value of a house that was actually for
sale. They visited the house and studied a comprehensive information brochure con-
taining a price claim. Half of the brokers saw an asking price that was significantly
higher than the list price of the house; the other half saw one that was significantly
lower. Each broker expressed his opinion about a reasonable purchase price for the
house and the lowest price at which he or she would sell the house if he or she were
the owner.
The estate agents were then asked about the factors that affected their judgment.
Remarkably, the asking price was not one of these factors; the brokers were proud
of their ability to ignore them. They claimed that price demands did not influence
their answers, but they were wrong. The anchor effect was 41%. In fact, knowledge-
able practitioners were almost as vulnerable to anchor effects as students of business
administration without real estate experience, whose anchor index was 48%. The
only difference between the two groups was that the students admitted to having been
influenced by the anchor, while the professionals denied this influence (Kahneman
2012).
Several measures are available to deal with anchoring. Risk managers can consider a
specific reference point for information when preparing risk-based decisions. It may be
essential to set an anchor based on current knowledge and financial objectives and be
willing to adapt it to changing circumstances. It is important to consider and discuss the
underlying fundamental data and assumptions which led to a specific anchor. In addi-
tion, risk managers must ensure that risk assessments remain flexible and are open to
new sources of information during workshops or interviews. They must be aware of that
bias in risk analysis and not provide interviewees with specific anchors prior risk identifi-
cation and risk assessment.
A skilled risk manager can ask relevant questions that can reveal a company’s anchor-
ing behaviour. Are risk assessments carried out in such a way that a constructive dis-
cussion between different opinion leaders has led to consensus? Are risks assessed on
a neutral basis without specifying anchor numbers or anchor data prior to risk assess-
ment? Are risks consequently discussed with an advocate who argues against the first
consensus within risk assessments or risk workshops? Taking into account these aspects
may help to ameliorate anchoring bias (see similar Kent Baker and Puttonen 2017,
pp. 118–119).
27
2.2.2 Availability Bias
As suggested by Tversky and Kahneman (1973), a persistent cognitive bias that has spe-
cial relevance for risk perception is known as availability. Leaning on frequently occur-
ring (risk) events is an often applied short cut when trying to predict the future and make
decisions when faced risk and uncertainty (Wolf 2012). Availability is also affected by
numerous factors unrelated to the frequency of occurrence. An example of availability is
the extent to which individuals are influenced by their memories and perceptions of past
events in discussion about (future) risks and opportunities.
Due to the availability bias, many risk assessment are heavily distorted. For example,
we tend to systematically overestimate the risk of earthquakes, thunderstorms or fires.
At the same time, we underestimate strategic or operational risks such as increasing
customer complaints or systematic bottlenecks at management level. Topics often inten-
sively covered by media and press are often much rarer as we believe. Spectacular risks
are basically much more present in our brains than the opposite.
The availability bias may for example affect the Board of Directors. As a rule, there
is usually an intense discussion about what management presents, e.g. quarterly figures
such as revenues and EBIT. More important topics such as a skilful product launch by
the competition, increased employee turnover or an unexpected change in customer
behaviour are rarely adequately discussed. However, these neglected topics can pose sig-
nificant threats to the company, i.e. can become strategic risks.
The following points can be suggested as countermeasures. It may be worth to offer
basic courses and trainings on how probability estimates can be assessed not based on
past events and experience. Providing counter-examples can also be used to show the
effect of availability biases. In this context, risk managers can address the challenge
of assessing risks prospectively instead of retrospectively. Risk managers can set high
standards for “neutral thinking” in risk workshops by asking questions to uncover poten-
tial availability distortions such as: What happened in the past? Has this risk occurred
once or several times in the past? What type of risk mitigation has been performed after
this risk? Is this risk still relevant in the future? In summary, it can be said that risk man-
agers and risk managers who assess risks should pay attention to past information that
flows into scenario development (Montibeller and von Winterfeldt 2015, p. 1233).
Additionally, different perspectives of various persons involved in risk assessments
should be considered regularly. A risk manager may form a team with different experi-
ences and perspectives. This countermeasure itself will limit the distortion of availability
as people usually question each other’s natural thinking. It can be worth to consider also
external perspectives that simply do not exist within the company.
2.2 Cognitive Biases
28 2 Countering Biases in Risk Analysis
2.2.3 Dissonance Bias
An incompatible opinion (e.g. risk assessment) with our existing way of thinking cre-
ates discomfort because our mind cannot easily deal with contradictory ideas at the same
time. This discomfort is called cognitive dissonance. The result is the urge to discredit
or ignore information that does not fit the current way of thinking. Thus, it is conceiv-
able that information about downside risk is ignored because it contradicts the poten-
tial opportunities (rewards). Avoiding this dissonance can obviously affect the quality of
decisions under uncertainty.
Cognitive dissonance in the workplace is widespread and a major source of stress for
professionals working for example in organisational support functions such as risk man-
agement. There are many examples and scenarios that can lead to cognitive dissonance,
ranging from observing inappropriate and poor leadership practices to encouraging peo-
ple to take on tasks that are not consistent with procedures, norms, training, organisa-
tional or personal values. When confronted with contradictory beliefs and practices and
the pressure to tolerate them, these professionals often experience deep personal dissatis-
faction (Celati 2004, p. 58).
A first step in overcoming and eliminating dissonances is that risk managers are
aware of it and address them in risk management workshops or interviews. Skilled risk
managers can try to identify existing and potential dissonances. Role-playing exercises
can create comfort and confidence, which in turn reduces dissonance. Another approach
is to ask trusted people to review its own actions and beliefs and suggest alternative
courses. Successful risk managers seek feedback from others and consider their opinions
in risk assessment (Kent Baker and Puttonen 2017, p. 121).
2.2.4 Zero Risk Bias
The zero risk bias describes individual’s preference for options which result in reduc-
ing small risk to zero over a greater reduction in larger risks compared to the first. In
other words, we tend to have a preference for the absolute certainty of a smaller benefit
(i.e., complete elimination of risk) to the lesser certainty of receiving a larger benefit.
This bias can be observed specifically by risk averse people and managers. These risk
averse decision-makers prefer small benefits which can be certainly realised to large ones
which are less certain. For a risk decision-maker, the importance of having knowledge
about this bias cannot be understated.
Example
Scientists identified a risk-free bias in the responses to a questionnaire about a hypo-
thetical cleaning scenario involving two dangerous sites X and Y, with X causing 8
cases of cancer annually and Y causing 4 cases annually. Respondents chose three
remedies: Two options each reduced the total number of cancer cases by 6, while the
29
third reduced the number by 5 and completely eliminated the cases at site Y. The third
option reduced the number of cancer cases by 6 per year. The third option reduced
the total number of cancer cases by 6, while the third option reduced the number by 5
and completely eliminated the cases at site Y. The third option reduced the total num-
ber of cancer cases by 6, while the third option reduced the number by 5 and com-
pletely eliminated the cases at site Y. The third option reduced the number of cancer
cases by 6, while the third option reduced the number by 5 and completely eliminated
the cases at site Y. While the latter option had the worst overall reduction, 42% of
respondents rated it better than at least one of the other options. This conclusion was
similar to an earlier economic study, which found that people were willing to bear
high costs to eliminate a risk completely (Baron et al. 1993).
This bias can occur at various stages in ERM, specifically when weighing two options.
In order to reduce the risk of a disaster from 5 to 0% (i.e. to completely exclude it),
people would invest a lot more than they would to reduce it from 10 to 5%. This effect
shows that people attach irrational importance to unlikely events. Particularly concerning
risk mitigation efforts, this bias can have a considerable impact on costs.
A general solution for zero risk bias is not known. It is important to be aware that
there is no such thing as complete security, i.e. zero risk. One way to reduce the cer-
tainty effect can be by avoiding so called “sure things” in utility elicitation and separat-
ing value and utility elicitation. It can also be useful to examine the relative risk attitude
and to point out possible misinterpretations. In summary, it is often not the best course of
action to completely eliminate one risk. Instead, a balanced risk portfolio that will yield
a greater aggregated relative risk reduction is more efficient and effective than focusing
solely on risks which can be completely mitigated.
2.2.5 Conjunction Fallacy
The conjunction (joint occurrence) of two risk events is considered more likely than the
constituent risk event, specifically if the probability assessment is based on a reference
case similar to the conjunction. Conjunction errors occur when we assign a higher prob-
ability to a risk event with higher specificity. This fundamentally violates the laws of
probability. Consider the following example from tennis:
• A: Roger Federer will win the game
• B: Roger Federer loses the first set
• C: Roger Federer will lose the first set, but win the match
• D: Roger Federer wins the first set, but loses the match
Different studies by Kahneman show that people arrange the chances by directly con-
tradicting the laws of logic and probability. He explains this as follows using the above
2.2 Cognitive Biases
30 2 Countering Biases in Risk Analysis
tennis example: The critical points are B and C. B is the more comprehensive event and
its probability must be higher than that of an event it contains. In contrast to logic, but
not representativeness or plausibility, 72% of the respondents gave B a lower probability
than C. However, the loss of the first set is by definition always a more likely event than
the loss of the first set and victory in the game (Tentori et al. 2013). The following exam-
ple rooted in the insurance industry further illustrates the conjunction fallacy.
Example
If people are given the opportunity to take out air travel insurance shortly before the
flight, they appear willing to pay more for insurance that covers terrorism than insur-
ance that covers any cause of death from air travel—including terrorism. Obviously,
insurance that only covers terrorism should be worth less than insurance that covers
terrorism in addition to some other risks (see Fig. 2.1). Perhaps because we are more
capable to imagine a particular risk event, we are often more likely to expect that risk
happen compared to broader, unspecific risk events (Hubbard 2009, p. 100).
In business we are often prone to conjunctional errors, probably because we face so
much supportive context. For example, we might hear separate rumours that company
budgets are about to be cut and that a senior executive in our department is considering
leaving the company. We consider each of these events unlikely—perhaps a 33% chance
of budget cuts and a 25% chance of the executive leaving. But if we hear both rumours at
the same time, our intuition that both events will happen is pretty high—maybe 50% or
more.
To reduce conjunction fallacy, risk managers should illustrate the logic of joint prob-
abilities with Venn diagrams and provide concrete examples to participants of risk
workshops or interviews. Employees need to understand the bias and its relevance for
decision-making. One approach to uncover the conjunction fallacy is to assess the proba-
bility of two events separately and then estimate the conditional probability of one event,
given that the other event occurs. Whenever a company faces important decisions which
include several risk scenarios that can occur simultaneously, it is helpful to discuss the
probabilities of these scenarios with several experts within and outside the company.
Terrorism
insurance
Insurance for
other causes of
death
Insurance for
any cause of
death
Fig. 2.1 Intersection example from the insurance industry
31
2.2.6 Conservatism Bias
Conservatism bias is a mental process in which people hold on to their previous views or
predictions at the expense of recognizing new information (Edwards 1982). Suppose a
trader receives bad news about a company’s earnings and this news contradicts another
profit estimate from the previous month. Decision-makers can take a conservational
approach in order to minimise risks. However, this bias can result in lower profits.
Avoiding bizarre and unhealthy risks should be the goal, while at the same time increas-
ing prudent risk taking, which does not necessarily leads to greater risk exposures.
For example, there is a tendency to overestimate the probability of low-probability
risk events occurring, where impact would be significant if such a risk event did happen.
At the same time, a conservative mind-set may not fully take into account the reality that
most operational risks are higher-probability risk scenarios. It is important to note that
the conservatism bias seems to contradict the representativeness bias, the latter referring
to an overreaction to new information, while the distortion of conservatism refers to an
underreaction to new information.
Risk managers can reduce conservatism bias by carefully reviewing new informa-
tion to determine its value over previous beliefs and seek unbiased advice. If new infor-
mation is difficult to discover, verify, or explain, opinions by subject matter experts
become more important. However, every new piece of information should be analysed
and deserves careful review—it may reduce uncertainty. Another approach is to make the
thinking process more flexible, meaning that people need to learn to let go of previous
beliefs when confronted with credible evidence that contradicts existing opinions and
estimates. If people are about to ignore information because it is difficult to understand
(such as math or statistics), risk managers must either take the time to translate this infor-
mation into “business language” or involve an expert who can support the explanation of
this information.
2.2.7 Endowment and Status Quo Bias
Another type of cognitive bias is the status quo bias. People prefer things to stay the way
they are, or that the current state remains the same. They ask to get paid more for an item
they own than they are willing to pay for it when they do not own it. Accordingly, their
disutility for losing is greater than their utility for gaining the same amount (Montibeller
and von Winterfeldt 2015, p. 1235). This distortion can affect human behaviour and is of
interest in many areas of sociology, politics and economics.
The evidence from a large number of experimental studies demonstrates the endow-
ment effect. In simple versions of such experiments, half of the participants receive a
particular object—for example a lottery ticket, a chocolate bar, or a pen, depending on
the experiment—and the other half receive the equivalent monetary value. Subsequently,
2.2 Cognitive Biases
32 2 Countering Biases in Risk Analysis
participants are allowed to swap the object and the money, either with the experimenter
or with each other, again depending on the particular experiment.
However, the number of trades is usually considerably lower than expected, and the
vast majority of participants prefer to keep what they receive: for instance the pens were
worth more money to those objects who started with pens than to those who started with
money. This behaviour is usually regarded as a consequence of the effects of “loss aver-
sion” and the “status quo” bias.
In politics, the status quo bias is also often used to explain the conservative way of
thinking. People who describe themselves as conservative tend to focus on preserving
traditions and keeping things as they are. This avoids risks associated with change, but
also misses possible benefits that change could bring. Of course, as with many other cog-
nitive distortions, the status quo bias has a benefit. Since it prevents people from tak-
ing risks, the bias provides some protection. However, this risk avoidance can also have
negative effects if the alternatives actually offer more safety and benefit than the current
state (Cherry 2018b).
Debiasing endowment and status quo is difficult in practice. Risk managers could
explain that the status quo is not relevant for future decisions on risks and rewards. When
for example discussing project risks, he or she can show that sunk costs should not play
a role in the risk analysis and subsequent decisions (Montibeller and von Winterfeldt
2015, p. 1235).
2.2.8 Framing
Framing effects mean that people’s response to information is influenced by how infor-
mation is presented (Wolf 2012). People’s preferences can be reversed by appropriate
information design. As in prospect theory, framing often comes in the form of profits
or losses. This theory shows that a loss is perceived as more significant and thus more
avoidable than an equivalent gain. In the hierarchy of choice architecture, a safe profit
is preferred to a probable one, and a probable loss to a safe loss. Decisions can also be
formulated in such a way that the positive or negative aspects of the same decision are
highlighted, thus bringing affect heuristics to the fore.
The following example can illustrate the framing effect:
Example
“Participants saw a film of a traffic accident and then answered questions about the
event, including the question ‘About how fast were the cars going when they con-
tacted each other?’ Other participants received the same information, except that
the verb ‘contacted’ was replaced by either hit, bumped, collided, or smashed. Even
though all of the participants saw the same film, the wording of the questions affected
their answers. The speed estimates (in miles per hour) were 31, 34, 38, 39, and 41,
respectively.
33
One week later, the participants were asked whether they had seen broken glass at
the accident site. Although the correct answer was ‘no,’ 32% of the participants who
were given the ‘smashed’ condition said that they had. Hence the wording of the ques-
tion can influence their memory of the incident.” (Memon et al. 2003, p. 118).
Risk managers can reduce framing effects by trying to “see through the frame”, or rather,
to look at things more objectively. This task is difficult because people may have incen-
tives “nudge” others in a certain direction or decision by the way they present informa-
tion. For example, division managers try to convince management of their successful
projects or risk mitigation measures by advertising and presenting them positively (Kent
Baker and Puttonen 2017, p. 121).
It seems important in this context that incentives exist not only at the individual level
but also at the team and department level. Another option is to get a second opinion from
a person who is not involved in the decision-making process. In most cases, the latter
can look at the different options from a more neutral perspective. Finally, research for-
tunately shows that if people feel happy, framing effects can be reduced (Cassotti et al.
2012).
2.2.9 Gambler’s Fallacy
Tversky and Kahneman introduced the gambler’s fallacy as a result of heuristic repre-
sentativeness in the 1970s. It arises from belief in the law of small numbers, namely the
notion that irrelevant information about the past is important to predict future events. If
a random event has occurred several times, we tend to predict that it will occur less fre-
quently in the future, so that the results balance out on average. This, we do not realise
that small samples are often not representative of the population (Sun and Wang 2010,
pp. 124–125). This error must be taken into account in particular in risk analysis and risk
scenario quantification.
Gambler’s Fallacy and the hot hand fallacy are closely related, but somewhat dif-
ferent. The hot hand fallacy refers to the phenomenon that we believe a number of
successful events (e.g. non-occurrence of risk) must be continued just because a num-
ber of successes have just occurred. For example, because no risk occurred in the last
three years, we are more likely to think that no risk will occur in the fourth year. The
Gambler’s Fallacy applies in case we expect a reversal of the results, not for the continu-
ation of a certain result.
Today, a large number of risk decisions are strongly influenced by data analysis.
McCann (2014) noted that with the increasing dependence on data analysis results, play-
ers’ mistakes are becoming more and more apparent. A typical evidence that can be
found in prediction is the tendency to observe and identify certain patterns in data, even
if these “patterns” can only occur due to nothing but random events.
2.2 Cognitive Biases
34 2 Countering Biases in Risk Analysis
In order to reduce Gambler’s Fallacy, it is advisable to impart basic statistical knowl-
edge to employees. Managers who make important decisions need to know and under-
stand statistical fundamentals. By explaining the probability logic and the independence
of events, better decisions can be made. Risk managers can identify typical examples
of mistakes and present them to management and employees (Montibeller and von
Winterfeldt 2015, p. 1236).
2.2.10 Hindsight Bias
The hindsight bias describes that people change their estimates of the probability of
events and outcomes after they are already known. They overestimate their ability to
predict past events, even if the outcome was completely unpredictable (Wolf 2012).
The bias arises because it is difficult for people to separate what they currently know
from past experience. Although hindsight bias is now widely accepted, the under-
lying mechanisms that explain it are still being discussed. The problem with this bias
is that we believe that the causes of past events were simpler than they actually were.
Understanding this distortion is therefore essential so that we can learn from our expe-
riences and mistakes. One area in the decision-making process that is very likely to be
affected by hindsight bias is the control phase and the environmental scanning phase (see
similar Barnes 1984, p. 130).
Typical examples of this are strategic decisions made by companies that are subse-
quently regarded as obvious. For example, only a few companies in the media and cloth-
ing industries have relied on Internet commerce. In the meantime, numerous traditional
companies from these sectors have gone bankrupt. Frequently the question is asked why
these companies were not also relying on the Internet. At the time of the strategic deci-
sion, however, it could not yet be foreseen that this would be the right decision.
One way to deal with this bias is to admit that companies are susceptible to hindsight
bias. Risk managers need to remind all employees that the future is basically unpredict-
able, even if people think that they can predict certain risk scenarios based on their past
experience. Risk managers should use objective data if available to complement opinions
by subject matter experts. It is also worthwhile to review risk scenario assumptions about
future developments using (outside) expert opinions. In summary, this means that risk
managers and decision-makers should weigh different alternatives against each other,
taking into account the fact that situations are constantly changing.
2.2.11 Overconfidence
This bias describes a decision-maker’s overestimation of his or her own abilities. This
can occur in two forms: Overestimation of one’s own abilities or performance and over-
estimation of one’s own knowledge. The overestimation of one’s own performance
35
often occurs. For example, most drivers consider themselves to be better than average.
However, it is not possible that more than half of the drivers are better than average. The
term is used more frequently for the second form of overestimation. Decision-makers are
overconfident if they consider their own judgements to be more precise than they actu-
ally are.
Overconfidence often manifests itself in the fact that, for example, intervals are given
too narrowly. People are confronted with difficult factual questions and asked for their
answers. This is done by giving the best answer together with a 90% confidence inter-
val. Because the given interval is often set too narrowly, the true value is often missed
(Shefrin 2016, pp. 62–63). This phenomenon is also called “miscalibration”.
Economist Philip Tetlock spent 20 years studying forecasts by experts about the econ-
omy, stock markets, wars and other issues. He found the average expert did as well as
random guessing or as he put it “as a dart-throwing chimpanzee”. Tetlock believes fore-
casting can be valid, but only when done with a long list of conditions, including humil-
ity, rigorous use of data and a ruthless vigilance for biases of all types. He said that he
believes it is possible to predict the future, at least in some situations and to some extent,
and that any intelligent, open-minded and hardworking person can cultivate the requisite
skills. Obviously, this is a challenge at the heart of the whole risk industry (Tetlock and
Gardner 2015, p. 6).
In order to overcome overconfidence bias some selected debiasing strategies can help.
Risk managers should declare probability training obligatory for risk owners and deci-
sion-makers. Risk managers can, for example, start the risk assessment with extreme risk
estimates (low and high) and thus avoid central tendency anchors (Montibeller and von
Winterfeldt 2015, p. 1233). To challenge risk scenario assessments, counter-arguments
can be developed that challenge the underlying values and assumptions. Risk managers,
but also every employee should further consider constructive criticism from people they
trust. This can serve as a very important step to reduce overconfidence. It is not necessar-
ily the case that criticism is always right, however, risks managers and risk owners get
some food for thought to challenge their own risk perception.
2.2.12 Perceived Risks
Psychologist Paul Slovic has dealt with the question why opinions of risk experts differ
from those of non-experts. Understanding these differences and the ability to articulate
them is a critical skill that risk managers must have (Shefrin 2016, p. 56). Slovic points
out that risk managers, when assessing risks, tend to focus more on specific variables
such as expected death rates. He points out that non-experts, on the other hand, rely more
on intuitive risk assessments (risk perceptions) that can be very different from expert
judgements.
The risk perception of non-experts is heavily influenced by two factors, dread risk
and an unknown risk. Dread risk includes dread and a number of other considerations
2.2 Cognitive Biases
36 2 Countering Biases in Risk Analysis
such as perceived lack of control, fatal consequences, catastrophic potential and une-
qual distribution of costs and benefits. In the context of dread risk, he mentions serious
events such as Chernobyl and Fukushima. Unknown risk is the lack of familiarity, e.g.
whether the activity or technology has new, unobservable, unknown and delayed harm-
ful consequences. For example, the public assesses nuclear power as much riskier than
risk experts. The difference can be attributed to both dread risk and an unknown risk.
Dread risk is very complex to deal with. In this context, perceived control is an important
issue. For example, psychometric research has found that people are willing to tolerate
voluntary risks, e.g. from skiing, 1000 times higher than risks associated with involun-
tary activities, e.g. from food preservatives. Unknown risk is relevant because people are
naturally afraid of the unknown (Shefrin 2016, p. 58).
The perceived risk can be managed by using two different risk reduction strategies.
The first strategy is to reduce uncertainty by seeking information. To achieve this, a
company-wide information system is important. In this system, objective risk informa-
tion can be collected and made available to employees. It is also possible to support risk
assessments by providing useful questions such as “how often in 10 years will a major
problem with a nuclear power value occur” or “how often will we have a supply bot-
tleneck in the next 10 years”. Wrong risk perception can only be changed with the nec-
essary experience and the acquisition of knowledge. The second strategy is to reduce
vulnerability by reducing the risk exposure (Al-Shammari and Masri 2016, p. 248). It
is also helpful that risk managers support risk owners during risk identification and risk
assessment interviews. Specifically for inexperienced people, it is important to have a
mentor (risk manager) who helps to assess risks more objectively.
2.3 Group-Specific Biases
At the collective level, the confirmation bias introduced in Sect. 2.1.3 is referred to as
group-specific distortion. It typically occurs when a group aims to reach consensus
before making decisions. Group-based decisions have fundamental advantages that are
particularly evident in the following points:
• More information available
• Enriched discussion with different opinions and perspectives
• Improved accuracy and more creativity
• Higher acceptance of the decision
The relevant question is whether teams actually make better decisions than individuals
do. The so-called group-specific biases must be viewed critically. The time allowed for
decision-making in groups can be so limited that the group may be in a hurry to make
the wrong decisions. Efforts should therefore be made to ensure that all views are heard
in risk management workshops or ERM committees and taken into account.
37
u Tip In order to integrate different views on the same risk scenario, it is neces-
sary to adopt a critical attitude. Often the best decisions come from chang-
ing the way people think about problems and looking at them from different
angles. “Six thinking hats” can help to look at problems from different per-
spectives, but one by one, to avoid confusion from too many angles that over-
load your thinking. It is also a powerful decision-checking technique in group
situations, as everyone examines the situation from every perspective simulta-
neously (Manktelow 2005, pp. 86–87).
Each “thinking hat” is a different way of thinking. These are explained below
(de Bono 1999):
• White hat: With this thinking hat, the focus is on the available data. We look
at information we have, analyse past trends, and see what we can learn. We
look for gaps in our knowledge and try to close or take them into account.
• Red hat: “Wearing” red hat, we look at problems with our intuition, gut
reaction and emotion. Also, we think about how others might react emo-
tionally. We try to understand the answers from people who do not fully
understand our reasoning.
• Black hat: We use black hat thinking and consider the potentially nega-
tive results of a decision. We look at it carefully and defensively. We try to
understand why it might not work. This is important because it shows the
weaknesses in a plan. It allows us to eliminate them, change them, or cre-
ate contingency plans to address them.
Black hat thinking helps make our plans “harder” and more resilient. It can
also help us to identify fatal errors and risks before we begin a course of
action. It is one of the true benefits of this model, as many successful peo-
ple get so used to thinking positively that they often cannot see problems
in advance. As a result, they are not well prepared for difficulties.
• Yellow hat: This hat helps us to think positively. It is the optimistic view that
helps u to see all the benefits of the decision and the value in it. The yellow
hat thinking helps us to go on when everything looks gloomy and difficult.
• Green hat: The green hat stands for creativity. This is where we develop
creative solutions to a problem. It is a freewheeling way of thinking with
little criticism of ideas (we can try out a number of creativity tools that will
help us).
• Blue hat: This hat represents process control. It is the hat worn, for exam-
ple, by people who lead meetings. If they have difficulties because ideas
dry up, they can direct the activity into green hat thinking. When emer-
gency plans are needed, they will prompt black hat to think.
One variant of this technique is to look at problems from the perspective of
different professionals (e.g., doctors, architects, or sales managers) or different
customers.
2.3 Group-Specific Biases
38 2 Countering Biases in Risk Analysis
Applied in this form, the six thinking hats concept can help to reduce or even prevent
biases in many of the group situations described below.
2.3.1 Authority Bias
This cognitive bias describes the tendency of people to weight the opinion of a person
of authority comparatively strongly. They are also more easily influenced or persuaded
by authority persons. There are numerous examples of how this cognitive bias is used
to influence consumer behaviour. These can be stock market tips from self-proclaimed
financial experts or advertisements for toothbrushes that promote a unique cleaning
result. The effect already occurs when people look like persons of authority, whether
they are actually experts in the field or just pretending to be. Conformity and compliance
are so deeply embedded in a person’s psyche that the acceptance of any kind of com-
mands coming from such a person becomes a standard habit. Unfortunately, we usually
simply stop questioning these authorities.
We often come across numerous articles claiming long-term health benefits associated
with coffee, wine or dark chocolate. However, it is claimed that these results are based
on extensive research. It may be worth to dig a little deeper and we may experience a
surprise (Kamal 2018).
• This research could always be funded by these companies.
• The research could be done at an obscure university.
• The sample size can be less than 100.
• All participants can belong to a specific ethnic group.
• Etc.
Various debiasing strategies are available to reduce this distortion. Basically, it is helpful
to build mutual trust. Employees are often more open if they are not constantly moni-
tored. If we strengthen this relationship (corporate culture), employees will be more
likely to honestly report risks and opportunities. Research has also shown that increasing
psychological distance can help reduce bias. Instead of permanently discussing impor-
tant decisions in the same office, researchers have found that telephone conversations or
changes in premises can also contribute to bias reduction (Milgram 1965).
Risk managers can use suitable examples to draw the employees’ attention to that
bias. Before the global financial crisis of 2007/2008, which was preceded by a phase
of high growth, only a few voices were critical. Hardly any financial experts dared to
comment critically on the development, even though economic up and down cycles have
always been part of economic action.
39
2.3.2 Conformity Bias
Humans are social beings. Ideas about risks that conflict with the group are not always
welcome. Even if some risks are very important, people tend to contribute to stability
and cooperation. When a decision maker encounters both affirmative and conflicting evi-
dence, the tendency is to overweight the affirmative evidence and underweight the con-
flicting evidence. Having received affirmative evidence, we are often confident that we
have enough appropriate evidence to underpin our faith. The more affirmative evidence
we gather, the more confident we become.
Kelman (1958) distinguished between three different types of conformity:
• Compliance: This occurs when one person exerts influence because he or she hopes to
achieve a positive response from another person or group. He assumes induced behav-
iour because he expects to receive specific rewards or approvals and to avoid specific
punishment or rejection by conformity (Kelman 1958, p. 53).
• Internalization: This occurs when an individual assumes influence because the content
of the induced behaviour—the ideas and actions it consists of—is inherently reward-
ing. It adopts the induced behaviour because it is congruent with its value system
(Kelman 1958, p. 53).
• Identification: This occurs when an individual assumes influence because he or she
wants to establish or maintain a satisfying, self-defining relationship with another per-
son or group (Kelman 1958, p. 53).
Example
A good example of the conformity bias is the experiment conducted by Asch (1956).
He shows how group coercion can influence a person to such an extent that they judge
an obviously false statement to be correct. Asch’s attempt was to ask for the length of
several presented lines. The test persons were given a small card with a line printed on
top and a selection of three more lines underneath. One of the three lower strokes was
obviously just as long as the upper one, one longer, one shorter. The test subjects only
had to name the line matching the upper line. Faced with this simple task alone, each
subject gave the right answer.
But then Asch brought the participants together in groups. Each group consisted
of a test person and seven helpers, who Asch had instructed without the knowledge
of the test persons. The helpers now began unanimously to give wrong answers. They
called short strokes long, long strokes short. And the unsuspecting test subjects? They
followed. The same test persons who had previously been able to correctly identify
the lines in front of their eyes, now explained that strokes that ended after a few finger
widths were longer than those that extended almost over the entire page. Not even one
in four subjects managed to resist the nonsense of the helpers.
2.3 Group-Specific Biases
40 2 Countering Biases in Risk Analysis
Asch (1956) explained the denial of reality with the fear of a dissenting opinion.
In interviews, the test subjects said that they had doubted their own perception in
the face of the helpers’ so convincingly delivered judgments. Others claimed to have
noticed the other’s error, but did not want to spoil the mood. Some test persons even
confessed that they were basically convinced that something was wrong with them.
Obviously, avoiding risk management workshops in larger groups and conducting one-
on-one interviews instead fully eliminates conformity. To counteract conformity bias in
workshops, risk managers can also collect anonymous feedback on risk scenarios first
and then discuss these inputs within the group. Additionally, the can invite new experts
into the group on a regular basis. Fresh people in risk management workshops do not
yet feel the same pressure to adapt as other members. Also, outsiders will be unlikely to
share the group’s acquired prejudices. Conflicts can nevertheless arise in such a setting.
Due to their outsider role, however, they do not endanger cooperation within the team.
No workshop member has to stand against his own team and expect consequences that
could endanger further cooperation with the risk manager (Clayton 2011, pp. 148–149).
Basically, if people contribute anonymously to a risk assessment, they are much more
comfortable and will probably say what they really think about risks. One way to support
this is to use anonymous mailboxes as well as contact persons who are not considered
direct superiors. Management must also set the right tone that this feedback is given high
priority (Clayton 2011, p. 148). Last but not least, eliciting a second risk assessment in
addition to the first consensus on a risk can further reduce conformity bias.
2.3.3 Groupthink
Groupthink is a certain way of thinking of people in a group (team, meeting, workshop,
conference, and committee). In group thinking, the group tends to avoid conflicts or tries
to minimise them and aims at reaching consensus. However, this consensus is usually not
but based on adequate critical evaluation and analysis. Individual perspectives and
individual creativity are (partially) lost, lateral thinking is often undesirable. It is not the
case that the group members feel compelled—they rather feel very bound to the group
and avoid getting into a conflict situation. The harmony of the group is felt as more
important than the development of realistic risk scenarios. This can indeed lead to people
making unfavourable decisions (Kaba et al. 2016, pp. 403–404).
There are several factors that can make groups susceptible to group thinking. First, a
group might have a leader who advises members not to disagree. At the same time, the
leader makes clear what he or she wants to do and hear. People are inherently selfish,
and most will seek opportunities in their own interests to support the leader in a way that
is consistent with their own goals. The leader might want to hear “yes”, not “yes, but”
and certainly not “no”. It also encourages group thinking when the group is made up of
members with similar backgrounds. As a result, confirmation bias and availability bias
41
combine to limit discussion of relevant risk issues and risk perspectives (Shefrin 2016,
p. 65).
Groupthink has a special significance when it comes to risk decisions. It leads to
“polarization”, i.e. the group dynamics strengthen the risk attitudes of the group mem-
bers. Group polarization may occur when assessing risk scenarios in risk workshops.
Groups tend to make extreme judgments during such workshops. This is particularly the
case if the persons involved hold similar opinions before the meeting starts (Moscovici
and Zavalloni 1969, pp. 125–135). If, for example, individual group members are not
very risk-averse in their attitude prior to a risk workshop, group thinking can result in
the whole group being too extremely risk-averse. If many individuals classify a risk as
high before a group discussion, this can lead to an even higher assessment of the risk
through the group discussion. Thus, there is the danger of under- and overestimation of
risks through group discussions (Lermer et al. 2014, pp. 3–4).
Example
One of the main causes of the Challenger Space Shuttle disaster in January 1986 is
considered the phenomenon of group thinking, particularly the illusion of unanimity.
The latter means that the group decision corresponds to the majority view. When such
cognitive distortion occurs, it is assumed that the majority of opinions and individual
judgements are unanimous. Group thinking results from the confirmation heuristic
and is explained by the following three characteristics: overestimation of the group,
narrow-mindedness, and pressure to conform. These characteristics can distort the
group’s decision in the wrong direction.
Although the manufacturer of the O-ring (part of the Space Shuttle) has identi-
fied the risk of the O-ring malfunctioning in extreme cold, the manufacturer agreed
to launch the Challenger Space Shuttle due to group thinking. Factors contributing
to this irrational behaviour include in particular direct pressure on dissidents (group
members are under social pressure not to contradict the group consensus), self-cen-
sorship (doubts and deviations from the perceived group consensus are not accepted)
and the illusion of unanimity.
During the occurrence of the Challenger Space Shuttle disaster, the group as a
whole did not consider the manufacturer’s opinion that the O-ring could not function
properly in a very cold environment and did not conduct a full analysis of this opin-
ion. This eventually led to the critical disaster (Murata 2017, p. 400).
Polarization occurs because group members try to reinforce each other’s judgements and
suggestions. For example, one group member may propose a risky strategy. Other group
members confirm why this would be a good idea. This can lead to increased risk appe-
tite because the arguments are mutually confirmed and the members feel comfortable
with even more risk. In this case, the group accepts more risk than the individual would
(Stangor 2014). Finally, a group member often only discloses information if it supports
the direction in which the group is moving about certain risk scenarios. This then leads
2.3 Group-Specific Biases
42 2 Countering Biases in Risk Analysis
to the confirmation of others in the group. Information that runs counter to this direction
is withheld. The same applies to information that makes the discloser appear in a less
favourable light (Shefrin 2016, p. 65).
To reduce the group thinking bias, risk managers should look for different person-
alities in a risk workshop and establish a climate where group members know why it is
important to question risks and opportunities. It is also important that all group members
follow certain rules to ensure a fair exchange of ideas and assessments. To achieve this,
groups should be kept small (5–8 participants). It is also advisable to let the group mem-
bers speak first, not an authority person. This also includes reducing power imbalances,
i.e. working with flat hierarchies in these teams. In this respect, it is advisable to provide
channels for anonymous feedback. In this way, individual members who recognise the
overconfidence but do not dare to express themselves critically can express their opinion
anonymously. Otherwise, there would be a danger that the group would portray them as
moaners and whingers. An also effective measure is to invite people from other depart-
ments in risk management workshops or risk committees, especially those affected by
decisions (Shefrin 2016, pp. 64–65).
Within the scope of risk identification, it should be noted that risks and then oppor-
tunities are first discussed within the group. In reverse order, there is a danger that the
opportunities overshadow the potential risks and are therefore discussed too less criti-
cally. In group situations, it can be helpful to define a person as an advocate whose task it
is to challenge assumptions critically, including individual opportunities identified by the
organisation. With regard to the negative effects mentioned, it must be taken into account
that team decisions reflect the creativity of a large number of people and are generally
highly accepted (Shefrin 2016, p. 65).
2.3.4 Hidden Profile
If risks are identified in groups, group-specific factors can distort the ERM process.
Among other things, groups rarely manage to exchange all available and relevant infor-
mation on risks. This particularly affects information known only to individuals (Lermer
et al. 2014, p. 2). This phenomenon is discussed under the term hidden profile and is
based on the investigations of Stasser and Titus (1985). The two researchers formed
groups consisting of four students and gave the individual students convergent and diver-
gent information. The students were to arrive at a correct result in groups of four with the
help of the information received. However, this was only possible if all students shared
all the information they received with the group. Though, most groups could not solve
the hidden profile. Convergent information was exchanged and discussed. However,
divergent information often remained unmentioned (pp. 1467–1478). This phenomenon
has been reproduced in various other studies.
43
Moskaliuk (2013) describes various strategies to reduce this bias. Four of them are
listed below:
• Being aware of this bias as a risk manager: This creates the basic prerequisites for
specifically avoiding the phenomenon of hidden profiles.
• Avoid hierarchies: Especially people with low status tend to withhold their exper-
tise. People with high status should thus first hold back with their own assessments in
order to give all participants opportunities to share their views with the group.
• Search and collect first, then evaluate information: This prevents information that
might be significant from being devalued directly.
• Making the expertise of those involved transparent: This makes it clear that different
opinions can be expected on the basis of their specialist knowledge. In addition, the
individual participants can be asked directly about their expert assessments.
The first point is basically applicable to all psychological factors mentioned. Just as risks
need to be known in order to be managed, ERM specialists should be aware of psycho-
logical factors in order to reduce them. It is important to note that discussion and group
leaders in particular should become aware of psychological factors. Because of their
role, they have the necessary skills and power to steer the group in a goal-oriented man-
ner. Furthermore, the strategy of avoiding hierarchies can also be transferred to the other
group-specific biases (Scherrer 2018).
The third point tends to be present in ERM if the individual process steps are con-
sistently carried out separately. If risk identification and risk assessment are carried out
together, cognitive biases, which tend to occur in both process steps, are also effective.
This prevents adequate identification and would consequently reduce the quality of the
entire process. It is thus better to first identify risks with a conscious management of
cognitive biases and only in a next step—which may even take place on another day—
to consciously assess the identified risks again. The last point suggested by Moskaliuk
(2013) can be considered as a specific measure to counter hidden profiles (Scherrer
2018).
2.3.5 Social Loafing
Lermer et al. (2014) describe that groups are less creative than individuals in identify-
ing risks. Thus, risk identification in groups is not necessarily advantageous (p. 1). A
possible explanation for diminishing creativity is the Ringelmann effect or social loaf-
ing. Ringelmann discovered that the average pulling force of a person during tug-of-war
decreases proportionally the more people are involved in the pull. However, this effect
could not only be proven in tug-of-war, but also in mental work activities (Leitl 2007).
This is a kind of motivation deficit, which occurs above all when the performance of
individuals is not apparent.
2.3 Group-Specific Biases
44 2 Countering Biases in Risk Analysis
It is important to remember that social loafing does not always happen. For example,
Karau and Williams (1997) found that social loafing did not occur for a cohesive group.
Moreover, the results of their second study suggest that people can actually make greater
efforts when working with low-performing employees (a social compensation effect).
According to Dobelli (2018), individual benefits should be made visible in order to
reduce social loafing (p. 139). This can be done using various methods. With regard to
risk identification, Lermer et al. (2014) recommend that brainstorming be dispensed with
in the group and that brainwriting be used instead. Possible risks are noted in writing by
the individual experts. In order to avoid the negative group effect as far as possible, they
recommend that the group context be avoided altogether. This means that the experts
involved in brainwriting neither meet the other experts surveyed nor present their results
to a group. They also recommend using a network of individual experts for risk identifi-
cation, whose results are collected centrally and, if necessary, played back individually to
the experts (pp. 2–3).
As you have learned, the landscape associated with ERM processes is burdened with
psychological landmines. Even risk perceptions and expert assessments are suscepti-
ble to a wide range of psychological influences. The above mentioned concepts are in
the spotlight of every risk assessment. Some biases overlap in certain aspects because
they address similar problems. Reducing some cognitive biases require the inclusion of
a group, whereas group situations can in turn be associated with numerous own biases.
Reducing susceptibility to biases is therefore a recurring task. In particular, the reduction
of biases in group work can only succeed in a suitable social environment, meaning that
the risk culture must also be addressed (Shefrin 2016, pp. 68–69).
Key Aspects to Remember
Know the different biases in risk analysis
Throughout the whole ERM process, it is important to note that many risks do
not manifest themselves by exogenous events, but rather by people’s behaviour
and choices. Basically, the following three categories of biases can be identified:
Motivational, cognitive and group-specific biases. Especially in the case of cogni-
tive biases, we are usually not aware of many thinking errors and they can only be
identified by an in-depth analysis and corresponding skills of risk managers and
decision-makers.
Understand the importance of biases for risk analysis
Biases are an important topic for risk analysis because systematic errors are made
in the risk identification and risk assessment of risks. Knowledge of biases and the
measures taken to reduce them can help companies to carry out a more objective
45
risk analysis. Most importantly, errors in risk identification due to biases can nega-
tively affect the whole ERM process.
Recognise the need to mitigate biases throughout the risk process
The mitigation of biases is an important issue. This can take place at various points
in the assessment and decision-making process. One of the most important meas-
ures is to reduce cognitive errors by making concrete examples of biases available
to risk owners and management. In addition, the involvement of several perspec-
tives or experts is often recommended. Finally, it can help to impart basic statisti-
cal knowledge to employees.
Be familiar with limitations of biases mitigation
Not all biases can be eliminated. Every day people are confronted with possible
thinking traps and they cannot always be resolved without contradiction. There are
also scenarios in which biases can be revealed through group discussion, but at the
same time new biases are created by the group itself. Thus, a cost-benefit analysis
should also be carried out with regard to the reduction of biases.
Have some easy to understand examples for your employees ready
Theoretical knowledge of biases is merely the basis for recognizing biases in com-
plex practical situations. Companies are well advised to disclose identified or com-
mitted errors of thought to a broad circle of decision-makers. This is the only way
to improve decision quality. Ultimately, it helps if the risk manager can show some
biases using concrete examples. Using past decision processes documented for
example in risk management workshops, the risk manager can plausibly demon-
strate how such biases have influenced decisions about risks.
Critical Thinking Questions
1. To what extent do motivational biases differ from cognitive biases?
2. What general measures can companies take to reduce cognitive biases?
3. Under what conditions are group decisions preferable to individual decisions?
4. How can the concept of “six thinking hats” help to identify and avoid group-
specific biases?
5. What role can a positive risk culture play in reducing cognitive biases?
2.3 Group-Specific Biases
46 2 Countering Biases in Risk Analysis
References
Al-Shammari, M., & Masri, H. (2016). Ethical and Social Perspectives on Global Business
Interaction in Emerging Markets. Hershey, Pennsylvania: IGI Global.
Asch, S. E. (1956). Studies of independence and conformity: I. A minority of one against a unani-
mous majority. Psychological Monographs, 70 (9), 1–70.
Baer, T., Heiligtag, S., & Samandari, H. (2017). The business logic in debiasing. https://www.mck-
insey.com/business-functions/risk/our-insights/the-business-logic-in-debiasing. Accessed 17
December 2018.
Barnes, J. H. (1984). Cognitive Biases and Their Impact on Strategic Planning. Strategic
Management Journal, 5 (2), 129–137.
Baron, J., Gowda, R., & Kunreuther, H. (1993). Attitudes toward managing hazardous waste:
What should be cleaned up and who should pay for it? Risk Analysis, 13, 183–192. https://doi.
org/10.1111/j.1539-6924.1993.tb01068.x.
Cassotti, M., Habib, M., Poirel, N., Aïte, A., Houdé, O., & Moutier, S. (2012). Positive emotional
context eliminates the framing effect in decision-making. Emotion, 12 (5), 926–931.
Celati, L. (2004). The Dark Side of Risk Management: How People Frame Decisions in Financial
Markets. London: Prentice Hall.
Cherry, K. (2018a). Understanding the Optimism Bias. AKA the Illusion of Invulnerability. https://
www.verywellmind.com/what-is-the-optimism-bias-2795031. Accessed 11 December 2018.
Cherry, K. (2018b). How the Status Quo Bias Affects Your Decisions. https://www.verywellmind.
com/status-quo-bias-psychological-definition-4065385. Accessed 11 December 2018.
Clayton, M. (2011). Risk Happen: Managing risk and avoiding failure in buisness projects.
London: Marshall Cavendish International.
de Bono, E. (1999). Six thinking hats. Boston: Back Bay Book.
Dobelli, R. (2018). Die Kunst des klaren Denkens. 52 Denkfehler, die Sie besser anderen überlas-
sen. München: Deutscher Taschenbuch-Verlag.
Edwards, W. (1982). Conservatism in Human Information Processing (excerpted). In D.
Kahneman, P. Slovic & A. Tversky (Eds.), Judgment under uncertainty: Heuristics and biases.
Cambridge: Cambridge University Press.
Emmons, D. L., Mazzuchi, T. A., Sarkani, S., & Larsen, C. E. (2018). Mitigating cognitive biases
in risk identification: Practitioner checklist for the aerospace sector. Defense Acquisition
Research Journal, 25 (1), 52–93.
Finucane, M. L., Alhakami, A., Slovic, P., & Johnson, S. M. (2000). The affect heuristic in judg-
ments of risks and benefits. Journal of Behavioral Decision Making, 13 (1), 1–17.
Fischhoff, B., Slovic, P., & Lichtenstein, S. (1978). Fault trees: Sensitivity of estimated fail-
ure probabilities to problem representation. Journal of Experimental Psychology: Human
Perception and Performance, 4, 330–344.
Friedman, H. H. (2017). Cognitive Biases that Interfere with Critical Thinking and Scientific
Reasoning: A Course Module. SSRN Electronic Journal. http://dx.doi.org/10.2139/
ssrn.2958800.
Gleißner, W. (2017). Grundlagen des Risikomanagements. Mit fundierten Informationen zu
besseren Entscheidungen (3rd Ed.). München: Verlag Franz Vahlen.
Grinnell, R. M., & Unrau, Y. A. (2018). Social Work Research and Evaluation. Foundations of
Evidence-Based Practice (11th Ed.). New York: Oxford University Press.
Hossain, T., & Li, K. K. (2013). Crowding Out in the Labor Market: A Prosocial Setting
Is Necessary. Management Science, 60 (5), 1148–1160. http://dx.doi.org/10.1287/
mnsc.2013.1807.
47
Hubbard, D. W. (2009). The failure of risk management. Why it’s broken and how to fix it.
Hoboken, NJ: John Wiley & Sons Inc.
Kaba, A., Wishart, I., Fraser, K., Coderre, S., & McLaughlin, K. (2016). Are we at risk of group-
think in our approach to teamwork interventions in health care? Medical Education, 50 (4),
400–408.
Kahneman, D. (2007). Short Course in Thinking About Thinking. https://www.edge.org/3rd_cul-
ture/kahneman07/kahneman07_index.html.
Kahneman, D. (2012). Schnelles Denken, langsames Denken (3rd Ed.). München: Siedler Verlag.
Kahneman, D., & Frederick, S. (2002). Representativeness revisited: Attribute substitution in intui-
tive judgement. In T. Gilovich, D. Griffin & D. Kahneman (Eds.), Heuristics and biases: The
psychology of intuitive judgment (pp. 49–81). Cambridge: Cambridge University Press.
Kamal, P. (2018). How To Spot These Cognitive Biases To Make You Smarter. And Strategies To
Make It Work For You. https://medium.com/@piyush2911/how-to-spot-these-cognitive-biases-
to-make-you-smarter-4649a82b5a6c. Accessed 22 November 2018.
Karau, S. J., & Williams, K. D. (1997). The effects of group cohesiveness on social loafing and
social compensation. Group Dynamics: Theory, Research, and Practice, 1, 156–168.
Kelman, H. C. (1958). Compliance, identification, and internalization: three processes of attitude
change. Journal of Conflict Resolution, 2, 51–60.
Kent Baker, H., & Puttonen, V. (2017). Investment Traps Exposed: Navigating Investor Mistakes
and Behavioral Biases. Bingley, UK: Emerald Publishing.
Leitl, M. (2007). Social Loafing? Harvard Business Manager. http://www.harvardbusinessmanager.
de/heft/artikel/a-622728.html. Accessed 20 November 2018.
Lermer, E., Streicher, B., & Sachs, R. (2014). Psychologische Einflüsse II: Risikoeinschätzung
in Gruppen. https://www.munichre.com/site/corpo-rate/get/documents_E399088179/mr/asset-
pool.shared/Documents/0_Corporate_Webs-ite/1_The_Group/Focus/Emerging-Risks/2013-09-
emerging-risk-discussion-paper-de.pdf. Accessed 20 November 2018.
Manktelow, J. (2005). Mind Tools. Essential skills for an excellent career (4th Ed.). Swindon, UK:
Mind Tools Ltd.
McCann, D. (2014). 10 cognitive biases that can trip up finance. CFO.com. http://ww2.cfo.com/
forecasting/2014/05/10-cognitive-biases-can-trip-finance. Accessed 20 November 2018.
Memon, A. A., Vrij, A., & Bull, R. (2003). Psychology and Law: Truthfulness, Accuracy and
Credibility (2nd Ed.). Chichester: Wiley.
Milgram, S. (1965). Some Conditions of Obedience and Disobedience to Authority. Human
Relations, 18 (1), 57–76.
Montibeller, G., & von Winterfeldt, D. (2015). Cognitive and motivational biases in decision and
risk analysis. Risk Analysis, 35 (7), 1230–1251.
Moscovici, S., & Zavalloni, M. (1969). The group as a polarizer of attitudes. Journal of
Personality and Social Psychology, 12 (2), 125–135.
Moskaliuk, J. (2013). Warum Gruppen falsch entscheiden. https://www.wissensdialoge.de/hidden_
profile. Accessed 20 November 2018.
Murata, A. (2017). Cultural Difference and Cognitive Biases as a Trigger of Critical Crashes or
Disasters – Evidence from Case Studies of Human Factors Analysis. Journal of Behavioral and
Brain Science, 7, 399–415. https://doi.org/10.4236/jbbs.2017.79029.
Redman, T. C. (2017). Root Out Bias from Your Decision-Making Process. Harvard Business
Review. https://hbr.org/2017/03/root-out-bias-from-your-decision-making-process. Accessed 11
December 2018.
Rees, M. (2015). Business Risk and Simulation Modelling in Practice: Using Excel, VBA and @
RISK. Chichester: John Wiley & Sons.
References
48 2 Countering Biases in Risk Analysis
Scherrer, M. (2018). Menschlicher Faktor im Risikomanagement. Bachelor Thesis, Lucerne
University of Applied Sciences and Arts.
Sharot, T. (2011). The optimism bias. Current Biology, 21 (23), R941–R945.
Shefrin, H. (2016). Behavioral Risk Management. Managing the Psychology That Drives
Decisions and Influences Operational Risk. New York: Palgrave Macmillan.
Sing, R., Ryvola R. (2018). Cognitive Biases in Climate Risk Management. https://reliefweb.int/
sites/reliefweb.int/files/resources/RCRCCC%2Bcognitive%2Bbiases_5%2Bshortcuts.ppd.
Accessed 18 January 2019.
Smith, E. D., & Bahill, A. T. (2009). Attribute Substitution in Systems Engineering. Systems
Engineering (January 2009), 1–19.
Stangor, C. (2014). Principles of Social Psychology – 1st International Edition. https://opentextbc.
ca/socialpsychology/. Accessed 29 January 2019.
Stasser, G., & Titus, W. (1985). Pooling of unshared information in group decision making: Biased
information sampling during discussion. Journal of Personality and Social Psychology, 48 (6),
1467–1478.
Sun, Y., & Wang, H. (2010). Gambler’s fallacy, hot hand belief, and the time of patterns. Judgment
and Decision Making, 5 (2), 124–132.
Tentori, K., Crupi, V., & Russo, S. (2013). On the determinants of the conjunction fallacy: prob-
ability versus inductive confirmation. Journal of Experimental Psychology, 142 (1), 235–255.
Tetlock, P. E., & Gardner, D. (2015). Superforecasting: The Art and Science of Prediction. New
York: Crown Publishers.
The Decision Lab (n. d.). Affect Heuristic. https://thedecisionlab.com/bias/affect-heuristic/.
Accessed 11 December 2018.
Tversky, A., & Kahneman, D. (1973). Availability: A heuristic for judging frequency and probabil-
ity. Cognitive Psychology, 5 (2), 207–232.
Wolf, R. F. (2012). How to Minimize Your Biases When Making Decisions. https://hbr.
org/2012/09/how-to-minimize-your-biases-when. Accessed 21 November 2018.
49© Springer Fachmedien Wiesbaden GmbH, part of Springer Nature 2019
S. Hunziker, Enterprise Risk Management,
https://doi.org/10.1007/978-3-658-25357-8_3
Creating Value Through ERM Process 3
Contents
3.1 Balance Rationality with Intuition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.2 Embrace Uncertainty Governance as Part of ERM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
3.3 Collect Risk Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
3.3.1 Identify Sources, Events and Impacts of All Risks . . . . . . . . . . . . . . . . . . . . . . . . 55
3.3.2 Develop an Effective and Structured Risk Identification Approach . . . . . . . . . . . 56
3.3.3 Identify Risks Enterprise-Wide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
3.3.4 Treat Business and Decision Problems not as True Risks . . . . . . . . . . . . . . . . . . . 59
3.3.5 Don’t Let Reputation Risk Fool You . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
3.3.6 Focus on Management Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
3.3.7 Conduct One-on-One Interviews with Key Stakeholders . . . . . . . . . . . . . . . . . . . 76
3.3.8 Complement with Traditional Risk Identification . . . . . . . . . . . . . . . . . . . . . . . . . 83
3.4 Assess Key Risk Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
3.4.1 Identify Key Risk Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
3.4.2 Quantify Key Risk Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
3.4.3 Support Decision-Making . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
3.4.4 Differentiate between Decisions and Outcomes . . . . . . . . . . . . . . . . . . . . . . . . . . 115
3.4.5 Overcome the Regulatory Risk Management Approach . . . . . . . . . . . . . . . . . . . . 115
3.4.6 Overcome the Separation of Risk Analysis and Decision-Making . . . . . . . . . . . . 116
3.4.7 Assess Impact on Relevant Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
3.4.8 Avoid Pseudo-Risk Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
3.4.9 Develop Useful Risk Appetite Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
3.4.10 Make Uncertainties Transparent and Comprehensible . . . . . . . . . . . . . . . . . . . . . 128
3.4.11 Exploit the Full Decision-Making Potential of ERM . . . . . . . . . . . . . . . . . . . . . . 133
3.4.12 Align ERM with Business Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
3.4.13 Replace Standard Risk Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
3.4.14 Disclose Risks Appropriately . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
3.5 Assess and Improve ERM Quality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
3.5.1 Test ERM Effectiveness Appropriately . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
3.5.2 Increase ERM Maturity Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
50 3 Creating Value Through ERM Process
Learning Objectives
When you have finished studying this chapter, you should be able to:
• differentiate between intuition and rationality
• know how the ERM process works
• explain how ERM can add value to the company
• assess risks and develop quantified key risk scenarios on your own
• understand the importance of integrating risk information into decision-making
processes
• asses the maturity level of an ERM programme
3.1 Balance Rationality with Intuition
In practice, many company decisions are based on both intuitive and rational input, often
with different weights between them. Effective ERM should be designed to reduce the
intuitive and increase the rational input into decision-making processes. It goes without
saying that fully intuitive, qualitative procedures in risk management are not capable to
improve rational decision-making. However, risk management itself is prone to many
well-known motivational and cognitive biases (Chap. 2) and relies often on informal,
intuitive assessments. Such unstructured risk assessments comprise high portions of gut
feel, professional experience and suffer from transparent, objective decision criteria. In
addition, intuitive assessments often lack the consideration of diverse opinions within
the company which could increase reliability. Intuitive approaches to risk management
and subsequently to decision-making may not be wrong or are even highly efficient and
effective under certain circumstances. In situations, where decision-makers face frequent
and insignificant or urgent decisions for which they have many years of relevant experi-
ence, intuitive decisions may be indeed the best choice (see similar Rees 2015, p. 7).
We have to pay attention concerning the use of the term “rational”. It may be mislead-
ing in the context of ERM. Amongst many other definitions, “rational ERM” focus on
“accuracy of beliefs” and the full exploitation of the best available information. Intuition
is usually understood as a decision-making process that relies on non-conscious and
rapid recognition of associations and patterns to make affective judgements (Dane and
Pratt 2007). In this respect, a person or a group who does not act rationally, has beliefs
(e.g. about the impact and probability of a specific risk) that do not fully consider all rel-
evant information at hand and do not follow a linear, step-by-step and analytical process
which can explained ex post (Simon 1987). Thus, even best-practice rational ERM is
prone to subjective and intuitive risk assessments. However, rational ERM aims at reduc-
ing subjectivity and intuition as far as possible.
51
For the purpose of this textbook, we define rational risk management as the approach
to
• consciously decrease the impact of cognitive and motivational biases on risk assess-
ments as much as possible
• collect as much as possible relevant information (Dean and Sharfman 1996)
• rely on structured, step-by-step risk analysis methods as e.g. scenario analysis
• quantitatively assess and aggregate key risks and assess the effect on key success met-
rics to identify interdependencies between risks
• combine intuitive input (management judgement) with objective, data-based input
where appropriate
• increase transparency of decision criteria (make decisions reproducible)
• apply rules which are known to analytically work (e.g. cause-effect analysis)
• accept decisions that mainly base on intuition where appropriate.
Cleary, in practice, intuition in decision-making processes overrides rational ERM many
times. Even if the results of a “rational risk analysis” unambiguously contradicts the
gut instinct of management or board, decisions are made anyway, arguing that the risk
analysis may be wrong (e.g. pseudo-accuracy of risk quantification) or at least omitted
relevant factors and uncertainties. Another reason not to use rational input is owing to
the fact that creating “rationality” is time-consuming, costly, may be considered as too
complex and is not in line with how the human brain is wired (fast and intuitive deci-
sions). In other situations, intuition and rationality can create a paradoxical tension
because these two approaches are fundamentally different and inconsistent. Thus, their
conjoint application may results in tensions. This tension may be solved in a not very
ideal way, e.g. a rational manager may disregard intuition because of its biases and focus
solely on rational and analytical procedures (Calabretta et al. 2016, p. 4). Eventually,
management judgement cannot be fully replaced by the “best” rational decision-making
tools. Complex and rare risk events for example cannot get fully captured by any for-
mal risk analysis and still need a considerable amount of intuition and judgement by the
decision-maker.
After all, rational risk analysis is designed to reduce well-known biases in risk
analysis activities and to support an adequate balance between intuitive and rational
approaches in significant decision-making processes. In that sense, formal risk analysis
in an ERM approach can support decisions by developing reasonable quantitative risk
scenarios which cover the full range of potential future outcomes and ultimately, increase
the decision quality by challenging strategically relevant management assumptions.
Increased decision quality in turn can enhance performance (e.g. increase in company
value) by selecting promising projects, investments and efficient risk mitigation meas-
ures (Rees 2015, p. 19).
3.1 Balance Rationality with Intuition
52 3 Creating Value Through ERM Process
3.2 Embrace Uncertainty Governance as Part of ERM
Too often, risk management is primarily understood as a regulatory approach which aims
at safeguarding corporate value. However, this approach does not go far enough from a
modern corporate governance perspective. Good corporate governance not only focuses
on asset protection, but also on increasing corporate value (Filatotchev et al. 2006). This
requirement is fully in line with the modern ERM approach which is ultimately geared
to increase corporate value. In traditional risk management, the focus is on securing pro-
cesses and systems; the support of value-creating decision-making processes is up to the
management. In this traditional sense, risk management is not a very creative manage-
ment tool and hardly concerned with the future development of the company. It essen-
tially deals with the efficiency of established processes and projects and the complying
with laws and regulations. In addition, traditional risk management predominantly cares
about “well-known” risks which have a sufficient data basis or the company has enough
experience to assess these risks by means of probabilities and impact, e.g. financial risks.
It immediately becomes clear that traditional risk management fails in rare, unique
and complex decision-making situations. New projects or major investments in new
products, the expansion into new markets and mergers and acquisitions, for example, are
often excluded from traditional risk management because it is not able to methodically
deal with this type of complexity and high uncertainty regarding probability of occur-
rence and impact. If successful, these complex decision-making situations all contribute
to an increase in company value. Precisely this is the claim of modern ERM—to cre-
ate value. How can this gap between traditional, value-preserving and modern, value-
enhancing ERM be closed? To put it simply, one answer is that companies have to
promote a good uncertainty governance (see Casas i Klett 2008, pp. 26–30). What does
that mean? A basic distinction can be made between the terms uncertainty and risk.
In traditional risk management, it is often implicitly assumed that risk or the underly-
ing probabilities are reasonably measurable. This means that decision-makers have an
a priori knowledge of the distribution of probabilities, e.g. based on historical data.
Uncertainty, on the other hand, is qualified as not measurable and highly subjective and
is therefore not suitable as a rational decision criterion.
Uncertainty governance is based on the theory of behavioural economics, which was
founded by the two famous authors and researchers Kahneman and Tversky. It stipulates
that subjective assessments in decision-making situations can be a misleading guide. As
a result, decisions under uncertainty may become even more uncertain due to the human
factor. This contradicts the main requirement that risk management reduces uncertainty
associated with decision-making processes. Does this mean that complex, potentially
value-adding decisions should not be made from a risk management perspective? The
following arguments would argue in favour of this:
• Lack of data to reasonably assess probabilities
• No previous experience with comparable decision-making situations
53
• Human assessments are subject to different biases
• Outcomes are highly uncertain.
Certainly not. Such decisions must be made in order to create corporate value. It is dif-
ficult to imagine companies that reject all potentially value-creating projects and invest-
ments because no reliable (i.e. missing a priori knowledge of probabilities of success)
risk assessment is possible. Such decisions, which have been carefully prepared, can
lead to high growth and added value in a positive case. They are thus definitely neces-
sary. Can this problem be reconciled with the modern ERM approach? Are decisions that
have unmeasurable and often low probabilities of success compatible with risk manage-
ment? The answer is clearly yes. ERM can methodically support the conscious handling
of uncertainty, there is no contradiction. Accordingly, modern ERM implies appropriate
uncertainty governance.
In principle, risk management can also be valuable in such complex decisions
involving a high degree of uncertainty. Uncertainty governance also means that larger
losses are accepted if the decision quality was high at the time the decision was taken.
Modern ERM can make the following important contribution to increasing the quality of
decisions:
• Firstly, it is important to recognise and transparently disclose that such decisions are
indeed highly risky and that if successful, the company can make significant progress
(to be defined differently depending on the company context). In the event of a loss,
however (e.g. product launch fails), the entire investment can become worthless.
• With the methods of modern ERM, various plausible (e.g. very pessimistic) scenar-
ios can be developed despite high uncertainty and lack of data. These scenarios show
openly and transparently that the degree of uncertainty is high and that one specific
probability of occurrence cannot be assigned meaningfully. A better way to deal with
that issue is introducing probability ranges which are capable to express the degree of
uncertainty transparently and quantitatively.
• Modern ERM seeks to increase rationality by using measures to reduce cognitive and
motivational biases (see Chap. 2).
• Modern EMR focuses on the human being. Leadership qualities and human judge-
ment are regarded as valuable sources of risk assessment and scenario developments.
Somewhat different from Casas i Klett (2008), we do not consider risk management and
uncertainty governance as two different main concepts of corporate governance in this
textbook. These concepts only remain fully different if risk management is understood
in its traditional form as a regulatory monitoring instrument to protect the value of the
company and to ensure process and system efficiency. But the boundaries dissolve when
we talk about ERM. This approach combines the best available data and information for
3.2 Embrace Uncertainty Governance as Part of ERM
54 3 Creating Value Through ERM Process
risk assessments. In some cases, these are large amounts of financial data that allow sim-
ple derivation of probability distributions. In other cases, risk management increases the
decision quality of risky, value-enhancing investments and projects by processing peo-
ple’s assessments and judgements in the best possible way (i.e. largely unbiased) into
plausible risk scenarios. Figure 3.1 summarises our understanding of risk management
and uncertainty governance.
It draws on the basic considerations of Casas i Klett (2008), but has been adapted to
the extent that uncertainty governance is not understood as an independent main concept,
but as an integral part of the modern ERM approach.
3.3 Collect Risk Scenarios
Key risk identification is the very first and critical step in the ERM process, which is a
continuous, enterprise-wide and integrated process. Risks are identified by source, for a
certain timeframe, and for each of the different risk categories. The result of that step is a
risk identification of all key risks. It is important that a risk manager is aware of the criti-
cal practical challenges before starting the process.
Traditional Risk
Management
Risk
Uncertainty Governance
Uncertainty
Data-driven,
regulatory-driven
Subjective judgment
of executives
Protecting
firm value
Increasing
firm value
C
orporate
G
overnance
Securing and
monitoring processes,
systems
People-driven,
Creativitiy-driven
Modern ERM-Approach
Fig. 3.1 Uncertainty governance as a part of ERM
55
3.3.1 Identify Sources, Events and Impacts of All Risks
In risk assessments (personal interviews, risk workshops or the request to fill in a tem-
plate), many people tend to think about the (financial) consequences of risks first: What
happens if a risk occurs? What impact does it have on my area of financial responsibil-
ity? For example, what is the potential impact on liquidity (e.g. excessive inventories),
earnings (e.g. bad debt losses) or costs (e.g. development of new services)? Of course,
every risk (independent of the source) has financial consequences and is often incorrectly
categorised as “financial risk”. Specifically, people with a strong financial mindset (e.g.
Financial Analyst, CFO) are prone to that way of thinking about risks. However, from an
ERM perspective, the identification of the risk sources is far more relevant for the devel-
opment of effective, preventive risk mitigation measures. What may be causes of a risk
to occur? Where must preventive measures be implemented to prevent financial impact
(e.g. shortening storage periods, introducing debt recovery, carrying out market analy-
ses)? Thus, risks must be developed in the form of a plausible story, i.e. in a so-called
cause-effect chain. The cause at the very beginning of that risk story is often the starting
point for defining effective risk mitigation strategies.
For example, the risk of a ratings downgrade is often found in the risk registers of
companies funded with public debt. However, a ratings downgrade may be seen as a risk
event, which is embedded in a story of different causes and impacts. In this case, poor
relations to the rating agency or a poorly executed strategy may be the sources of that
risk. Of course, debt ratings determined by rating agencies may have positive or nega-
tive impact on capital costs, and thus, have also a financial impact (effect). Another risk
story based on an everyday life situation is displayed in a simple tool for visualizing such
cause-effect stories called bow-tie analysis (see Fig. 3.2).
The risk events can be found in the middle of the bow-tie diagram. An overtired
taxi driver collides with stones on the motorway, skids and overturns. The incident is
recorded by the media, which puts the taxi company in a bad light. In addition, legal
requirements are violated, because the taxi driver did not have a sufficiently long recov-
ery time before his drive. On the left side of the fly are possible causes listed that led to
these incidents. The rockfall, the poor visibility due to rain and twilight, a broken head-
light and an overtired, sickly taxi driver are responsible for this collision. On the right
part of the display, we can see the consequences of this accident. As we can easily rec-
ognise, the risk story always ends with financial losses. Thus fines and deductibles of
insurances become due. Due to the damage to their reputation, customers switch to a
competitor, which leads to lower revenues.
The lessons learned from these two examples are clear: Although both risks ultimately
lead to negative financial impact, they are not financial risks. The causes of both risks
lie in the operational and strategic environment. These risks must be categorised accord-
ingly, otherwise sources and impacts of risks are confused and thus consistency of the
risk identification and risk categorization process is violated.
3.3 Collect Risk Scenarios
56 3 Creating Value Through ERM Process
3.3.2 Develop an Effective and Structured Risk Identification
Approach
In practice, many risk management systems lack a well-developed and well-structured
approach to risk identification. A failure of a applying a structured and well-developed
risk identification process can lead to serious problems:
• Risk identification is not linked to the achievement of business objectives and created
only for the sake of a risk inventory
• Relevant key risks with a major impact on business objectives are not identified
• Uncoordinated risk identification leads to higher costs and less credibility of the over-
all ERM programme
• Risk identification is too operationally focused and too less strategically oriented, i.e.
risks are considered only after plans and strategies have been approved by manage-
ment and major decisions have been made.
• Relevant stakeholders of ERM are not involved, leading to lower acceptance of over-
all ERM
• Best available sources for risk information are not considered
• Risk identification is too narrowly focused on internal risks (no environmental
scanning)
Causes Events Impact
Rocks on street
Broken
headlight
Sick driver
Low visibility
Car passenger
injury
Taxi damage €
Reputation
impact
Reduced
revenues €
Fines €
Compensation €
Driver
fatigue
Tipping
Media
coverage
Regulatory
breach
Collision
Obstacle
overlooked
Fig. 3.2 Bow-tie analysis: separation of causes, events and effects. (adapted from Protecht 2013)
57
ERM is a strategic management tool that has to deal with strategy-relevant risks and
opportunities. A systematic and an “as complete as possible” risk identification can be
achieved by considering and combining various tools and taking into account external
and internal perspectives. A clever filter function within the risk identification process
prevents minor, non-relevant risks from being included in the subsequent risk assessment
process. All the following information and explanation within the risk identification par-
agraph serve to make risk identification more effective and efficient and thus to create a
basis for credible ERM that is accepted by the company and creates value.
3.3.3 Identify Risks Enterprise-Wide
Many companies have already implemented a kind of enterprise risk management and
declare it accordingly as “ERM” in their annual reports. If you take a closer look, how-
ever, risks are not always identified, assessed and managed enterprise-wide. In some
cases, business areas are completely excluded from risk analysis, sometimes the focus
is only on financial or operational risks, and sometimes only risks that have their sources
internal to the company are identified. There are basically five reasons why companies
fail to implement ERM enterprise-wide. These reasons are depicted in Fig. 3.3 and are
subsequently described below (see similar Segal 2011, pp. 25–27).
3.3 Collect Risk Scenarios
R & D
Board
Profitable
Business Unit
Divison Product
X
Divison Product
Y
Divison Product
Z
CEO
Marketing
Finance
R & D
Marketing
Finance
R & D
Marketing
Finance
Missing
Strategic
Focus
Excluded
Business Unit
Financial Risk Focus
Missing
External
Focus
Fig. 3.3 Reasons not to implement ERM enterprise-wide
58 3 Creating Value Through ERM Process
1. Profitable Business Unit: Companies can be deliberately reluctant with an in-depth
risk analysis in areas of business that are very profitable, fast-growing and may be
capable to offset less profitable business units. Often risk management is still per-
ceived as a “business barrier” because only the downside risk is addressed. This may
give cause for concern that a thorough risk analysis could slow the growth and profits
of the successful business unit. Thus, it may be the case that management implements
ERM first in areas that are less critical to the company’s financial performance.
2. Excluded Business Unit: Very often, risk management implementation is started with
a pilot project (e.g. with a first business unit), followed with an enterprise-wide, step-
by-step roll-out plan. However, this can lead to the roll-out being repeatedly delayed
due to other priorities. The result is incomplete ERM implementation. In many com-
panies, risk management does not enjoy top priority on the management agenda.
Often, scarce resources or promising other, directly profitable projects are more
important and urgent than ERM.
3. Missing strategic focus: The focus of risk management often lies on the operational
area of the company. Paradoxically, the management of operational risks is equipped
with relatively high resources (e.g. process risk management, internal control sys-
tems), while a full integration of strategic risks into the ERM is often missing or is
methodically implemented at a significantly lower level (e.g. only qualitative, infor-
mal risk assessments). Numerous studies clearly show that strategic risks should be
the most important risk category for the non-financial industry (Segal 2011, p. 29).
For example, significant company value losses are primarily attributable to the occur-
rence of strategic risks, not to operational or financial risks. There are three important
reasons why companies often fail to treat strategic risks holistically and as a priority.
Firstly, companies often lack methodological knowledge of how strategic risks can
be quantitatively assessed, which means that the analysis often remains at an unstruc-
tured, qualitative level. Secondly, it is argued that strategic risks are too complex to
be assessed and that no data is available. Thirdly, often risk managers have no access
to the strategy document or are not invited to the strategy table at all. This may be
related to the too low hierarchical position of the risk manager. He or she is often not
a member of management and thus not directly involved in strategic issues.
4. Missing external focus: Experience shows that ERM often has a strong internal focus.
This means that risks are identified by internal subject matter experts and internal
risk owners. This leads to a risk identification that primarily captures risks internally
(risk source is within the company). Many risk owners identify risks for their spe-
cific, internal area of responsibility, which are then aggregated and reported to man-
agement and board. A structured analysis of the environment for the purpose of risk
identification using simple tools such as PEST analysis is missing. Many significant
risks sources actually emerge outside the company. Of course, ERM is not designed
to accurately predict the future concerning political, economic, social and techno-
logical developments and the corresponding risks and opportunities. Nobody owns a
working crystal ball. However, an analysis of the environment can help to identify
59
some potential risks and opportunities as early as possible that could arise from the
environment. Risk related information from the WEF’s global risk report, the analysis
of surveys and studies on emerging risks, reading professional journals, attending risk
management related research conferences, exchanging information in risk manage-
ment associations, analysing risk disclosures in annual reports or in SEC filings (Form
10-K), for example, can all help in this.
5. Financial risk focus: Historically, risk management has evolved from insurance and
financial risk management. Many sophisticated quantitative methods for risk assess-
ment have been known for more than half a century. To this day, many education and
training programmes are specialised in financial risk management. Many courses
in the area of financial management also focus on risk management, but primarily
from a narrow financial perspective. Thus, today we face the problem that many pro-
spective risk managers bring a strongly finance-oriented mindset into the company.
Unfortunately, methods and techniques of risk identification and risk assessment used
in financial risk management can not easily be transferred to other risk categories
(especially strategic risks). As a result, many risk management systems focus on the
financial risk category due to the missing knowledge and the educational background
of risk managers.
3.3.4 Treat Business and Decision Problems not as True Risks
It is clear that in many risk management workshops or in one-on-one interviews with the
risk manager, not only true risks (see definition in Sect. 1.3) are identified. Many of the
risks articulated in risk identification endeavours tend to concern existing weaknesses or
concerns about unfavourable conditions in the company (Rees 2015, p. 34). At the opera-
tional level, for example, an inadequate and inefficient business process can be mentioned.
Since a business line manager perceives a deviation from his or her expected efficiency
level, this gap is often classified as a “business risk”. Of course, a vast amount of measures
can now be discussed to close this gap and make the process more efficient, e.g.:
• Process re-design
• Assign accountability of the process to one single person
• Increase IT support of the process
• Focus on few and most important key controls
• Reduce non value-creating process activities (getting rid of activities that waste time
and resources)
• Outsource that specific process to increase overall efficiency.
Important for risk managers to know is that the current low efficiency level of a process
per se is not a risk, but a business problem. The true risk which is in accordance to our
risk definition in this example lies in the fact that the planned actions to improve the
3.3 Collect Risk Scenarios
60 3 Creating Value Through ERM Process
process efficiency do not have the desired effect (remember—deviation from what was
expected or planned is risk).
At the more strategic level, for example, the low growth rate of a new business area
can pop up in a risk workshop. Again, many potential actions can be taken to improve
the growth rate to an expected or ideal level:
• Closely monitor the competitors
• Create a new marketing campaign
• Invest in talented people
• Increase social media activities
• Tone at the top: Communicate the importance of sales to all employees
• Develop new products or services
The true risk here is not the weak growth rate per se, but again rather that the planned
activities do not successfully resolve the issue at hand to a required or expected growth
rate level. Of course these business problems may be of great importance for the com-
pany, but from a risk management perspective they should not be directly included in the
further ERM process. The problems per se are already existing weaknesses and do no
longer represent risks which may materialise in the future. If, however, corresponding
measures are taken to resolve or improve these business problems, new (real) risks may
arise in the future. These risks include the aforementioned uncertainty as to whether the
planned measures will actually have the expected impact or not.
Another stumbling block of the risk identification process is to distinguish between
decision problems and “true risks”. Again, in risk workshops, participants may identify
risks in the form of pure decision issues. Let us consider the situation where a manager
is concerned about an upcoming decision with regard to the implementation of a new
Enterprise Resource Planning (ERP)-system. She believes that it might be a risk that this
IT-project may be rejected due to too low priority. From her perspective, the new ERP-
system would significantly improve the efficiency of many business processes and ulti-
mately, be a competitive advantage. From a risk management perspective, this is not a
traditional risk. The reason is because that decision is fully controllable by the company
itself, i.e. no unexpected or uncontrollable variability is associated with that decision.
An easy test here to asses if it is rather a decision problem than a true risk is to answer
the following question: Does it make sense to assign a probability of occurrence to an
alleged risk? If the answer is “no” because the result is fully controllable by the com-
pany’s decision, then it is certainly not a true risk. True risks have usually a variability
attached to them even if nothing is decided at all. Decision problems only vary in the
sense of the difference between the pre- and after decision state, but they may be as cru-
cial for the success of a company and its risk profile as traditional risks too (Rees 2015,
pp. 34, 40).
What can we conclude based on that distinction of risks and decision problems? Of
course, upcoming business decisions are not meant to be ignored, in fact they must be
61
identified and classified as such for further assessment of the most effective actions to
take, this could be either to implement risk measures or to make a business decision.
The lesson learned here is to consider not only the volatility of risks and their probabili-
ties in decision-making about mitigation strategies, rather to include potential changes
of the baseline (plan) values through different business decision options (Rees 2015,
pp. 40–41).
3.3.5 Don’t Let Reputation Risk Fool You
An excellent reputation is crucial for most, if not all, companies. It enhances credibility,
loyalty, attractiveness and preference (Bunnenberg 2016). These attributes may have a
positive impact on costs and revenues. For this reason, a company’s reputation is a valu-
able asset to actively manage. However, while there is a broad consensus on the impor-
tance of reputation, not a single comprehensive definition has yet been found. According
to Fleischer (2015), this is because the question of how reputation is created has not yet
been fully answered. As long as there is uncertainty about what actually causes good rep-
utation, it cannot be conclusively defined (pp. 54–55). On the other hand, the lack of a
broadly accepted definition is owed to the fact that the term has been the subject of schol-
arly and academic discourse for decades. It has literally been broken down into its indi-
vidual parts since it has found its way into numerous economic disciplines on the basis
of American authors. So far, it has not been possible to combine these individual parts
into a definition that is acceptable for all economic disciplines (Kirstein 2009, p. 25).
With this knowledge in mind, we agree for the purpose of this textbook on a more recent,
evaluation-oriented definition. The following definition is different from many others in
the sense that it focuses on a more evaluative definition rather than on a perception-based
one. It serves as a good basis for establishing a relationship to reputational risk.
u Corporate reputation may be understood as the observers’ collective judgements of a
company based on the assessments of the financial, social, and environmental impacts
attributed to the company over time (Barnett et al. 2006, pp. 34–36).
Since products and services of many companies hardly differ from each other, 70 to
80% of company value today is created by intangible assets (Eccles et al. 2007). This of
course includes also the value of good reputation. Reputation has gained in importance
and represents a central success driver of most companies. Particularly in today’s world,
companies are primarily regarded as “social organisations”. Companies have long since
been understood not only as economic and technical systems, but must also create social
acceptance and prestige. Today, economic success is a well-balanced mix of products
and social acceptance (Buss 2007, p. 233).
The whole process of creating good reputation is reinforced by globalisation and the
associated internationalisation of markets and by industries at the end of their life cycles.
3.3 Collect Risk Scenarios
62 3 Creating Value Through ERM Process
These developments pose major challenges for companies. Specifically in difficult times
and during economic crises, media interest in stumbling companies is even greater. In
addition, the internet and social media can quickly turn a previously local event into a
national or even international affair. As the boundaries between the inside and outside
world dissolve and the pressure for transparency increases, reputation is becoming
increasingly important. Thus, companies with a high reputation are more resilient to
survive crises, as stakeholders perceive the company as less interchangeable (Hillmann
2011, p. 5).
So far we have learned that corporate reputation creates value that needs to be pro-
tected or even expanded. Of course, everything that is valuable is also subject to the risk
that this value could be negatively impacted. At this point, we must link corporate repu-
tation to reputational risk. Similar to the vast amount of different definition of reputa-
tions, no market standard has yet been established for a uniform definition of reputation
risk (Deloitte 2015, p. 5). For our purposes, we define reputation risk as follows:
u Reputation risk is the risk of unexpected loss due to a change in the observers’ col-
lective judgements of a company based on the assessments of the financial, social, and
environmental impacts attributed to the company over time (based on the definition of
corporate reputation by Barnett et al. 2006, pp. 34–36).
Reputation risk is a very company-specific risk and varies depending on the product or
service the company offers. Some companies are more susceptible and have to expect
faster and larges losses of trust than others. For this reason, every company should assess
reputation risks differently. Let us briefly consider what the current literature learns us
about what reputation risk is. We are faced not only with disagreement on the defini-
tion, but also with disagreement on the characteristics of reputation risk. As Roth (2015)
points out, a reputation risk is a so called secondary risk with other, preceding risks
occurring first. She identified three triggers which can cause reputation risk:
• Non-compliance: Reputation risk can be triggered from non-participation in regula-
tory trends, for example if unlawful conduct becomes publicly known. Such primary
risks can be a breach of tax law, a financial accounting scandal or disregard for envi-
ronmental regulations (Sieler 2007, p. 6).
• Unethical practices: Violations of ethical and moral rules also increasingly triggers
reputation risk (Bunnenberg 2016). Such risks include fraud, corruption and inhuman
working conditions.
• Event risks: Finally, unforeseeable events can also impact a company’s reputation. For
example, preceding risks can be a hostile takeover bid, restructuring or occupational
accidents (Sieler 2007, p. 6).
This understanding of reputation is predominantly found in companies which have
already an ERM in place. In these companies, reputation risk is treated as an additional
63
dimension of impact. Other approaches to manage reputation risk is to consider it as
a separate risk category. As such, reputation risk does not have to be related to other
risk categories or it can even trigger subsequent risks (Chapelle 2015, p. 38; Romeike
and Weissensteiner 2015, p. 20). For example, the subsequent risk of not having access
to debt capital or problems in personnel recruitment can occur due to a bad reputation
(Weissensteiner 2014, p. 35). Consensus in literature can be found about the fact that
reputation risk management is indispensable due to the enormous importance of good
reputation as an asset and competitive advantage. Reputation risk must be integrated into
the general ERM process.
After having touched on the terms of reputation and reputation risk, we now turn to
the main problem of dealing with reputation risk in practice. In most risk inventories,
reputation risk is listed as one of the key risks. The problem with this is that reputation
per se is not correctly defined as risk. If we consider the discussion above on the distinc-
tion between causes, events and impact, it quickly becomes clear that reputation risks are
never properly defined by its sources. Let us have a look at Fig. 3.4.
Reputation risk is an event that can be placed in the middle of a risk scenario develop-
ment using bow-tie technique. First of all, potential sources have to be identified that can
lead to a subsequent reputation risk. These sources can often be identified in the opera-
tional risk category. Internal embezzlement, poor product quality or the exploitation of
employees can be causes that subsequently lead to e.g. criminal prosecution and/or high,
3.3 Collect Risk Scenarios
Causes Events Impact
Non-compliance
Hostile takeover
bid
Poor product
quality
Unethical
practices Cost of capital €
Reduced
revenues €
Lower
company value
€
Fines €
Reputation
risk
Media
coverage
Strategic
risk
Prosecution
Fig. 3.4 Reputation risk
64 3 Creating Value Through ERM Process
negative media attention. These risks themselves may cause a negative impact on reputa-
tion, which—in the worst case—can evolve into a strategic risk for the company. The
consequences of a reputation risk must also be analysed in detail. Reputation losses can
lead to higher capital costs, lower revenues and ultimately lower company value. The
final impacts of reputation risk are always financial consequences. Thus, it is of no use
to consider reputation as an independent risk per se, but it must be embedded in one or
more risk scenarios that identify causes and impacts of reputation risk. Reputation risks
found in company’s risk registers are wrongly stated risks because they cannot be man-
aged as such if the sources have not been identified. Accordingly, reputation risk does
not lead to concrete actions, as it is not correctly defined in the form of a cause-and-
effect analysis that enables a management of that risk.
3.3.6 Focus on Management Assumptions
This textbook on ERM does not focus primarily on strategy development and strategy
implementation. For these topics, many very good standard textbooks are available (e.g.
Barney and Hesterly 2006; Collis and Montgomery 2004). However, we can not com-
pletely do without discussing explicit references to strategic management. A central con-
cern of modern ERM is the integration of risk analysis into strategic activities. In this
respect, risk management cannot be separated from strategic management. However,
the following explanations on strategic management are now clearly geared to the risk
management perspective. It is demonstrated at which interfaces and with which methods
a risk manager can create added value to the classical strategic management processes
which are mainly based on uncertain management assumptions.
One step of utmost importance to implement a successful ERM programme is to
understand the basic strategic risk assessment process and the role of the risk manager
within it. Strategic risk assessment should be clearly owned and embedded by the man-
agement as their indispensable part of the overall strategic risk management responsibil-
ity. Strategic risk assessment is a systematic and ongoing process for assessing relevant
risks that could endanger the longevity of a company. Performing an initial strategic risk
assessment is a useful activity for management and the board. It is a responsibility that
cannot be delegated to lower hierarchical levels. Both the board and management need to
understand the company’s strategy and the associated strategic risks. The following sec-
tions discuss the distinct steps of risk identification and its practical challenges.
3.3.6.1 Start with Understanding the Business Strategy and Strategic
Risk
The development and promotion of strategic risk management processes and compe-
tencies within the organisation can create a strong foundation for the improvement
of risk management and general corporate governance (Frigo and Anderson 2009).
Strategic risk management can also add value to the company in constantly analysing the
65
company’s strategy, the corresponding assumptions and proactively developing appro-
priate measures for countering the most relevant risks that could endanger the achieve-
ment of strategic objectives. As a result, the management, the board and the risk manager
must challenge all strategically relevant assumptions (by the means of both intuitive and
rational techniques) to increase the effectiveness of strategic risk management. However,
from an ERM perspective, every risk manager needs a good understanding of the compa-
ny’s strategy and business model. Thus, the initial step in the risk identification process is
to gain a deep understanding of key business strategies, its components and all underly-
ing assumptions. Not all companies have well-developed and well-documented strategic
plans and objectives, many companies undertake a more informal way regarding their
documentation and articulation of strategic goals. However, surprisingly few companies
are capable to clearly state their strategy and competitive advantage in a few sentences.
Collis and Rukstad (2008) point out that “most executives cannot articulate the objective,
scope, and advantage of their business in a simple statement. If they can’t, neither can
anyone else” (p. 1). Thus, very often, the basic precondition to conduct a strategic risk
assessment is (partially) missing. Every company needs to develop an overview of key
strategies and business objectives in order to identify specific strategic risks associated
with them. This crucial step will also serve as the foundation to align risk management
with strategic management. A useful approach which facilitates and provides structure to
strategy formulation is suggested by Collis and Rukstad (2008).
Strategic risks are often not quantitatively assessed due to their high complexity and a
lack of knowledge and data. Of course, companies usually do not have much experience
with the same type of strategic risks over time. Strategic risks usually emerge abruptly
and hit many companies only once in their life cycles. In addition, it is challenging for
companies to identify, interpret, assess and prepare for such risks. These often low prob-
ability and high impact risk can escalate quickly, leaving companies confused, paralysed
and often prone to error (Deloitte 2017). Strategic risks are proven to be those risks that
are most critical to the company’s ability to successfully execute its strategy and achieve
its various strategic objectives (Frigo and Anderson 2011). Strategic risks can manifest
themselves in various forms, such as pursuing an inappropriate strategy by misjudging
the demand for a specific new product. Even with the “correct” strategy, a risk is not
being capable to implement a strategy successfully. Other strategic risks may be missing
out on important market trends, fast changing customer trends and disruptive innovation
risk. For the latter strategic risk, an example is described below.
Example
With disruptive innovation, a service or a product displaces established suppliers on
the market. As a rule, the offer first penetrates the lower market segment with simple
applications and then rapidly gains market share.
Companies tend to innovate faster than customer needs evolve (e.g. from CD to
DVD to Blueray). As a result, services and products come onto the market that are
too expensive and demanding for many people. But they serve the higher levels of
3.3 Collect Risk Scenarios
66 3 Creating Value Through ERM Process
their markets and the customers who always want the best alternative. As the margins
in these sub-markets are high, the companies achieve a correspondingly high level of
profitability.
However, this mechanism for success opens the door to “disruptive innovations” in
the lower market segments (e.g. streaming services). Disruptive in this context means
addressing new consumers who could not previously afford a service or product.
Disruptive companies often start with low margins, small target markets and simpler
products compared to existing solutions (see the price of a song on Spotify). Such
“disruptive companies” may pose a strategic risk for an established company.
Due to the low margins, they are unattractive for established companies that focus
on the upper market segment. This creates space at the lower end for disruptive com-
petitors. Some examples of disruptive innovation, which can lead to disruptive inno-
vation risk for established companies, include (see Clayton Christensen (n. d.):
Disruptor Disruptee
Smartphones Cellular phones
Discount retailers Full-service department stores
Retail medical clinics Traditional doctor’s offices
Streaming service Compact disc
3D printing Lathes and milling machines
Cloud computing On-premises
Mini mills Integrated steel mills
An interesting approach to classify sources of strategic risks can be found in one of the
very rare papers on strategic risks. Slywotzky and Drzik (2005) developed seven major
strategic risk areas. In each of these risk areas, different types of strategic risks can arise:
• Industry risk (margin squeeze, rising R&D or capital expenditure costs, overcapacity,
commoditization, deregulation, increased power among suppliers, extreme business-
cycle volatility),
• Technology risk (shift in technology, patent expiration, processes that become
obsolete),
• Brand risk (erosion, collapse),
• Competitor risk (emerging global rivals, gradual market-share gainer, one-of-a-kind
competitor),
• Customer risk (customer priority shift, increasing customer power, overreliance on a
few customers)
• Project risk (R&D, IT, business development or M&A failure)
• Stagnation risk (flat or declining volume and weak pipeline).
67
Of course, the paper published by Slywotzky and Drzik (2005) does not improve strate-
gic risk management in companies per se, rather it can be used to challenge the own stra-
tegic environment and supports strategic risk identification by helping to trigger the right
thoughts, e.g. in risk workshops. Having gained a good grasp of the company’s strategy,
its businesses and the term “strategic risk”, the risk manager can now advance to the next
step on his or her journey to identify all key risks.
3.3.6.2 Collect All Management Assumptions
In practice, many companies face the challenge of not knowing how they can effec-
tively and efficiently identify their most relevant risks. Surprisingly few textbooks on
ERM actually present techniques and methods to focused, strategy-relevant risk iden-
tification. Checking and questioning all assumptions made at management and board
level is the first and most important step of a focused risk identification process (see
similar Sidorenko and Demidenko 2017, p. 86). A risk manager have to elicit and col-
lect assumptions made by management and board on key strategic risks inherent with
the company’s strategy and objectives. This step provides also the opportunity to chal-
lenge key individuals’ assumptions regarding potential emerging strategic risks. Critical
assumptions about developments in the technological, political, social and economic
environment (e.g. currencies, market growth, customer behaviour, regulatory framework)
can quickly become obsolete. In checking these assumptions, a risk manager can make a
valuable contribution through a targeted risk analysis in which he or she can introduce an
additional, usually more rational perspective to these assumptions. Most of these man-
agement assumptions about the company’s future success are clearly of strategic nature.
These assumptions relate to the strategy development and strategy implementation pro-
cess. It is thus of crucial importance that appropriate attention is paid to strategic risk
management.
The analysis of strategic management assumptions should begin with a breaking
down of strategic objectives into operational objectives and key performance indicators
(KPIs). Specifically, in larger companies, strategic objectives are already present in the
form of measurable targets and thus serve as a good basis for the risk manager to under-
take a risk analysis. Of course, it is of crucial importance that a risk manager has access
to the strategy documents (which is not always the case), the financial plan, the business
plan and the budget to assess all key assumptions of the management (Sidorenko and
Demidenko 2017, pp. 8–9). What remains is the question of how companies can translate
strategic goals into measurable, action-oriented criteria. Basically, there are many strate-
gic instruments that cover the interface between strategic and operational focus.
One of the well-known tools is the Balanced Scorecard (BSC). It comprises a num-
ber of structural similarities and interfaces with ERM: The structure of the BSC as a
planning, management control and information tool provides an appropriate basis for
challenging management assumption on a more tactical level. Both ERM and BSC are
designed to achieving strategic goals. Both management tools consider the strategy from
3.3 Collect Risk Scenarios
68 3 Creating Value Through ERM Process
an enterprise-wide perspective and focus on almost all (risk) areas and their critical value
drivers. One of the main advantages of the BSC lies in the fact that the recommended
maximum amount of key measures (“twenty is plenty“) with specific target values are
directly derived from strategic objectives. These measures, defined for example as “our
revenues are expected to grow faster than that of the strongest competitor in order to fos-
ter our market position”, are subject to many uncertainties which require a thorough risk
analysis from an ERM perspective (Hunziker et al. 2018, p. 55). Let’s make a concrete
example of how a measurable target based on the BSC can serve as a basis to identify
assumptions and ultimately identify risks.
Figure 3.5 shows the financial perspective of a balanced scorecard from a ski and hik-
ing company. Within this perspective, several tactical performance indicators have been
defined. One of these relates to the sales target. The company aims to achieve a 10%
increase in sales compared to the previous year. The minimum acceptable limit is 6%.
The sales target must now be subjected to an assumption analysis. This means that the
risk manager has to identify all uncertain assumptions for the three product groups Ski,
Skiwear and Hiking that could have an impact (positive or negative) on the achievement
of this target. Examples of such uncertain assumptions are the expected impact of a mar-
keting campaign, expected inflation rate, expected competitor behaviour and expected
Skiwear Skis Hiking gear
Finance
Strategic Target Key Figure Unit Bottom
Tolerance
Target
Figure
Increase return on investment Return on Investment % 20.00 30.00
Increase revenue Increase of revenue
compared to previous year
% 12.00 20.00
Increase contribution margin Average contribution margin
per customer
$ 140.00 180.00
Improve cash flow Average cash flow $ 40’000.00 50’000.00
Identification of management assumptions
– Customer acquisition (marketing campaign) + 10 %
– Stable exchange rates
– No new competitor
– No inflation
– Good to very good snow conditions
– Customer acquisition + 5 %
– Stable exchange rates
– No new competitor
– No inflation
– Good to very weather conditions
Management assump�on = uncertain�es = risks = require risk analysis
Fig. 3.5 Break down of strategic objectives
69
weather conditions. From an ERM perspective, all these assumptions are risks with vari-
ability attached that need to be collected and analysed as part of the risk identification
process step.
3.3.6.3 Use Strategic Tools to Complement Assumption Analysis
Having analysed all management assumptions of strategic goals, the risk manager needs
to complement the strategic risk identification for the sake of completeness. For this pur-
pose, it is strongly recommended to use well-known strategic tools to analyse the busi-
ness environment more thoroughly. In the following, a number of important and useful
strategic management tools which support strategic risk identification will be briefly
introduced. Although we know that it is very difficult, if not impossible, to predict the
future and to foresee relevant trends, critical risk scenarios can be developed with a care-
ful analysis of the environment. It may thus be worthwhile for companies, despite the
high degree of uncertainty, to think about future trends and weak signals which may
slowly emerge in the environment, in order to develop (even very negative) risk scenarios
based on this environmental scanning and prepare for them. However, such predictions
based on environmental analyses partly fail in practice because often, abrupt and drastic
changes (e.g. US financial crisis in 2007) are not included in the risk managers’ scenarios
(see also Taleb 2007).
The risk manager can significantly contribute to the successful development of the
company in this process step, too. Companies need to scan the environment to be capable
to understand external changes and trends in order to develop effective risk mitigation
measures to secure the company’s longevity or to increase company value (Choo 1999,
p. 21). The previously performed assumption analysis of the strategic objectives can now
be supplemented by a general environment analysis (often, this is called “environmental
scanning”). New risks that have not yet been discussed can thus be identified or risks that
have already been identified can be enriched with further information from this process
step. According to Choo (1999), four different approaches of such environmental scan-
ning to identify new trends and developments can be applied (p. 22):
1. Undirected viewing (sensing). The aim of this first approach is to search the environ-
ment as broadly as possible for any unknown developments and trends. There are no
clear guidelines for this kind of environmental analysis. It is not a question of tracking
down and confirming ex-ante presumed developments or trends. Rather, companies
try to gain a sense for possible weak signals or emerging developments. Undirected
viewing is a process of detecting and viewing of already existing information in a
completely unstructured way.
2. Conditioned viewing (sense-making). Compared to undirected viewing, a company
may view at information about pre-selected topics, concerns or developments. Still,
this is a much unstructured procedure, but with a more pre-defined scope to look at
information within. The goal is to assess the potential impact of the pre-selected top-
ics on the company in a cost-effective manner. If the potential risks attached to the
3.3 Collect Risk Scenarios
70 3 Creating Value Through ERM Process
presumed developments may be of high importance, the approach can be changed
from conditioned viewing to actively searching for further information, the next two
steps.
3. Informal search (learning): A company searches actively for further information to get
a better grasp of the issue or trend at hand. For example, a potential very negative
risk scenario needs a deeper understanding to be able to assess it more accurately and
to formulate any subsequent queries. Informal at this stage means in an unstructured
manner and with limited resources. Clearly, the goal of this step is to collect sufficient
information to learn if a specific risk scenario under scrutiny may need any specific
course of action by the company or not. If a risk manager perceives that a company
needs to decide about the implementation of any preventive risk measures to counter
that risk, a more formal search (approach 4) may be required.
4. Formal search (deciding). This last approach aims at finding information in a struc-
tured and planned manner. The goal of this fourth approach is to get as much informa-
tion as needed to decide on a specific course of action, e.g. to decide to preventively
mitigate a specific risk. Formal searches are fine in granularity, more time-consuming
and targeted to use its information for acting and deciding.
The challenge for companies is to find a balance between more limited, well-structured
and less limited, unstructured approaches. If the focus is too strong on undirected view-
ing, it can ultimately become very expensive without finding decision-relevant infor-
mation. Moreover, with this method the amount of data quickly becomes large and
confusing. If the focus is too strong on structured, narrowly limited analyses, there is a
danger that relevant trends and risks will not be identified at all (Andersen and Winther
Schrøder 2010, p. 148). In essence, there is no best practice as to how such an analysis
of the environment should be carried out. The consideration and combination of various
established tools from strategic management can be a promising approach. A distinction
must be made between general environmental risks, industrial risks and company-
specific risks. For all of these three layers, corresponding tools are available. As there are
very valuable basic strategic management textbooks available, only a few very helpful
tools are briefly introduced in this textbook.
Structured Analysis of Competitive Climate
Porter’s five forces model (1980) is a well-known and typical framework in order to con-
duct industry analysis stemming from different forces as changing customer preferences,
new product developments, industry regulations and process innovations and many more.
Furthermore, the tool is adequate to assess own strategies and moves of existing and
potential competitors with the respective consequences. The following example shows
the results of a practical application of the five forces model.
71
Industry threats and opportunities in ski manufacturing
An analysis of the profit dynamics in the industry can benefit from Porter’s five forces
model. The model makes assessments about the industry’s attractiveness based on the
effect of five key forces, namely: (1) the threat of new entrants; (2) the bargaining
power of buyers; (3) the bargaining power of suppliers; (4) the threat of substitute
products or services; and (5) the intensity of competition in the industry. Each of these
points is examined below.
1. The risk of new competitors is rather low. The production of skis is utility-inten-
sive, which requires a considerable initial investment. In addition, established com-
petitors have a know-how advantage and a close connection to professional sport.
There are smaller ski manufacturers that are pushing their way into the market.
However, these only produce small quantities and satisfy a selected segment of
usually premium customers. Finally, existing patents for innovative suppliers pro-
tect their products from being copied, e.g. a specific ski boot plate.
2. The consumer has comparatively high bargaining power. This is illustrated by the
high discounts granted on newer models in the second part of the ski season. Since
accessories such as ski bindings and ski pieces can be combined almost at will,
the consumer is not tied to a single brand (see, for example, the coffee capsule
market). It should not be neglected that skis are usually durable and the purchase
decision can be postponed by one or more years. After all, it is easy to change
suppliers.
3. Suppliers have only limited bargaining power. Many of the input materials are
standard products and are offered by a large number of companies. Since ski
manufacturers usually purchase large quantities, suppliers are often prepared to
make certain concessions. Because these are standard products with little poten-
tial for differentiation, a market price will be established that includes only a small
margin.
4. Ski touring, snowboarding or sledging can be regarded as direct substitutes for ski-
ing. In the wider environment, there are numerous ski sports such as cross-country
skiing, snowshoeing or ice skating as possible alternatives. The risk of substitution
is relatively high. However, consumers often commit themselves to one or more
winter sports at a young age and remain loyal to them in the long term.
5. The market is dominated by large suppliers such as Rossignol, Atomic, Salomon,
Völkl and Head. The intensity of competition in the ski industry is relatively
high, as the products are similar in many respects. The intensity of the market is
reflected in the fact that every year numerous new and revised models are placed
on the market every year.
3.3 Collect Risk Scenarios
72 3 Creating Value Through ERM Process
Interestingly, the Porter’s five forces model in particular has not established itself well in
practice, for example in contrast to SWOT analysis. Grundy (2006) recognises several
reasons for this:
• The model is relatively abstract and very analytical.
• The language is relatively technically and micro economically focused.
• The practical implications are not easy to recognise, the model is relatively difficult to
implement.
• The logic of the model is not easy to understand and cannot be easily transferred to
the own context (p. 214).
However, the contribution of this model to the practical analysis of the business environ-
ment is very high. If the model is somewhat adapted and more “practical”, it can be very
useful for strategic risk and opportunity identification. In addition to all the criticism and
limitations of this model (see Grundy 2006, p. 215), it is one of the most important tools
for assessing the forces which determine the profitability of an industry.
One aspect in the discussion about the practical relevance of Porter’s five forces
model is its dependence on other strategic management tools. A paper by Grundy (2006),
which is very valuable for practitioners (e.g. risk managers), shows how the five com-
petitive forces can be embedded as a puzzle piece in a superordinate strategic analysis
model. Specifically, it is recommended to combine Porter’s five forces model with a sec-
ond, also very popular strategic management tool named PEST analysis.
The acronym PEST refers to political, economic, socio-economic and technological
factors. By the means of this tool, companies are able to assess the general environmen-
tal risks which comprise many exogenous factors outside the control of corporate man-
agement. It is clearly a useful tool to conduct strategic risk analysis and provides a broad
overview of the most important macro-environmental factors to analyse. Several variants
have emerged over time, one of the most well-known enhancements is PESTEL which
includes environmental and legal factors. An example of how the results of a PEST anal-
ysis could look like is shown below.
Drivers of change in ski manufacturing
Political issues: Numerous safety regulations also apply to ski manufacturers and
sportswear manufacturers. High tariffs on individual product groups may reduce the
attractiveness of individual overseas sales markets. Environmental associations are
more critical of mass tourism in high alpine areas, which may also reduce the attrac-
tiveness of skiing.
Economic issues: As the number of skier days tends to decrease due to global
warming, more skis are hired instead of bought. It is also to be expected that only
high-altitude ski resorts will be profitable in the long term. Lower-lying ski resorts
close to conurbations are thus likely to disappear more and more. From a global
perspective, growth markets, especially China, Russia and India, will significantly
73
increase the demand for skis, clothing and accessories. The market is highly seasonal
and saturated. Especially in spring, consumers expect high discounts.
Social issues: Urbanization is increasing more and more and the possibilities for
leisure activities are becoming more diverse. Accordingly, skiing competes with
leisure activities that are less weather-dependent. The ageing of the population can
potentially act as a brake on growth. In general, Western Europe is sceptical about
mass tourism in ski resorts, especially the intensive snowmaking for slopes.
Technology issues: The spread of the Internet makes it possible to make a detailed
price comparison between ski and ski equipment manufacturers. In addition, various
factors, such as the Internet, are driving the need for individual products. However,
there are no signs of any disruptive manufacturing processes or materials. The
demand for sustainably manufactured skis is likely to increase.
The growth drivers act as a link pin between the environmental analysis (PEST) and the
industry analysis. If, for example, the environment changes unfavourably, this can lead to
growth brakes, which in turn make specific industry forces more relevant (Grundy 2006,
p. 217). Figure 3.6 graphically depicts a sort of “onion model” which begins with a PEST
analysis and ends with the analysis of the own company in the competitive environment.
This onion model can significantly improve the identification of potential key risks.
SWOT Analysis (Andrews 1971)
A company can apply a SWOT analysis in order to conduct a strategic analysis by iden-
tifying strengths and weaknesses in the internal company environment on the one hand,
and opportunities and threats in the external market environment on the other hand.
Current
customers &
competitors
Life cycle of
own industry
N
e
w
e
n
tr
a
n
ts
Bargaining
power of
customers
Bargaining
power of
suppliers
Technological change Political change
Economic change Social change
Life cycle of
own industry
Growth driver
N
e
w
s
u
b
s
ti
tu
te
s
Fig. 3.6 Competitive mapping. (own depiction based on Grundy 2006, p. 217)
3.3 Collect Risk Scenarios
74 3 Creating Value Through ERM Process
It is probably the most well-known strategic analysis tool in theory and practice. The
outcome of this strategic analysis can help to identify strategic risk factors. Especially
for SMEs, the use of a SWOT analysis is helpful. The fact that it is a very straightfor-
ward tool that incorporates both internal and external (uncertain) developments is very
valuable. In addition, the SWOT analysis links the relevant problem areas within compa-
nies with the corresponding business objectives. In the following, a simple SWOT analy-
sis of a ski manufacturer is illustrated.
Results of a SWOT Analysis (ski manufacturer)
Strengths Weaknesses
• Qualified and long-standing employees who
know the processes and products
• Existing customer base that appreciates the
quality of the brand
• Own sales channels that reduce dependence
on intermediary trade
• Financially less dependent on lenders
• Lower economies of scale compared to
larger competitors
• Awareness strongly limited to Western
European area
• Strong focus on alpine skiing, little expe-
rience in the touring ski and snowboard
market
• Strong focus on functionality and less known
for high quality designs
Opportunities Threats
• Digitization of the ski product and its
accessories
• New overseas markets with high growth
potential
• Individualization of products (skis, ski
boots, bindings, etc.)
• Proximity to the Ski World Cup to benefit
from partnerships and feedback
• Quality risk due to production in Eastern
Europe
• Global warming reduces number of snow
kilometres on skis
• Strategic wrongly assessed attractiveness of
skiing
• Entry of a new competitor in the near pre-
mium or premium segment
Return Driven Strategy Framework (Frigo and Anderson 2011)
This framework is applied to analyse the components of a company’s strategy. It also
provides an opportunity to see how different elements of the strategy are linked together
and drive value creation. Furthermore, it offers the perspective on the identification of
risk areas in the strategy. The return driven strategy framework has been applied as an
effective technique for the integration of strategic and risk management goals. This tool
consists of eleven core tenets and three foundations that combined establish a hierarchy
of interrelated activities which have to be followed to achieve superior financial perfor-
mance. Executives not only adopt this framework to evaluate strategies but increasingly
use it to identify risk areas as part of the company’s strategic risk assessment.
Strategic Risk Management Framework (Beasley and Frigo 2007)
This tool provides a structured guideline and areas of focus to identify, link and priori-
tise a company’s strategic risks that include for instance customer risk, supply chain risk,
75
employee engagement risk, reputation risk (remember—not a risk in the strict sense),
innovation risk, financial risk among many others. The elements of the strategic risk
management framework correspond to the tenets of the previously introduced return
driven strategy framework. Hence, the discussion and analysis can be based from the risk
areas of the strategic risk management (SRM) framework associated with the strategy
classification.
VRIO Framework (Barney 2002) and Value-Chain Analysis (Porter 1985)
The application of these tools can support the company to deal with risk factors which
are endogenous and caused by the company’s processes, people and technological sys-
tems. Risks such as inability to observe and react to market changes, operational dis-
ruptions and technological breakdowns are included as well (Andersen and Winther
Schrøder 2010).
3.3.6.4 Risk Identification: Mission Accomplished?
The strategic management tools, such as the classic SWOT analysis, are undoubtedly
valuable tools for identifying and documenting relevant developments in a structured
manner. They can be considered essential tools for any risk manager. Another advantage
of using such tools is that they can build bridges (linguistic and cultural) between corpo-
rate management and risk management. Since these tools were primarily developed from
strategic management, they are widely accepted and known to many in practice. In addi-
tion, these tools are directly linked to long-term future plans as opposed to many other
tools focusing predominantly on short-term, operational issues. It thus makes sense for
risk managers to make use of these tools as well.
However, the process of risk identification is not yet complete in the sense of ERM.
This is illustrated by the example of the SWOT analysis:
• The results are classified into opportunities, threats, strengths and weaknesses. As we
have learned, weaknesses and strengths are not real risks, but already real conditions.
• From an ERM perspective, the opportunities and threats have not yet been classified
or prioritised. At this point, it is still unclear what relative, potential impact they can
have on the company’s objectives.
• It is not yet clear how probable the individual opportunities and threats will material-
ise in the future.
• Often, the degree of abstractness in a SWOT analysis is too high. Opportunities and
threats exist in keyword form, but it is unclear which concrete scenarios are behind
them (each opportunity can have several scenarios with different probabilities). From
an ERM perspective, concrete, plausible and comprehensible scenarios would have to
be developed on the basis of the SWOT analysis.
• The SWOT analysis focuses primarily on strategic risk factors. Operational and finan-
cial risks are in most cases (partially) excluded and must be identified using other
instruments.
3.3 Collect Risk Scenarios
76 3 Creating Value Through ERM Process
• Even if a SWOT analysis is performed by relevant stakeholders of an ERM pro-
gramme (management and board level coverage), it does not include all available
information (and thus probably not all strategic risks). A SWOT analysis must be
complemented by other important subject matter experts, internal or external to the
company.
• Group-specific biases (Sect. 2.3) may pose a significant threat for transparent, objec-
tive and comprehensive risk identification by the means of SWOT analysis.
The next step in the risk identification process is to conduct qualitative interviews with
key stakeholders to enhance the process of challenging management assumptions and
information gathered by strategic management tools.
3.3.7 Conduct One-on-One Interviews with Key Stakeholders
How can we proceed in practice with effective risk identification, who needs to be
involved and how does the risk manager need to prepare? In the case of an initial imple-
mentation of ERM, it is certainly very advantageous if management, preferably the Chief
Executive Officer (CEO), informs in advance about the relevance of the new ERM. As
is well known, the “tone at the top” is very important so that the corresponding commit-
ment on the part of management is noticeable enterprise-wide.
3.3.7.1 Prefer Interviews Over Templates and Surveys
In practice, it is evident that the supposedly simpler and more cost-effective option of
querying risks via e-mail and ready-made templates does not work. Unfortunately, this
procedure is still practiced relatively frequently. The main reasons why personal inter-
views are preferable to sending templates are the following:
• Low involvement and commitment by the recipients
• Often not taken very seriously because recipients do not know exactly what is hap-
pening to their information.
• The necessary time is often not spent on it. As a rule, such templates are filled out
quickly and with low priority.
• There is a high risk that last year’s list will be copied and that only few creative
thoughts will flow into risk identification.
• The risk manager cannot be asked any questions. The recipient fills in “something” to
the best of his knowledge and belief.
• The risk manager cannot guide the development of complex scenarios. It may not be
possible to reduce relevant cognitive or motivational biases in this way.
Figure 3.7 shows an example of a simple template used in this or a similar way for risk
identification purposes. In the subsequent years after ERM implementation, the template
773.3 Collect Risk Scenarios
R
IS
K
M
A
N
A
G
E
M
E
N
T
TE
M
P
LA
TE
R
is
k
ow
ne
r
na
m
e:
B
us
in
es
s
U
ni
t:
D
at
e:
ID
R
is
k
T
itl
e
R
is
k
Im
pa
ct
P
ro
ba
bi
lit
y
of
O
cc
ur
en
ce
R
is
k
M
ap
A
re
a
R
is
k
D
es
cr
ip
tio
n
R
is
k
C
at
eg
or
y
H
is
to
ric
D
at
a
R
is
k
S
ou
rc
es
R
is
k
In
te
r-
de
pe
nd
en
ci
es
M
iti
ga
tio
n
in
P
la
ce
E
ffe
ct
iv
en
es
s
of
M
iti
ga
tio
n
R
is
k
O
w
ne
r
M
ed
iu
m
Lo
w
H
ig
h
M
ed
iu
m
Lo
w
Lo
w
Fi
g
. 3
.7
E
xa
m
pl
e
of
a
r
is
k
m
an
ag
em
en
t
te
m
pl
at
e
78 3 Creating Value Through ERM Process
will be sent again with the request that the risk owner updates it and adds new risks if
necessary. In this textbook, we will completely abandon this approach and show a more
effective and beneficial approach.
The use of one-on-one interviews to complement risk identification is a very impor-
tant step for the following reasons:
• The involvement of employees, department heads, team leaders, etc. creates greater
acceptance for ERM.
• Personal interviews clearly prevent the “not-invented-here” syndrome. Decisions to
introduce new ERM measures are better accepted if employees are involved in the
decision-making process.
• Risks that have not yet been identified (specifically more operational risks) can be
identified. Not all risks are covered by the assumption analysis and strategic environ-
ment analysis.
• The involvement of specific experts (e.g. internal audit, external audit, and external
specialists) on specific topics creates a further perspective.
• The interviews with various ERM stakeholders allow several perspectives on the same
risk and thus promote discourse in the (common) case of divergent opinions.
After this advance information, the risk manager must consider with whom he or she
would like to conduct the interviews. The goal must be to obtain the most representative
(risk) view possible of the entire company. The hurdles and challenges that arise have
already been discussed in Sect. 3.3.2.
3.3.7.2 Select and Inform Interviewees Carefully
Since interviews are resource-intensive, it is important to select the interviewees care-
fully. Who can bring in which risk perspective to represent a specific area of expertise, a
business area or a cross-sectional function? As a rule, only a few interviews are enough
to obtain a company-wide risk profile. Irrespective of the company size, experience has
shown that 10 to 20 interviews may be sufficient in most cases.
Figure 3.8 shows an example of a company that conducts 13 interviews to enable
company-wide risk identification. As can be seen from the organisation chart, differ-
ent hierarchy levels are represented. From the operative business, the risk manager has
selected three experts who have a particularly high level of industry knowledge and can
thus contribute valuable information to possible industry risks. Internal audit can provide
valuable information based on their audit activities. Board members can add to the strate-
gic risk analysis by assessing environmental risks or industry specific risks.
Once the relevant experts have been identified, they should be informed in advance
about the upcoming interviews. It is important that this information contains the follow-
ing elements:
79
• ERM and its purpose (e.g. enhancing company value, improving decision quality)
• Importance of experts for the success of ERM (valuable experience, significant contri-
bution to risk assessment)
• Information handling (e.g. who receives the interview information? What happens
with this information? What is reported back to the expert? What kind of conse-
quences may the interviewee expect?)
• Importance of interviewees answering honestly and transparently (e.g. creating incen-
tives that promote truthful answers).
• Interview procedure (e.g. duration of interview, recording of interview, identification
of three or five most important risks, assessment of very pessimistic scenarios, devel-
opment of scenarios with the help of the risk manager)
• Acknowledging and reaffirming that the expert is part of the successful business
development.
The next step is now to arrange the individual appointments with the experts. It is impor-
tant to allow enough time for the meeting, especially for the very first one. Experience
clearly shows that, as a rule, too little time is available for more detailed discussions
of individual risk scenarios. The time factor often leads to hasty decisions and poorly
reflected risk assessments.
3.3.7.3 Elicit Feedback on Major Risks
During the interviews, the risk manager must pay attention to the individual biases and
try to minimise them through skilful conversation (Chap. 2). Experience has shown that
interviews should focus on identifying the three or five major risks at most. The princi-
ple of “relevance over quantity” applies here. If the expert is asked about the 10 most
R & D
Board/AC
3 Division
Managers
Divison Product
X
Divison Product
Y
Divison Product
Z
Management
Marketing
Finance
R & D
Marketing
Finance
R & D
Marketing
2 Board
Members
CEO/CFO/
CRO/CTOInternal AuditHead IA
Expert with
Experience
Expert with
Experience
Expert with
Experience
Fig. 3.8 Enterprise-wide risk perspectives
3.3 Collect Risk Scenarios
80 3 Creating Value Through ERM Process
important risks, there is a danger that he will focus his time on some risks that are highly
unlikely to be relevant from an enterprise-wide perspective.
If possible, interviews should be recorded electronically and conducted face-to-face.
This allows the risk manager to concentrate better on the conversation, to ask questions
and also to better understand the non-verbal language. After the interview, he or she can
transcribe it in detail and no important information is lost. What can be helpful for the
conversation and as a thought support in risk identification is a sheet of paper showing
the basic structure of a bow-tie diagram. This makes it easier to think through the scenar-
ios in terms of causes, events and impacts. Figure 3.9 shows a corresponding template,
which can be printed out and brought to the interviews. It is important that the risk man-
ager briefly explains the scenario analysis and proactively refers to the causes, events and
impacts in the conversation.
3.3.7.4 Focus on Plausible Stories, not on Numbers
As part of risk identification, it is important to develop risk scenarios that are as plau-
sible, complete and representative for the possible range of uncertainty. Risk identi-
fication interviews should start with developing very pessimistic scenarios. Does this
Causes Impact
Events
–
–
–
–
–
–
–
–
–
–
–
–
Fig. 3.9 Bow-Tie documents for interviews
81
not contradict the modern approach according to which ERM can create value for the
company? Should not very optimistic, value creating scenarios be developed first? The
answer in both cases is no and can be justified as follows:
• It goes without saying that management must know all the scenarios that can endan-
ger the existence of a company. These are scenarios that can lead a company into
over-indebtedness or illiquidity.
• Moreover, the effect of such negative scenarios on relevant performance indicators,
e.g. on EBIT or company value, must be assessed later in order to create a basis for
decision-making on how to deal with these risks.
• If opportunities scenarios are discussed first, this can have a “euphoric” overshadow-
ing effect. This means that downside risks are then given too little weight and dis-
cussed too little in the subsequent discussion. It is thus always worth starting with the
negative scenarios first.
• As a general rule, scenario development can be used to adequately represent all pos-
sible future realities in the form of a “distribution”. This requires an equal assessment
of pessimistic and optimistic scenarios.
The risk manager should ensure that risk scenarios are developed as complete as possi-
ble. Complete in this context means:
• Are there one or more causes that lead to the risk event? One should not limit oneself
too quickly to the first, plausible cause.
• Are these causes independent of each other or do they only lead to the risk event in
combination? If the causes are independent, two different risks have been identified.
• Are there causes of the causes? The “why” should be asked until the origin of the
cause has been found. Preventive measures are the best way to manage risk.
• What are the sequences of the risk event? Does this event trigger a follow-up risk?
If so, should it be incorporated into this scenario? Correlations with other risks can
already be integrated via scenario development.
• Are there short- and long-term consequences? It is well known that strategic risks in
particular may arise abruptly, but have an impact over several years. These effects
must be taken into account in scenarios.
• In addition, the financial impact of the scenario must be considered. It can have
impact on different line items in the financial plan.
• Risk scenarios should be as debiased as possible. For example, the risk manager
has to ensure that no hindsight biases are included in the prospectively-oriented risk
scenarios.
In this phase of the ERM process, as already mentioned, the three to five most impor-
tant risks are to be discussed. In addition to the very pessimistic scenario, consideration
3.3 Collect Risk Scenarios
82 3 Creating Value Through ERM Process
should also be given to what a very optimistic scenario (best case) could look like. Two
cases have to be distinguished:
• For many operational (event) risks, there is no actual optimistic scenario according
to our risk definition (deviation from plan). This applies in the case where the plan
anticipates the non-occurrence of a risk. For example, the risk of a flood catastrophe
is not taken into account in the financial plan because the probability of occurrence is
relatively low. The optimistic risk scenario would be: No flood catastrophe occurs. A
better scenario of flood risk, which even generates value, does not exist in this case.
• With strategic and many financial risks, there are realistic scenarios that can turn
out better than expected. These are usually so-called distribution risks, which can
assume several or many realities. For example, a very optimistic scenario could be
that, despite a competitor entering the market, one’s own market position can be sig-
nificantly strengthened because the competitor fails and one’s own company emerges
stronger from this situation.
The reason for capturing not only very negative but also very positive scenarios is the
opportunity of obtaining an initial overview of the ratio between rewarded and unre-
warded risks. Unrewarded risks are events that do not include any opportunity poten-
tial. These include many operational risks such as flooding, fire, machine breakdown.
As a rule, it is not worth taking these risks consciously. In contrast, rewarded risks are
generally associated with potential opportunities, usually strategic or financial (e.g.
interest rates, currencies) risks. This procedure provides an initial indication of which
risks are generally more likely to be avoided or minimised and for which conscious risk-
taking makes it possible to exploit potential strategic opportunities (and to create value
accordingly).
Up to this stage, we have now collected three to five potential risks from each expert.
These are available in the form of very pessimistic scenarios. Where appropriate, very
optimistic scenarios have also been developed. All scenarios have been thought through
by the means of the bow-tie technique to the extent that the cause(s) and final financial
impacts on consistent financial performance indicators such as EBIT, cash flow, equity
or company value are known. In order for risk identification to become a consistent and
high-quality process, the following important aspects must be observed:
u The following points in risk identification must be considered:
• Only as much information as necessary should be collected by the experts.
This means a fully thought-out scenario per risk with an initial rough esti-
mate of the financial impact is sufficient.
• The scenarios should be developed on a net basis. This means that all exist-
ing risk mitigation measures should be included in the scenario devel-
opment. Gross risks are “pseudo risks” and prevent (or overestimate) a
realistic risk assessment.
83
• It must be clear what the financial impact refers to, e.g. EBIT, free cash flow
or company value. This performance measure should be used consistently
so that risk scenarios can be compared at later stages.
• An assessment of the probability of occurrence is not yet necessary at this
point. All key risks are basically “rare” events. Frequency losses that can
often occur with a high probability (such as process risks) are generally not
key risks. Potential key risks should therefore be selected exclusively on the
basis of loss potential. Companies must know the absolute loss potential of
each risk, regardless of the probability of occurrence. Diluting the real risk
by calculating an expected value is dangerous and misleading.
• Quality over quantity: Few, but relevant risks should be recorded com-
pletely and comprehensibly.
3.3.8 Complement with Traditional Risk Identification
By means of the assumption analysis and the qualitative interviews, most of the risks
relevant to the company (i.e. decision-relevant risks with reference to specific business
objectives) can usually be identified. Of course, there are numerous other risk identifica-
tion methods that can be useful as a supplement. However, these methods often refer to
rather operational risk management, which is not ERM. This textbook focuses on strat-
egy-relevant, company-wide risk management. For this reason, it does not present indi-
vidual risk identification methods in a comprehensive way. In the following, however, a
few techniques are introduced that are relatively important in practice and can contribute
to supplementing the ERM process.
3.3.8.1 Conduct Risk Workshops Carefully
Workshops bring risk experts from different functions and hierarchical levels together
to exploit the collective knowledge of the group and develop or complete a list of risks
related to the company’s strategy and the corresponding business objectives (COSO
2017, p. 70). Although risk workshops are a very popular instrument to develop and
collect risk scenarios in practice, many of them fail to produce reliable and relevant
risk information. Apart from the well-known biases to counter in group meetings (see
Chap. 2), other common organisational key aspects are often neglected.
Of course, the risk manager should be familiar with current risk policies, risk appetite
statements, risk exposures and all other risk related guidelines. Next, a sound preparation
of a risk workshop is crucial. Ideally, the risk manager contacts all participants of the
workshop in advance to inform about the key objectives of the meeting, e.g. to identify
relevant risks which might have an impact on the company’s strategy. Workshops usu-
ally take more time than planned. It is important to allow enough time for the work-
shop, otherwise decisions could be driven by a lack of time rather than by appropriate
reasons. Moreover, the risk manager should facilitate effective discussion by booking
3.3 Collect Risk Scenarios
84 3 Creating Value Through ERM Process
an appropriate meeting room with round tables. To avoid hiding in the group and to be
capable to lead the discussions efficiently, the number of attendees should not exceed
eight to ten attendees.
It might be helpful to provide to all attendees an overview of possible risk areas prior
to the risk workshop. This promotes creative thinking and prevents thinking blockades
(empty sheet syndrome). An example of such a risk area sheet is provided in Fig. 3.10.
In addition to the sharing of the risk areas, the risk manager can provide the latest ver-
sion of risk analysis performed, e.g. on strategic management assumptions. This can pro-
mote the relevant discussions right from the beginning of the workshop and is preferable
to start with a blank risk identification sheet.
At the very start of the workshop, the risk manager should briefly introduce the state
of the ERM process, the objectives of the workshop, and the relevance of the experts
attending the meeting, the planned time schedule and an outlook of the next steps past
the risk workshop. During the discussions, the risk manager acts as a facilitator and
should be a neutral moderator. The crucial part is to counter specific group biases by e.g.
starting with discussing risks prior to opportunities, deliberately eliciting a second solu-
tion to every risk assessment, assigning somebody to play devil’s advocate and introduc-
ing the difference between business issues and real risks. The role of a moderator can be
very challenging. In the following, a few key aspect are to be taken into account:
• Keep a close eye to time management. Focus on high level risk scenario development.
Detailed risk analysis including discussing risk mitigation options is very time con-
suming and could be done afterward by subsequent interviews with risk owners
Ecology Procurement Production Sales
indicators
• environmental
sustainability
• of the products
• of the additives
• of the production
processes
• environmental trends
indicators
• prices
• conditions
• supply volume
• quality level
• punctuality of
suppliers
• size of order
• order routes
indicators
• component diversity
• occupancy rate
• inventories
• reject rate
• output change
• setup times
• setup costs
indicators
• new orders
• backlog
• order/purchase
behaviour
• price/program policy of
the competition
• image of own and
competitor products
• complaints rates
Macroeconomics Demography Politics Technology
indicators
• interest rates
• exchange rates
• economic indices
• union wage level
• money supply
indicators
• population growth
• demographic structure
• human resources
• unemployment rate
indicators
• law preparation
• political parties
• political stability
• election results
indicators
• innovations
• development of
materials
• trends of change in
production and
process technology
Fig. 3.10 Example of possible risk areas. (adapted from Diederichs 2013)
85
• Make sure that risks are described enough specific, i.e. develop plausible stories, start-
ing with risk causes.
• Guide the discussions to external (environmental) risk identification. Usually, the
focus lies too much on internal business issues rather than on external emerging risks.
• Avoid risk management jargon, try to speak business language to increase credibility
and acceptance. Do not ask for probabilities of risks, there is no need to do so at this
stage of the ERM process.
• Do not get into details more than what is needed. As a facilitator, the task of the risk
manager is to lead participants through a process of group knowledge capturing.
• Make sure attendees understand the concept of uncertainty. This is not a single num-
ber, rather a range which expresses the degree of uncertainty. Usually, participants are
reluctant to guess at specific numbers.
• Follow the rules for brainstorming quite closely: Risk managers shall not evaluate any
ideas. The goal is to collect everything first. The discussion of any risks will follow
later.
• For brainstorming to be effective, create a diverse workshop group covering different
areas of business and invite external subject matter experts if useful.
• Appreciate all contributions to risk identification. It is important to create an atmos-
phere where no answer is wrong. Risk managers should promote disagreement, this
can enrich the perspectives to existing risk assessments.
• Prepare some good examples of well-developed risk scenarios, explain the differences
between sources, events and impacts.
• If the risk manager thinks that an appropriate amount of risk scenarios have been
developed, he or she can switch to the next process step. The risk manager should
summarise all the ideas from the participants into a structured form, specifically
pointing to risks with much disparity. This can be done in a coffee or lunch break.
After the break, the risk manager shares his or her summary with the participants to
start the follow-up session. The aim of this follow-up session is to reach some degree
of consensus regarding the causes and specifically the (financial) impact of risks.
• At the end of the workshop, explain in detail what happens with all the collected risk
scenarios. Risk managers should share the results of the workshops in a comprehensi-
ble way with all participants.
In summary, risk workshops can be a useful complement to the analysis of management
assumptions if the above described success criteria are followed. In practice, certain
biases dominate so greatly that risk workshops are inadequate as the sole instrument for
identifying risks and in the worst case even do more harm than good. In addition, the risk
manager must be highly skilled at moderating such risk workshops.
3.3.8.2 Consider Process-Based Risk Identification
Basically, ERM should not be the driver for process management in the company, there
are more rational reasons. However, if a company has already described and visualised
3.3 Collect Risk Scenarios
86 3 Creating Value Through ERM Process
its processes (e.g. ISO 9001), these can be a useful basis for complementing risk identifi-
cation. However, it must be clearly stated that process analyses generally do not produce
any strategy-relevant risks in most cases.
In the context of the introduction of an internal control system, which is primarily
designed for process assurance, process-based risk identification can be a very reason-
able procedure. The first step is to consider which processes should be subjected to a risk
analysis based on relevant criteria (scoping). This can be done on the basis of quantita-
tive (based on balance sheet and income statement items) or qualitative criteria (com-
plexity, importance, criticality). Once the processes have been selected, a risk-based
analysis of the individual process activities is carried out. An example of such an analy-
sis is shown in Fig. 3.11. Together with the risk manager, the process owner can analyse
“what can go wrong” in the individual process activities. If potential process weaknesses
are identified and there is no corresponding effective and efficient process control, this is
an indication of potential risk.
3.3.8.3 Use Risk Checklists with Caution
Checklists use the knowledge of other institutions such as risk management associations,
universities or consultants. Basically, it is very tempting to use risk checklists that are as
order
intake
material
shortfall
demand
generated
x
o orderplacement
material
availability
check
capacity
planning
+ special order purchase order
incoming
goods
control
goods
delivery
+
o
warehousing
fabrication
special order
quality
control
feedback
x quality control positive
quality control
negative
incoming goods
control positive
rework
return
goods
incoming
goods
control
negative
What can
go wrong?
x
What can
go wrong?
What can
go wrong?
What can
go wrong?
What can
go wrong?
Fig. 3.11 Process-based risk analysis
87
comprehensive as possible. This makes risk identification significantly faster and more
cost-effective. In addition, experience from other companies in the same industry can be
used. Such checklists can be supplemented with further, company-specific risks.
It appears that checklists are actually an ideal instrument for risk identification.
However, this also entails significant disadvantages:
• Checklists prevent your own thinking or creativity. Risk identification thus quickly
degenerates into a ticking-off exercise
• Checklists are incomplete, specifically company-specific risks are only insufficiently
covered
• Many risks on the checklist are not relevant and may thus distract from actual risks
• Checklists only show negative risks, the opportunity potential is not taken into
account
• Checklists do not establish a direct reference to business objectives
• Strategic risks can hardly be found on a checklist because they are very
company-specific
• Checklists do not always define risks consistently according to causes, often one finds
a mix between causes, events and impacts.
Risk checklists should never be solely used to identify risks. If a company decides to
use checklists, they should be used as supplements after the assumption analysis and
qualitative interviews have been carried out. Such checklists have not be confused with
predefined risk categories. It may make sense, for example, to predefine risk categories
for all interviewees in qualitative interviews. This is even very advantageous in order to
achieve a certain consistency in the identification process. Risk categories have a sig-
nificantly higher level of aggregation than concrete, individual risks. They are more com-
parable to risk areas, e.g. strategic, operational and financial risks are three broad risk
areas. Currency fluctuations of the CHF/EUR currency pair are a concrete risk within the
category “financial risks”. Figure 3.12 shows the difference between a risk checklist and
a meaningful presetting for e.g. a risk workshop or a risk interview to trigger the identifi-
cation of relevant risks within the broader risk categories.
3.3.8.4 Try Fault Tree Analysis (FTA) for Critical Processes and Systems
Fault tree analysis (FTA) has its roots in the aerospace and reactor technology sectors
and is mainly used in complex, safety-critical processes and systems. The method was
first used in 1961 to investigate a missile launching system. It is used both to search for
potential sources of error and to optimise and assess safety. The aim of FTA is the sys-
tematic identification of all possible failure combinations, understood as causes that lead
to a given result. This includes the creation of a graphical system model in which the
undesirable situation is at the top and the possible sources of error are at the base and are
linked with Boolean operators.
3.3 Collect Risk Scenarios
88 3 Creating Value Through ERM Process
Following this rather general definition of the FTA, an attempt is now being made to
establish a link to business risk and quality management. An example of this is product
reliability, with the focus on that part of the integrated product lifecycle where manufac-
turing companies have little impact on products. This corresponds to the period shortly
after the market launch, where it will become apparent to what extent the products actu-
ally contribute to satisfying the needs of the customers. If an error occurs here, this can
have serious consequences for the company. Ideally, product defects and the associated
risks are thus already recognised in the development cycle, either in the planning phase
or at the latest in the test phase, in which the risks and functionalities of the prototypes of
the products to be produced are checked. Within the framework of product reliability, the
FTA is of considerable importance as an analytical instrument for the structured identifi-
cation of product-related risks.
In the first phase of the FTA, the aim is to identify as many causes as possible on the
basis of an identified problem and to depict them graphically in a cause system. A so-
called fault tree is used in the FTA to represent the cause system. The fault tree is a top-
down analysis technique. It is a method in which, starting from an identified problem or
risk, causes are gradually linked to the causes of causes, until the cause system has been
mapped as completely as possible.
Basically, two main groups of symbols of the FTA can be distinguished: Events
(labelled symbols) and logical links (unlabelled symbols). In the top-down procedure,
the risk event “engine of a machine cannot be stopped” (risk to be analysed—also
called top event) is assumed and all possible causes (“emergency stop switch system”
and “alternative power supply for engine”) and causes of the causes (“switch 1 fails”
and “switch 2 fails”) for this risk are graphically displayed. Ideally, the FTA searches for
groups of events (so-called cut sets) that cause the top event to occur. The more events
Risk
Category
Risk
Subcategory
Risk Checklist Risk
Present?
Financial Market Currency risk
…
…
YES NO
YES NO
YES NO
Strategic Supply Chain Delivery interruption
…
…
YES NO
YES NO
YES NO
Strategic Rivalry Market entry of competitor
…
…
YES NO
YES NO
YES NO
Operational HR Untrained staff
…
…
YES NO
YES NO
YES NO
«Ticking-off
excercise»
Single risks
Meaningful prese�ng for
workshops / interviews
Fig. 3.12 Risk categories vs risk checklist
89
in such a cut set, the less likely it is that the top event will occur. This means that risk
managers search specifically for so-called minimal cut sets, that is, for groups of events
that have as few individual events as possible. To put it simply, minimal cut sets are the
most likely constellations for a top event to occur. Of course, the fault trees are much
more complex in practice than in the example above. Therefore, there are special soft-
ware packages that make it possible to analyse the error trees especially with regard to
the cut sets (Rautenstrauch and Hunziker 2011).
3.3.8.5 Prevent Costly Errors with Failure Mode and Effects Analysis
(FMEA)
The FMEA was developed by NASA in parallel to the FTA in the 1960s and was used
for the first time in the Apollo programme. The method was later widely used in the
automotive industry through power plant construction. Meanwhile, the FMEA is used
for the development of new products, the use of new production processes, products with
safety requirements, changes to the product, material or process, changes in the condi-
tions of use of known products, complaints and requirements by the customer.
In contrast to FTA—which is a representative of top-down instruments—Failure
Mode and Effects Analysis (FMEA) is one of the bottom-up analysis forms. FMEA and
FTA are related instruments which complement each other and, in combination, have
their greatest effect in terms of risk identification. Instead of examining which product
components could cause a given error or risk situation (top event), the FMEA tries to
find out what type of error or risk is triggered by the given product components. Within
the framework of quality management, the FMEA is thus used to minimise the risk aris-
ing from the occurrence of errors. Potential errors in systems, designs and processes are
analysed and measures defined to detect them as early as possible.
The FMEA is motivated by the knowledge of the connection between the costs of
eliminating faults and the time of their discovery. As a rule of thumb, the so-called rule
of ten1 is often mentioned, which states that the costs increase tenfold from one process
step to the next. For this reason, FMEA follows the idea of preventive error prevention
instead of subsequent detection or correction.
Depending on the different hierarchy levels of the application of an FMEA, the
FMEA is classified into three subgroups. The classic distinction is based on a system
FMEA (product concept), a design FMEA (examination of products for weak points in
design or layout) and a process FMEA (manufacturing process). The findings from the
investigation at system level serve as the basis for the design FMEA, the results of which
flow into the considerations at process level. As a result of cause and effect, a hierarchi-
cal shift results for the different FMEA types, in which the error cause becomes the error
type and the error type becomes the error effect in the subsequent investigation.
In order to create an FMEA, an FMEA team is formed within the company, consist-
ing of employees from all departments concerned, in order to ensure a common view
from different perspectives. An important role in this process is played by the team
3.3 Collect Risk Scenarios
90 3 Creating Value Through ERM Process
leader, who must bring all results together and then document them. The team will use
an FMEA form to answer the following questions:
• Where can an error occur?
• How does the error manifest itself or how does it occur?
• What kind of error sequence can occur?
• Why can the error occur?
The following is a brief explanation of the individual steps involved in answering the
above questions. In the first step, the system (product) is delimited and described. This
results in a division into individual system elements (end products, assemblies and com-
ponents) and the determination of the individual interfaces between the elements. In the
subsequent error analysis, potential errors are assigned to the individual system elements
that are defined as restrictions or non-performance of system functions. The central
result of the analysis of the error sequence is the effect of the error on the end user of the
product. In the final step of the analysis, all causes that could lead to the described error
are described. Then measures to avoid or detect the individual errors and their causes are
listed.
In the subsequent risk assessment, the probability of occurrence, the significance of
the consequences and the probability of detecting the individual faults are discussed. The
evaluation of errors is calculated using the risk priority number: probability of occur-
rence multiplied by significance of consequences multiplied by probability of discovery
(problems with this approach are discussed in Sect. 3.4.1.4). If the risk priority figure
exceeds a threshold value defined within the company, countermeasures are to be taken.
Ideally, such measures should aim at error prevention instead of error detection. Finally,
the effectiveness of the individual measures to reduce errors is to be assessed. The risk
priority number prior improvement is compared with the risk priority number of the
improved system (Rautenstrauch and Hunziker 2011).
3.4 Assess Key Risk Scenarios
Probably one of the most challenging steps in the ERM process is to develop appropriate
criteria to differentiate between key risks and all other risks (Rees 2015, p. 36). To carry
out this important step, we need to reconsider what is fundamentally a key risk—and
what happens to all other risks. It is obvious that applying the wrong selection criteria
can lead to a more or less false understanding of the current risk exposure.
First, it is important to understand that ERM is primarily concerned with risks and
opportunities that may have a relevant impact on the achievement of objectives. In most
companies, financial performance is the most important indicator of short- and long-term
target achievement. Finally, the company’s financial situation is of crucial importance for
91
its long-term existence. Thus, the assessment of a risk in terms of its impact on financial
targets must be an important criterion for most companies.
Should risks be excluded from further analysis that do not exceed a certain minimum
loss potential? The answer depends on the perspective. From an ERM point of view, it
is necessary to define clever filters so that only relevant risks are subjected to a detailed,
more complex assessment. Risk quantification and risk simulation based on key risk
selection is much more cost-efficient and less complex to set up and maintain if only a
few important risks are taken into account.
u The selection of a few, relevant risks is decisive as to whether ERM systems can
be used meaningfully in practice in the long term or whether they will not sur-
vive due to their complexity and high costs. The flexibility and strategic orien-
tation of ERM systems for ad hoc decision support is a key success factor.
However, risks that are filtered out from an ERM perspective should not simply be
“deleted”. These risks could become key risks over time, so they need to be monitored
and regularly reassessed. It is thus important to store all risks in a database and to cre-
ate a kind of a “watch list”. However, these “watch-list” risks may be relevant from an
operational risk management perspective. Depending on whether a company runs opera-
tional risk management in addition to ERM, these risks can be managed decentrally and
coordinated with other assurance functions (e.g. internal control).
Of course, focusing on key risks has one major caveat: It may lead to an underestima-
tion of the current risk exposure if many “minor” risks are excluded from further risk
analysis. In addition, the relative importance of a risk does not directly include the rela-
tive relevance of possible risk mitigation measures. For less important risks, there may
exist simple and cost-effective measures to reduce or eliminate them completely. There is
no reason to not think about risk mitigation even for small or unimportant risks. This in
turn can significantly reduce the company’s overall risk exposure.
On the other hand, it may also be the case that risks being considered unimportant
can trigger other risks and accumulate to relevant risks due to risk interdependencies.
Figure 3.13 shows the basic challenge of this ERM process step. After having collected
risks (uncertainties) from various sources, they have to be consistently assessed for fur-
ther prioritization. Companies may apply different filters to select key risks from the
“risk universe”. Eventually, the risk manager has to create a key risk list for further risk
analysis (quantitative scenario development).
3.4.1 Identify Key Risk Scenarios
In the following some filters are discussed critically. The first two filters aim to exclude
“fake” risks. On the one hand, this concerns unrealistic scenarios against which no mean-
ingful measures can be taken. On the other hand, as already mentioned in Sect. 3.3.4,
3.4 Assess Key Risk Scenarios
92 3 Creating Value Through ERM Process
pure decision-making problems that are entirely within the control of the company must
be recorded in a separate list. The two subsequent selection criteria describe filters that
are very common in practice. However, it should be kept in mind that some filters for
risk prioritisation can do more harm than good. Subsequently, we explain a simple but
very useful filter for creating a key risk list at this stage of the ERM process.
3.4.1.1 Exclude Unrealistic, Devastating Risks
To ensure that ERM remains credible and is taken seriously by its stakeholders, no unre-
alistic, irrelevant risks should be included in the key risk list. However, the question of
how to distinguish realistic and unrealistic risk is not so easy to answer. Let us assume
a very bad risk scenario that can be devastating for all projects and all business areas of
a company and in addition, for all companies in a specific industry, in a country or even
worldwide. Let us label it “Aliens take over world domination”. Such a scenario is prob-
ably untrustworthy in the sense of being purely speculative and not reaching consensus
among experts. In addition, alien invasion has of course a very low probability of occur-
rence. No company can meaningfully prepare for this event nor can it implement meas-
ures to minimise the impact to a reasonable level.
Key risks
Risk universe
Filter I
Filter II
Filter III
One-on-one interviews
Management
assumption analysis Traditional risk
identification
Fig. 3.13 Application of smart filters to create a key risk list
93
Other, similar implausible scenarios can be, for example, risks that make life on earth
impossible, e.g. a devastating meteorite impact, deadly global diseases, global cyber war,
robotic takeover of mankind, world war III, fundamental shift of the political system
from democracy to dictatorship. To enable risk-based comparability of the risk exposure
between projects, business areas and strategic options in a company, such unrealistic sce-
narios must be consequently excluded in all risk analyses.
Unrealistic, devastating risks, which usually affect an entire economy or even the
global economy, should not be confused with very rare, company-specific risks for which
individual companies can prepare by implementing appropriate risk mitigation measures
(to some extent). These very rare, but plausible risks may “only” affect individual busi-
ness areas in certain regions or “only” affect some, but not all strategic initiatives. An
example of a plausible, very rare and very pessimistic risk scenario is a flood disaster in a
certain region where the company has a production site for a specific product that is only
produced at this facility. Even if this risk is very rare (e.g. 0.005% annual probability) but
has a destructive impact (production site is completely destroyed), it must be included in
the risk analysis for the following reasons (see similar Rees 2015, p. 38):
• The risk is partially manageable, it can be insured, for example, and preventive meas-
ures (protective walls, early warning systems, redundant production site) can be
implemented.
• The risk is a realistic, if rare, scenario. There is broad consensus that it will happen at
some point in the future.
• The risk only has a company-specific impact and a company may be disadvantaged
relative to its competitors when it occurs (e.g. loss of market share).
• The risk only affects one product line (and is as such maybe more risky as other prod-
uct lines, everything else held constant) and can be managed with some effort in the
case it occurs (the existence of the whole company is not at stake).
3.4.1.2 Separate Pure Management Action Items
In Sect. 3.3.4, we briefly discussed the differences between decision problems and real
risks. Now we are so far advanced in the ERM-process that we have to consider how
to deal with pure decision-making problems, which can also have an impact on the risk
exposure (pre- and post-decision risk exposure). Shall risk managers deliberately exclude
decision issues from their risk identification process? One could argue that such decisions
should be left to the responsibility of management. If so, no choice has to be made about
risk prioritization at this point. However, the answer is clearly no. One of the crucial
steps to improve the overall ERM effectiveness is to be aware of the existence of decision
problems and their relation to traditional risks (see similar Rees 2015, pp. 34–35, 40–41).
Next, risk managers should develop a process or a scheme to enable the compari-
son between decision problems and risks with uncertainty attached (“real” risks).
Thirdly, from a risk assessment perspective, this distinction between fully controllable
decision and non-controllable (or only partially controllable) risks is crucial to make.
3.4 Assess Key Risk Scenarios
94 3 Creating Value Through ERM Process
Subsequent risk models based on key risks should be capable to capture both effects
of pure (management) decisions and truly risky items. Straight ahead: A best-practice
ERM approach is to display pre- and post-decision values for all types of decisions, be
it the decision about a measure to reduce the probability of occurrence of a specific risk
or a management decision which only impacts the baseline expectation (plan).
ERM is of course not responsible for recording, evaluating and reporting pure deci-
sion-making problems in a holistic manner. However, risk management workshops and
interviews may exclusively address such aspects. It thus makes sense for the risk man-
ager to record these in a structured manner and make them available to decision-makers.
Pure decision-making problems do not have to be subjected to a more in-depth, quanti-
tative scenario analysis. It also does not make sense to assign different probabilities for
these decisions, since the decision lies in the full control of management. This makes it
obvious that they do not correspond to the definition of “uncertainty” and thus cannot be
included in a classical risk model. However, they also have an impact on financial perfor-
mance, which can be estimated similarly to a real risk. In contrast to the quantitative sce-
nario analysis of real risks, however, not the potential deviations from the planned value
are assessed, but the potential change of the planned value itself. We will learn more
about this difference in the chapter on risk quantification.
3.4.1.3 Avoid Risk Maps as Selection Criterion
A widely used approach for risk assessment and subsequent risk prioritisation is the
risk map (or heat map). It serves as visualised communication aid for corporate risks
and form the basis for decision-making support and prioritising which risks need to be
addressed with which urgency. Based on the prioritisation process, corresponding risk
mitigation measures are derived (Hunziker and Rautenstrauch 2015). Many consulting
firms and training centres with risk management certificates train this approach as a cen-
tral risk assessment instrument. Various international organisations that publish standards
and frameworks for risk management, such as COSO II, National Institute of Standards
& Technology (NIST) or CobIT, also recommend such an evaluation approach. In prac-
tice, it is probably the most widely used approach to risk assessment and prioritization
(Hubbard 2009, pp. 120–121).
In principle, a risk in the risk map is assessed as a product of the probability of occur-
rence and impact-on-occurrence (probability-impact matrices). Risk maps usually use a
kind of scoring system based on ordinal scales. This means that relative gradations are
made on the basis of a value range of e.g. 1–5, where 1 is classified as “very low impact”
and 5 as “catastrophic impact”. Other gradations with value ranges from 1–3 to 1–10
can also often be found in practice. It is usually assumed that the distances between the
individual values are equal, i.e. a risk with score 3 is assessed as three times more serious
than a risk with a value of 1. Figure 3.14 shows an example of a risk map as it is often
used in practice.
Caution is needed when using such risk prioritization instruments. Risk manage-
ment experts such as Cox (2008) or Hubbard (2009) even describe them as useless or
95
counterproductive, as they can lead to wrong decisions. The following problems with
risk maps must be taken into account when using them. Some can be reduced or elimi-
nated by certain measures, others are inherent in the instrument.
The use of risk maps is very simple. In the risk map illustrated in Fig. 3.14, the risks
must be assigned to one of the nine fields, which require a rough relative assessment of
the probability of occurrence and the impact. Colour gradations are often used, whereby
the risks in the red fields at the top right are assessed as “unacceptable”. Red risks
require priority treatment, i.e. risk reduction measures must be defined. The orange fields
contain “critical risks”, although it is often not clear whether there is a need for action,
but this is less urgent in terms of time than with the “red risks” or whether the risks are
tolerated and observed more closely. However, the colouring fails to provide a realistic
assessment of the risk. The red fields at the top right can be described as pseudo risks
(or phantom risks, see Samad-Khan 2005, p. 3). It is simply not possible that there are
business risks that threaten companies as a whole with a very high frequency. Thus, in
practice, real “red risks” at the top right exist very seldomly.
The focus of risk maps is in many cases risk prioritisation with respect to an aver-
age value, i.e. expected value. This equals a probability-weighted impact. Averaging such
risks may lead to serious false risk assessments which in turn may lower decision quality
significantly. For example, an expected value of the impact of raw material price volatil-
ity may be close to zero. However, the upside and downside potential (e.g. on a 95%
confidence interval) of price volatility may be important for decision-makers. Related to
low
P
ro
ba
bi
lit
y
of
o
cc
ur
er
nc
e
in
%
Impact in €
medium
high
low highmedium
green green
green
yellow
yellow
yellow red red
red
Fig. 3.14 Risk map
3.4 Assess Key Risk Scenarios
96 3 Creating Value Through ERM Process
the expected value problem, a risk with a very small probability of occurrence and a dev-
astating impact-on-occurrence does not necessarily fall into the “red area” of the risk
map.
In the best case, the verbally anchored scales of the risk map are stored with quantita-
tive values (e.g. “low” with an annual probability of occurrence of 1–20% and an extent
of damage of 0–50,000 €). In the worst case, the verbal risk assessment is not linked to
any quantitative values. Studies have shown that verbal, subjective scales such as “low” to
“high” or “unlikely” to “very likely” are “translated” by people into highly divergent per-
centages, which can make the classification in one of the fields almost unusable (Budescu
et al. 2009). Subjective scales are further subject to many cognitive biases: Hubbard and
Evans (2010) state that individual experiences, overconfidence, confirmation bias and
optimism bias may significantly impact the assessment of probability and impact.
As risk matrices display discrete categories of impact and probability, the resolution
is defined by the number of categories. Cox (2008) concludes that the limited resolu-
tion is an inherent disadvantage of risk matrices. In this sense, the selected scales in risk
maps are too “compressed”. For example, two different risks have annual probabilities
of 0.5% and 19%, respectively. In the above example, both risks are consequently “com-
pressed” to the value 1 (“low”), although both probabilities differ considerably (risk
occurs once every 5 years or once every 200 years). The same applies to the assessment
of the impact. The multiplication of both variables into one expected value leads to a
further compression of the information and thus to very inaccurate (or dangerous) risk
assessments.
Furthermore, the correct risk definition is repeatedly violated in the application of risk
maps. The application of a risk map assumes that a risk can be meaningfully described
by one probability of occurrence and one single impact: The risk either occurs or it
does not occur. And when it occurs, it always does so with the same probability. For the
majority of risks, this probability description is not appropriate or simply wrong. The
example of interest rate risks is intended to illustrate this: Interest rate or currency pair
changes can actually occur with any number of possible values (see the concept of vola-
tility), but not every change is equally probable. Such a risk can no longer be described
as a “risk event” and thus cannot be deducted from the risk map. Here, for example,
a volatility (fluctuation) would have to be depicted using various estimated scenarios.
Many operational risks, such as a machine breakdown, can also be poorly described as
a risk event, as several consequences are conceivable. Furthermore, the risk map usually
only shows the “negative risk”, positive potentials (opportunities) are completely ignored
in most cases.
Further, risk interdependencies are also ignored by the risk map. If, for example, two
risks assessed as “medium” (e.g. “fire causes loss in warehouse” and “interruption of
production process due to loss of personnel”) occur simultaneously due to a hurricane,
they can no longer be assessed as independent events. Such dependencies cannot be
meaningfully modelled in a risk map. Finally, the risk map also reflects challenges that
are only indirectly related to the instrument itself. For example, different practices for
97
developing the final impact of a risk event are observed. Three possibilities are applied in
practice (see Duijm 2015):
• The impact is represented by a risk event causing the worst case scenario and the cor-
responding probability of that event.
• The impact is represented by the most likely consequences (e.g. based on average of
past losses, similar to an expectation value) and the corresponding probability is the
probability that the most likely event occurs.
• The impact is represented by different impact scenarios, each may be in another
impact category of the risk map and the corresponding probabilities are the probabili-
ties that each of those scenarios occur.
Of course, each of those possibilities may lead to different risk assessments. Having said
that, we can draw the following conclusions: Possibility 1 may lead to overly conserva-
tive outcomes, further, less pessimistic scenarios are neglected. Possibility 2 violates our
definition of risk (risk is deviation from expected, the “representative” impact is quite
similar to expected value) and thus may underestimate true risk, companies may face
overly optimistic impact assessments. Option 3 is basically preferable to the other pos-
sibilities in that it also enables addressing different realistic scenarios of the same risk
event. However, this may lead to many entries in the risk map when several events with
several scenarios are considered (see Duijm 2015).
3.4.1.4 Avoid Expected Values as Selection Criterion
As just discussed, in risk maps the individual risks are generally assessed according to
probability of occurrence and impact and graphically represented as expected loss in the
matrix. As simple and understandable as this procedure may seem, the expected values
of the individual risks are subject to considerable limitations. However, expected values
also have meaningful applications if they are used correctly. In the following, this will be
discussed first.
On the one hand, the tangibility and calculation of expected values is relatively sim-
ple. The two variables “probability of occurrence” and “impact” can be derived either
from historical data or expert judgements. Quantifying the individual risks with proba-
bilities and financial impact is in practice very often essential for subsequent aggregation
of the individual risks across individual business areas or hierarchical levels to gain an
enterprise-wide risk exposure. It is thus not adequate to group risks only in risk classes
such as “small, medium and large risks” in order to be able to assess or aggregate them
reasonably later.
A further advantage of applying expected values lies in the option of pooling indi-
vidual risks in order to calculate overall risk exposures at different corporate levels.
Because of the additivity of the expected values (i.e. it is mathematically correct to add
the expected values), the sum of the expected values of individual risks is precisely the
expected value of the overall risk exposure. For example, it may make sense to assess
3.4 Assess Key Risk Scenarios
98 3 Creating Value Through ERM Process
the effectiveness of risk mitigation measures over time on the basis of the overall risk
exposure of, for example, individual business units. The expected value is thus a par-
ticularly useful risk measure if the primary objective of risk management is to assess
the effectiveness of risk mitigation measures to manage risks. Effectiveness in this case
means that average expected losses (sum of all expected values of the individual risks)
are smaller than, for example, in the previous business year.
However, expected value is not a risk measure. The reason for this claim is fairly
simple. We need to recall the definition of “risk”: risks are unexpected, random devia-
tions from planned values. Though, this is in complete contradiction to the risk measure
“expected value”. The expected value of a risk is neither unpredictable nor random—it
is a known factor in advance and is thus by definition not a measure for defining a risk.
From a risk management perspective, the expected (i.e. known) loss must thus certainly
not be the top selection criterion. On the contrary, the potential unexpected deviations
from the expected value, i.e. the distribution of possible losses in a range around the
expected value, are much more relevant. In particular, the worst case scenario may be
completely underestimated (or neglected) by expected values. The expected value merely
provides an indication of the average losses over an infinite period of time. From a com-
pany’s perspective, however, it is of no interest whether it could bear the losses on aver-
age. Rather, the worst deviations from the expected loss that could cause a company to
become insolvent are essential. A simple numerical example is provided to illustrate this.
The two risks X (probability of occurrence of 1% and impact of EUR 10,000,000)
and Y (probability of occurrence of 50% and impact of EUR 200,000) have the same
expected value of EUR 100,000. However, if risk X actually occurs, the impact to be
born is significantly higher than with risk Y. It is thus of no use to a company to survive
on average in the long run. The expected value is not a real risk and underestimates the
relevance of rare, but serious risks. For risks with the same expected value, the risk map
tends to suggest risk neutrality. In practice, however, this neutrality is hardly present,
because decision-makers often care whether they can generate a profit opportunity (loss
possibility) of, for example, EUR 10,000,000 with 1% probability or EUR 200,000 with
50% probability Thus, companies usually behave risk averse in decision-making pro-
cesses, not risk neutral as expected values imply (see e.g. Jonkman et al. 2003).
What do we learn from this insight? In fact, it is very astounding how persistently
expectation values remain in practice as a major decision criterion for risk selection or
risk prioritization. As this is such a crucial aspect to understand the learnings are summa-
rised in the following box.
u Expected value is not a suitable measure for the selection of key risks. It is not
possible to identify risks that could threaten the survival of the company. The
multiplication of probability of occurrence and impact seems simple at first,
the resulting single number (e.g. called risk priority number) can be put into
an easily understandable order. Unfortunately, this method does not increase
decision quality, often the opposite is the case. Expected value fully contra-
dicts with our definition of risk in the ERM approach.
99
3.4.1.5 Prefer Impact Over Probability
In practice, the probability of occurrence of a risk is an indicator often used to distin-
guish between important and unimportant risks. As we have learned, it is often used to
calculate expected values. The simultaneous consideration of probability of occurrence
and impact is probably one of the most widespread approaches for prioritizing risks in
the non-financial industry. The disadvantages of expected values have already been dis-
cussed in detail in the previous paragraph. At this point, we would like to ask whether it
makes sense to consider the probability of occurrence as a criterion to select individual
key risks. It is often seen in practice that very rare risks with a very high impact are not
defined as key risks. In risk maps, the “relevance line” is often set so that very rare risks
are never positioned in the red area. Is this a legitimate procedure? In the following, a
few thoughts are presented that shed a critical light on probabilities as a filter criterion.
Firstly, it is important that decision-makers are aware of all the risks that can have
a significant impact on the company’s objectives. This provides the basis for manage-
ment to fulfil its responsibility to discuss as many risks as possible that could threaten
the existence of the company. In this context, it is irrelevant how high the probability of
occurrence is. It is important to consider whether the company is prepared in the event of
a risk occurrence or whether measures need to be taken if necessary. Of course, manage-
ment can also decide to accept a significant risk, which it considers to be very rare. In
this case, it is a well-informed decision to accept a key risk if the associated potential for
success justifies it. If, however, probabilities are actually used as filters, it can happen that
the management is not even aware of them and thus blind spots arise, which can be very
serious. Very rare risks with a high impact are consequently not discussed at management
level because they are not included in the risk reporting. In the case of a risk occurrence,
it is of little use to the management to refer to the rarity of an event. In this respect, this
procedure can be considered as a breach of duty not to have dealt with all the risks that
threaten the existence of the company (irrespective of the probability of occurrence).
Secondly, it is very difficult to reliably assess probabilities and, depending on the
assessment, this can lead to completely different key risks. People find it difficult to
assess probabilities. In principle, probabilities for risks with which a company has no
experience cannot be easily assessed. In the area of strategic risks, it is thus challenging
to estimate the probability of occurrence as accurately as possible. An example illustrates
the problem attached to that: depending on the probability with which an interviewee
expects a new competitor to appear on the market, this risk becomes a key risk or not.
For example, it may be that a company sets the filter in a risk map at 5% probability
of occurrence for the next year. If a board member now assesses this risk at 3%, it falls
below the threshold and is not reported and discussed as a key risk. However, these 3%
are difficult to verify. It could also be 7% or 10%, which can also be considered plausi-
ble. A mitigation of this problem could be that impact and probabilities are recorded and
reported separately, but the key risk list is only generated on the basis of impacts. The
probabilities would then serve as additional information and a basis for discussion, but
are not an equally weighted selection criterion.
3.4 Assess Key Risk Scenarios
100 3 Creating Value Through ERM Process
A third reason why the probability of occurrence is not a good selection criterion can
be illustrated by the following example. Let us assume our key risk list contains of 25
risks. The risk manager analyses the selected risk scenarios and concludes that each key
risk scenario has a very low probability. For the sake of simplicity, we assume that all
risks have an equal estimated probability of occurrence of 1% (p). In other words, each
risk is expected only once in a hundred years. Are we confident that none of the top risks
will occur next year? Can we inform our board that there will be no unpleasant surprises
next year due to the very low probabilities? Let us assume that the 25 (N) top risks are
uncorrelated. This assumption may be quite realistic, since the risk interdependencies
are already incorporated during the individual scenario developments. What is the prob-
ability that at least one of the rare risks will occur next year? The math is as follows:
1-(1-p)N. If we use our figures (p = 1%; N = 25), we calculate a probability of 22.2%.
This value is relatively high and is usually underestimated in traditional risk management
systems based on individual risk assessments (e.g. by means of risk maps). If we extend
the time horizon to e.g. 5 years (according to the achievement of the strategic objectives),
this probability already increases to 71.5%. In the long term, rare risks are thus very
much to be expected. The lesson here is that very low probability-risks should not be
excluded from the key risk selection process.
u At this point, it is important to understand that probabilities in the ERM
approach are still highly relevant. Probabilities are particularly relevant when
assessing the impact of multiple risks on a particular business objective. For
the selection of key risks, however, we need filters that prevent threatening
individual risks from being excluded or not taken into account in the more
detailed risk quantification. We thus strongly recommend that the key risk list
is primarily based on the impact of risks and that probabilities of risks may be
included in the risk list as additional information, if available.
3.4.1.6 Distinguish Between Key and Non Key Risks
We have reached the culmination of the first and important process step of risk identifi-
cation. We remember that the aim was to create an overview of key risks. This list is the
first important outcome, which is then subjected to a quantitative scenario assessment
in a subsequent step. The assessments of the individual impacts are to be deemed provi-
sional. They have only helped us to distinguish between key risks and non-key risks (see
similar Segal 2011, pp. 151–152).
The following figure shows a corresponding procedure. It shows an excerpt of pes-
simistic risk scenarios of a company in relation to the defined EBIT target. The expected
EBIT amounts to EUR 5 million. All significant deviations from the plan are thus of
interest, which is in line with our risk definition. If a risk scenario has a loss potential
higher than EUR 2 million, it is taken into account in the further risk analysis. It is thus
included in the key risk list. As you can see from the chart, probabilities of occurrence
are missing. If these were already collected during risk identification, they could be
101
added as a supplement to the individual risk scenarios. In our approach to risk identifi-
cation presented so far, however, we have deliberately refrained from collecting prob-
abilities. These will only become relevant in the subsequent quantitative risk scenario
development Fig. 3.15.
Remember that a risk database must be populated also with all non-key risks to cre-
ate a so called “watch-list”. This list can be provided as a supporting tool for operational
risk management or internal control systems. In addition, all non-key risks shall be mon-
itored on a regular basis in order to recognise emerging key risks as early as possible. It
is assumed that only a few watch-list risks will qualify as key risks at later points in the
future. Nevertheless, as business models can change quite quickly due to e.g. changes in
customer needs, some risks deemed minor can become strategy-relevant later on.
At this point, it is important to note that the key risk list per se is not yet an instrument
relevant to decision-making. One could say that in traditional risk management such a
list is often the key result of the risk management process. From a modern ERM perspec-
tive, this list should be understood as a kind of database in which risks are collected and
adjusted over time. Only the subsequent quantification of the individual risk scenarios
and the integration into decision-making processes provide the desired added value of
ERM.
3.4 Assess Key Risk Scenarios
RScen1
4 –
-6 Mio €
Key Risk
3 –
2 –
1 –
0 –
-1 –
RScen2 RScen3 RScen4 RScen5 RScen6
-3.5 Mio €
Key Risk
-3 Mio €
Key Risk
-2 Mio €
-1.5 Mio €
-1 Mio €
EBIT Plan
(5’000’0000 €)
Filter
(3’000’0000 €)
Fig. 3.15 Key risk scenarios
102 3 Creating Value Through ERM Process
u The mere creation of a key risk list as the basis for risk reporting to manage-
ment and the Board of Directors does not provide any added value. The risks
on this list are merely isolated individual risk assessments that are not (yet)
included in decision-making processes.
3.4.2 Quantify Key Risk Scenarios
The next step in the ERM process is a quantitative risk assessment of all key risk sce-
narios. Its aim is to reflect the uncertainty associated with key risks as holistically and
realistically as possible. Only quantification makes a meaningful comparison of differ-
ent risks and opportunities possible. However, a misunderstanding must be cleared up
at this point: It is not a question of “calculating” a precise truth with risk quantifica-
tion. We all know that this is not possible because nobody can predict the future exactly.
With the help of reasonable evaluation methods, however, we can express the degree of
uncertainty more objectively and transparently than will ever be possible with qualita-
tive methods. It is thus not a question of producing illusory precisions, but of developing
“ranges of uncertainty” on the basis of plausible quantitative risk scenarios.
As discussed previously, an ERM programme must assess all risks (independent
of their source) with the same care. In particular, strategic risks are often not assessed
quantitatively in practice. Practitioners often claim that the complexity of risks or their
sources and a lack of data impede quantitative risk assessments. However, this translates
to the following important statement:
u ERM programmes that quantify only financial risks and (partially) operational
risks, but assess “non-quantifiable risks” (strategic risks) only qualitatively, fail
in making reasonable statements about how risk exposures may impact busi-
ness objectives. This in turn impedes the supporting role of ERM in risk-ori-
ented decision-making. It is thus strongly recommended to adopt an ERM that
is methodologically capable of assessing all risk categories quantitatively.
The problems of pure qualitative risk assessments are manifold and have already been
addressed in previous paragraphs. However, it is also important to notice that quantitative
assessment methods are not per se superior to qualitative techniques because they look
more complex, mathematical and “accurate”. In practice, quantitative models are often
incomplete and neglect relevant risks, particularly strategic risk where data availabil-
ity is scarce. Interestingly, operational risks at lower hierarchical levels and specifically
financial risks are usually quantified using state-of-the-art stochastic methods. Hubbard
(2009) calls this observation in practice a “risk paradox”: relevant, strategic risks are
often assessed by qualitative, simple scoring methods, whereas operational low-level
risks are often included in quantitative risk models (p. 174).
103
Furthermore, data quality is crucial for the quality of quantitative analysis: the finan-
cial crisis has clearly shown that model assumptions based on classical financial market
theory can not withstand reality. Extremely rare, but devastating scenarios have been reg-
ularly underestimated (so-called tail risks). Stochastic models require a sound data basis,
which is often not the case, specifically in the area of strategic and operational risks. As
a consequence, either unrealistic scenarios are estimated or some risks are completely
ignored. Finally, it is questionable whether complex stochastic models are actually
applied correctly in practice and understood by management. These “black box” models
are often difficult to communicate to decision-makers and cannot be understood without
appropriate know-how (Hunziker 2018, pp. 18–19).
The critical question now is, which approach shall we present in this textbook on risk
quantification? There are many good textbooks on stochastic risk modelling available.
However, the procedures and approaches recommended in these books do not (at least
not yet) seem to prevail in the non-financial industry. From a practical point of view, this
can have several (partly false) reasons:
• Stochastic risk modelling is reserved for the financial industry, the methods are not
transferable to non-financial risks.
• The procedure is considered too complex, one is content with simpler methods that
are easier to understand (e.g. qualitative risk management).
• Data is missing so that appropriate models can be created.
• The maintenance of such models is often considered too complex.
• The benefits of quantitative approaches are called into question because it is assumed
that models are fundamentally wrong (the image of quantitative risk models has suf-
fered at the latest since the financial crisis).
• The basic assumptions of normalised returns are increasingly criticised; correspond-
ing statistical distributions no longer correspond to reality.
Two questions at this point arise: What information should risk quantification be based
on? Should stochastic or deterministic risk scenarios be quantified? Risk quantification
is based on the principle of using the best available information, depending on the risk
category. These can be historical data as input for the assessment of financial risks or pri-
marily expert assessments in the area of strategic risks. Thus, the quantification approach
discussed in this textbook combines different data sources within the scenario quantifica-
tion approach. Pure stochastic modelling as input for risk simulation is not used for the
aforementioned reasons.
Subject matter experts who are “closest to the risk” in the company are explicitly
included in the risk assessment (as they already have been in the risk identification pro-
cess). A properly performed risk quantification with the risk manager as enabler and
discussion facilitator together with board members, business, divisional and department
heads usually leads to more reliable (tail) scenarios than a pure stochastic evaluation
based on (often insufficient) historical data. Moreover, a deterministic risk assessment
3.4 Assess Key Risk Scenarios
104 3 Creating Value Through ERM Process
approach which is based mainly on expert judgements rather than relying solely on pure
stochastic (black box) models supports the acceptance of ERM and enhances an appro-
priate risk culture.
In the following, we learn why quantified risk models still matter, how to effectively
develop quantified risk scenarios and how to (not) aggregate single risks which may have
a simultaneous impact on a specific business objective.
3.4.2.1 Why Risk Quantification Matters
As already touched on, criticism of risk modelling has increased considerably in recent
years. There is now a long list of counterarguments why companies should not use quan-
titative risk models. However, it still remains to be clarified what might be better alter-
natives. Unfortunately, there are no such alternatives as we learn in this textbook. An
excerpt of the opponent’s list why risk models could fail are briefly listed here:
• The past has shown that risk models are wrong. So are they in the future.
• There is no or too little data available for such models. The quality of the models is
thus poor.
• Nobody understands risk models, in the best case the risk manager him- or herself.
• Risk quantification and subsequent risk aggregation produce false accuracies, hence a
qualitative evaluation must be better.
• Risk models fail due to effort and complexity.
• Basically, human experience and intuition is stronger than risk modelling
• Garbage in, garbage out as a killer argument
Taking into account the above arguments, we believe that opponents of risk models
sometimes have false ideas about what they can or cannot do. At this point, we would
like to clarify this and argue that there are currently no approaches superior to risk mod-
elling (see similar Rees 2015, pp. 91–92). First of all, we need to consider why a com-
pany should be concerned with risk models at all. Principally, quantitative risk models
deal with situations (expectations about the future) that cannot be perfectly understood
or anticipated because they are subject to uncertainty (risk). If this uncertainty did not
exist (e.g. regarding the net present value of a strategic project), risk models could be
entirely ignored. Of course, if a company is not willing or able to develop meaningful
assumptions regarding risk causes and risk interdependencies in the form of scenarios,
risk models do not make sense either. They do not replace the skills of developing realis-
tic assumptions of how the future might unfold.
We all are aware today that risk models are a simplification (in some cases, an over-
simplification) of the reality and that quantified risk assessments are never accurate or
only coincidentally correct (because they deal with the future). They ultimately reflect
opinions and assessments of subject matter experts, partially combined with historical
data where available. In this sense, the killer argument that all quantitative risk models
are wrong by definition is perfectly correct.
105
However, companies should accept that skilfully led discussions during risk assess-
ment interviews or workshops are often very fruitful. The process of discussing and
creating a quantitative risk model is often more useful than the (false) outcome per se.
During this process, assumptions are questioned, new views and ideas generated, new
discussions initiated and possible future risk potentials identified and assessed more
systematically. Quantification sometimes requires uncomfortable transparency, which
is, however, much more important as a basis for discussion than qualitative (verbal, use
of qualitative scales) assessments. Figures are not subject to interpretation. No matter
whether they are wrong or correct, they are the better basis for fruitful discussion.
Hiding or concealing vaguely formulated risk assessments is no longer easily possi-
ble. Consensus amongst management ultimately represented in the quantified risk model
serves as an important decision-making basis and promotes further discussions regard-
ing model assumptions and risk appetite confrontation. An aggregated model which is
totally implausible to management can also show that there is something wrong with the
assumptions about the future. For example, a risk model that displays a new strategic
option (e.g. new market entry) as a risk simulation result only with positive, profitable
scenarios would probably have to be critically questioned (maybe the true downside risk
has not been fully reflected in the model).
ERM can only be linked to value-based management if quantified risk scenarios
are available. An integration of ERM into strategic planning, budget processes or other
decisions is only possible if there is a common ground, usually this is the connection
with financial performance management. Qualitative risk management clearly fails in
this case. In the context of multi-scenario planning, which may credibly reveal risk and
opportunity impacts on objectives, qualitative risk management is not relevant.
The quantification of risk scenarios primarily enables transparency, a sound discus-
sion basis, prioritisation and comparison with other risks. It also supports the identifica-
tion of risk interdependencies and objective-based risk aggregation. It forces companies
to think through a risk scenario holistically and to check its plausibility by means of
quantification. If risks are classified purely verbally or only in rough risk classes, the
underlying scenario development is often carried out relatively imprecisely and too
broadly.
u Peter Drucker is credited with one of the most important quotes in busi-
ness management. “If you can’t measure it, you can’t improve it.” This quote
is specifically true also for ERM. If companies are reluctant to express their
uncertainty attached to business objectives quantitatively, then they can not
possibly improve risk-based decision-making.
In summary, we are convinced that modern ERM is only possible on the basis of quan-
titative risk assessment. It is important to understand that risk quantification is only
a small but crucial part of the ERM puzzle. Properly understood and applied, risk
quantification creates the best possible discussion about uncertainty in the future.
3.4 Assess Key Risk Scenarios
106 3 Creating Value Through ERM Process
Incorrectly applied, it leads to little credibility and a high potential for frustration. In
practice, it is now a question of reducing these hurdles through the success stories of
companies that benefit from quantitative risk management. Risk quantification outside
the financial industry is still very critically assessed or partially demonised in prac-
tice. It is a well-researched subject area that has been waiting for years to diffuse into
practice. This textbook encourages students to perhaps introduce this approach later in
their professional lives, or at least to take a positive stand for it.
3.4.2.2 Develop Quantitative Key Risk Scenarios
At this point, it makes sense to clarify precisely what we mean by quantitative scenario
development. In particular, questions of how this approach differs from other risk assess-
ment methods in the area of risk management or common corporate planning and budg-
eting. First, we want to differentiate quantitative risk analysis from simple sensitivity
analyses applied in budgeting processes. In practice, it is usually put forward that finan-
cial plans and budgets are supplemented with a pessimistic (lower bound, e.g. 90% of
planned values are achieved) and optimistic (upper bound, e.g. 110% of planned values
are achieved) “risk” scenario, and that risk analyses thus has been already applied.
Although such simple sensitivity analyses have their legitimacy, they are subject to
some significant disadvantages from an ERM point of view (see similar Rees 2015, p. 89):
• Very pessimistic or very optimistic scenarios (extreme values) are often not incorpo-
rated, thus such plans usually cover only a part of the entire risk distribution.
• Usually, no probability assumptions are included in such sensitive analyses, thus no
comparisons can be made with the risk appetite statements (if appropriately defined)
and no probabilistic risk aggregation can be performed. Moreover, it remains unclear
how much uncertainty is attached to the different scenarios.
• It is not clear if the lower and upper bounds (sensitivities) comprise only true risks or
whether the plan could be optimised by simple management decisions.
• The expected value of the plan is unknown. Expectation values usually differ from the
most probable outcome (which is the plan).
• The different risk sources which may impact the plan are not fully known and are
separately identified and recorded.
Now that we have briefly clarified that sensitivity analyses are no substitute for genuine
risk quantification, we would like to briefly address the traditional risk quantification by
means of probability of occurrence and impact. As previously discussed, several prob-
lems are attached to that simple procedure. The majority of the risks cannot be com-
prehensively described as “single risk events”. For example, it is obvious that interest
rate changes, oil price fluctuations, fluctuations in sales, market entry of competitors and
many more risks can have different consequences. Even risks that are supposedly consid-
ered as binary risk in practice (either risk event occurs or not) are more complex in fact.
A risk of a machine breakdown can manifest in different states, e.g. only one machine
107
break down for a very limited time with minor consequences or several machines have a
more significant defect at the same time which leads to production downtimes. These dif-
ferent states are called “risk scenarios”.
u The basic idea with scenario development is to produce a robust and reliable
range of the most relevant possible future states of the same risk. In many
cases, it is not possible to define only one state of a risk, assuming a risk has
exactly one probability of occurrence and exactly one impact. Thus, we need
to develop so called “risk distributions” which cover very pessimistic, but also
very optimistic scenarios and some scenarios in between with different prob-
abilities of occurrence attached to every scenario.
Another reason why there is need to fully quantify all future risk states, independent of
their source, is due to integration purposes. In order for risk management and corporate
planning to be integrated, a common ground must be found, i.e. risks must be quanti-
fied. A true integration of risk management and corporate planning can only be achieved
through linking the financial impacts with financial plans. This enables that plan devia-
tions caused by potential risks can be made transparent and visible. These potential
deviations should be discussed by management and can either be accepted (if within
risk appetite or if corresponding upside potential is high) or actively manage toward an
acceptable level (if risk appetite is exceeded). In other words, quantitative risk scenarios
ultimately support decision-making processes.
As previously mentioned, risk scenario analysis is a practical, highly effective tool to
conduct risk assessments. It supports the identification of cause-and-effect chains when
thinking through individual scenarios and thus incorporate interdependencies (correlations)
with other risks (e.g. a volcanic eruption scenario leads to an economic downturn which in
turn leads to a loss of sales which ultimately reduces free cash flow in year 201X).
The question at this point is: How many risk scenarios per risk have to be developed
to produce a “robust risk distribution”? The answer is not straightforward and is related
to our deterministic risk assessment approach. Let us assume that we assess the risk of a
new competitor entering the market. We have already captured the very pessimistic sce-
nario as part of the risk identification process and assessed it with a rough loss potential.
It qualified as a key risk and thus is considered for detailed quantitative risk scenario
development. The following example is the result of an interview with a strategic man-
agement representative. It describes a quantified, very pessimistic risk scenario with a
probability of occurrence attached and an EBIT amount in EUR.
Example
Mr Grob (risk manager) and Ms Frozen (strategic management representative) devel-
oped during the risk quantification interview the following very pessimistic risk sce-
nario: Next year, a new competitor will enter the market that can take market shares
of up to 40% from us next year and 20% the year after next. After three years, our
3.4 Assess Key Risk Scenarios
108 3 Creating Value Through ERM Process
innovative products, which are currently in the development phase, will enable us to
push this competitor out of the market again. Based on my industry experience, this
can happen with a probability of 3%. If we lose 40% and 20% of market share in the
next two years, this would have a cumulated negative impact on revenues (EUR -5
million), but also a positive impact on costs (less personnel needed, EUR +1 million).
Ultimately, EBIT of this product line is reduced by EUR 4 million.
The next step is to quantify the very optimistic scenario in the same way. Three different
quantified scenarios are then available:
• Very pessimistic scenario (probability of occurrence <probability of plan)
• Plan (no real risk scenario as it is expected).
• Very optimistic scenario (probability of occurrence <probability of plan)
From a stochastic perspective, these three scenarios could be input parameters for a so-
called triangular distribution. However, since we do not use stochastic distributions, we
use these three risk scenarios as deterministic individual risks that must be drawn mutu-
ally exclusive in a simulation model. All three scenarios have their own, pre-defined
probability of occurrence. We assume for simplicity that the planned values are in line
with expected values. In practice, plan values often correspond to the values that are
most likely to be realised. This makes sense from a management perspective. It is coun-
terintuitive from a planning perspective not to plan with values from which it is assumed
that they have the highest probability of realisation. However, such plan values are not
identical with (statistical) expected values. The consideration of probability-weighted
risk scenarios can lead to a deviation from planned values (based on most likely cases)
and expected values of the plans (after simulation). In principle, this probability-
weighted deviation could then flow back into the planning and lead to an adjustment of
the planned values. In an ideal world, this would be the best approach. The more prag-
matic view is to accept this “statistical error” and to leave plan values as they originally
came about: as the most probable values.
From a logical perspective, it makes no sense if the individual risk scenarios of one
risk have a higher probability of occurrence than the plan. In this case, it can be assumed
that the plan is unrealistic (perhaps too optimistic, but certainly not in line with expec-
tations). However, it may well be that the probability of occurrence as the sum of all
risk scenarios is higher than the plan. This can also be easily checked for plausibility: In
practice, the uncertainties associated with planning are so high that it is very likely that
the planned value will not be realised. Or to put it another way: the probability that the
plan can be executed 100% perfectly is extremely small.
From a risk perspective, it is certainly crucial to know the very pessimistic sce-
nario and to compare it with an optimistic risk scenario (risk-reward management). As
a rule, however, these two deviations from the plan are not yet sufficient to anticipate
the future as comprehensive as possible. Often there are one or two less negative or less
109
positive scenarios that are very realistic. For example, a less pessimistic scenario could
be developed by Ms Frozen regarding the potential competitor entering the market: the
competitor enters the market, but can only take 15% of the market share from us in its
launch phase, but cannot establish itself in the market in the longer term. After one year,
the competitor will have disappeared from the market again. In this case, EBIT is only
reduced by EUR 2 million.
Figure 3.16 shows the previously discussed risk of “competitors entering the market”
in five different scenarios. The risk manager developed and evaluated these scenarios
together with the strategic management representative (or anybody else close to the risk).
The figure also shows that the five scenarios “imitate” a discrete statistical distribution.
The middle scenario corresponds to the plan; the two scenarios to the left and right of it
are probability-weighted deviations from the plan. The dashed line indicates that these
five scenarios do not represent a continuous distribution, but that the deterministic sce-
narios represent individual “events” from this distribution.
Of course, this type of deterministic risk modelling must also be viewed critically.
Quantitative risk modellers will highlight some points why this approach might be prob-
lematic. Let us reconsider the above example of the risk of a market entry. Let us further
assume that we have quantified this risk by the means of five discrete risk scenarios, as
shown in Fig. 3.16:
• Very pessimistic scenario, probability 5%, impact −EUR 4 million on EBIT
• Pessimistic scenario, probability 20%, impact −EUR 2 million on EBIT
3.4 Assess Key Risk Scenarios
10% –
3%
Probability of
occurrence
Impact (EBIT)
20% –
30% –
-2’000 -1’000 0 1’000 2’000 3’000 4’000 5’000
– – – – – – – –
5%
20%
Plan
Budget
52%
20%
Downside Risk Upside Risk
Fig. 3.16 Example of quantitative scenario development
110 3 Creating Value Through ERM Process
• Plan (no real risk scenario as it is expected), probability 52%, impact EUR 0 (plan
perfectly achieved)
• Optimistic scenario, probability 20%, impact +EUR 1 million on EBIT
• Very optimistic scenario, probability 3%, impact +EUR 2 million on EBIT
The individual probabilities of all scenarios must add up to 100%, otherwise we create
a logical error. Why is this the case? Firstly, the four probabilities of the risk scenarios
(deviations from plan) add up to 48% (5% + 20% + 20% + 3%). The conclusion based on
that is that there is a 48% probability that the estimated impacts on EBIT are either −4,
−2, +1, +2 EUR million. So there is still a 52% probability that no risk scenario occurs.
Quantitative risk modellers could argue that this discrete risk distribution does not
provide any information about the remaining 52% probability that no risk scenario
occurs at all. However, for pragmatic reasons, we may assume that this remainder of the
100% (i.e. 52%) corresponds to the probability of achieving the plan. This can be justi-
fied by the assumption that the plan should have the highest probability of occurrence
compared to all other single risk scenarios.
One might further argue that it is too simplistic or simply wrong to assign a probabil-
ity of occurrence to one deterministic outcome (impact on EBIT). From former statistic
courses, you may probably be familiar with continuous distributions and their character-
istics. Specifically, the probability of a realisation of any specific value in the distribu-
tion under investigation is defined as the integral of the probability density function over
that data set. The integral of a real valued continuous distribution over one specific point
(one specific value) equals zero. Thus, we face the situation that an outcome equal to any
particular point (our deterministic risk scenario) of the sample has a probability of occur-
rence of zero, but is in fact not an impossible outcome (Levine 2015, pp. 8–9).
What does that mean for our example with five discrete risk scenarios? With statis-
tics about continuous distributions in mind, the probability of occurrence of a discrete
risk scenario to occur is zero. This is definitely counterintuitive of how we developed
that scenario: We assigned for example a probability of occurrence of 5% for the very
pessimistic scenario. How can we resolve this apparent contradiction? In practice, risk
management must provide a realistic and reliable distribution including very pessimis-
tic scenarios and very optimistic scenarios, thus a mapping of a realistic full range of
a risk. The single estimated impact numbers (e.g. −EUR 4 million on EBIT) are not
meant to be precisely true, but rather represent some meaningful averages of—in an ideal
world—mutually exclusive impact intervals which in sum cover the full range of poten-
tial impacts:
• Very pessimistic scenario, probability 5%, impact interval −EUR 4 – −EUR 3 mil-
lion on EBIT
• Pessimistic scenario, probability 20%, impact −EUR 2.9 – −EUR 1 million on EBIT
111
• Plan (no real risk scenario as it is expected), probability 52%, impact EUR −0.9 –
+EUR 0.9 (plan perfectly achieved)
• Optimistic scenario, probability 20%, impact +EUR 1 – +EUR 1.9 million on EBIT
• Very optimistic scenario, probability 3%, impact +EUR 2 million or more on EBIT
With these five different scenarios, we have basically fulfilled the MECE principle devel-
oped by Barbara Minto in the late 1960s: The scenarios are mutually exclusive and col-
lectively exhaustive. In other words, the scenarios defined in this way do not overlap
and together contain all possible future impacts of a risk (i.e. the “full range” defined by
the subject matter experts). From a simulation perspective, one of the five probability-
weighted risk scenarios could now be chosen randomly. Within the chosen scenario’s
interval (e.g. −EUR 4 – −EUR 3 million), a pre-defined statistical distribution (e.g. tri-
angular distribution) could determine a discrete impact value (e.g. −EUR 3.35 million).
Quantitative risk modellers would certainly be more satisfied with this approach than
with our simpler, deterministic modelling approach. From a purely statistical point of
view, this approach would definitely be preferable. Ranges of impacts are defined prop-
erly and the assignment of probabilities of occurrence is logically consistent (Levine
2015, p. 9). But we would like to remind ourselves again why we accept to annoy the
purists of statistical modelling with our simplistic approach:
• We do not want to create “black box” models which only risk managers understand.
Thus, we rely on assessments of subject matter experts, supplemented with data if
available. Our deterministic quantification approach is intuitive and can be understood
by decision-makers. Stochastic models often cause discomfort and are not supportive
of the company’s risk culture.
• In many cases, subject matter experts can assess “risk distributions (i.e. probability-
weighted full ranges of potential risk impacts)” more realistically than available sta-
tistical distributions can (e.g. the normal distribution regularly underestimates tail
risks).
• The simplicity of the deterministic approach is its strength: it does not require pre-
defined distribution functions for every different risk scenario. The “statistical” distri-
bution emerges from the scenario development itself.
• Ultimately, it is all about guessing at the most realistic possible range of each indi-
vidual key risk that can provide a solid basis for decisions. It is of lesser importance
that, from a theoretical point of view, a deterministic scenario cannot occur exactly
with the probability estimated by the expert. A certain theoretical statistical inaccu-
racy, which is undoubtedly associated with our approach, is consciously accepted for
pragmatic reasons.
3.4 Assess Key Risk Scenarios
112 3 Creating Value Through ERM Process
3.4.2.3 Store Key Risk Scenarios in a Database
This step brings us to the end of the assessment of all key risk scenarios. Once the key
risks have been identified and quantified using the scenario technique, the following
information is available for the next step in the ERM process:
• Very pessimistic, pessimistic, optimistic and very optimistic scenarios were devel-
oped for each risk. The planned value (expected scenario) is also available. Please be
aware that for some risks, the optimistic and very optimistic scenarios do not exist (no
upside potential).
• All scenarios were described verbally by means of plausible cause-effect stories. Care
was taken to develop scenarios that are as precise and complete as possible and do not
allow any room for interpretation. In practice, risks are unfortunately often described
on a too summarised and too aggregated level.
• All scenarios have been assigned a probability of occurrence. The probability of
occurrence must be defined consistently. It corresponds to the “holding period” of the
risks and is often one quarter or one year in many industrial companies.
• Impact values must be consistently related to relevant performance measures. The
best available measure would be internal company value. Only internal company val-
uation (i.e. discounted cash flow approach) is capable of capturing all future (includ-
ing long-term) risk-related impacts. In reality, however, short-term measures such as
EBIT or net profit will be more relevant, as many companies do not conduct internal
company valuations. A good alternative to the often missing internal company value
is the analysis of the impact of risks on at least the next three expected operational
financial figures (e.g. EBIT). This also allows risks that may have an impact beyond
one year to be assessed meaningfully.
This information on all quantified risk scenarios must be easily accessible and stored.
Simple software applications such as MS Excel are sufficient at this point. Table 3.1
illustrates an example of how relevant quantified risk scenario information could look
like.
Is this information collected by the ERM process already sufficient to support the
subsequent ERM step “decision-making” in a reasonable way? Have we overlooked
something? What about interdependencies between all individual risk scenarios? In order
to make appropriate decisions, do we need to calculate the correlations between indi-
vidual risks? And if so, can we even calculate these correlations without historical data?
Assuming we have identified 50 individual risk scenarios, we would have to estimate
1125 correlations ((50*50–50)/2). Have we thus discovered a problem that fundamen-
tally questions our simple, man-made deterministic scenario approach? The good news
is: No. Although assessing correlations is important in our approach, it is not crucial. The
reasons for this are as follows (see similar Segal 2011, pp. 208–215):
113
• The past has shown that historical correlations do not have a good predictive power
for the future. Calculating historical correlations with partly insufficient or outdated
data often leads to a false accuracy that has little to do with reality. Overall, the qual-
ity of the ERM model is not primarily dependent on individual accurate correlation
coefficients. Exact correlations play a subordinate role in our ERM approach.
• Most positive correlations are already included in the scenario development. Cause-
effect chains contain individual risks, which in turn trigger other risks. Hence, we can
conclude that within scenarios various individual risks have been linked by positive
3.4 Assess Key Risk Scenarios
Table 3.1 Quantified risk scenario database
Key risk Key risk scenario Verbal description Probability
(Per Year)
Impact (EBIT)
1. Competitor
Risk
1.1 Very
pessimistic
Next year, a new competitor
will enter the market that can
take market shares of up to
40% from us next year and
20% the year after next….
3% −EUR 4 million
1.2 Pessimistic Next year, a new competitor
will enter the market that can
take market shares of up to
20% from us next year and
10% the year after next….
20% −EUR 2 million
1.3 Plan No competitor entering the
market (expected)
54% EUR 0
1.4 Optimistic Competitor enters, but is
unable to succeed in the mar-
ket and exits after 1.5 years
again. Our company will be
able to position itself a little
better than before, which will
lead to a moderate increase in
sales over the next two years
20% +EUR 1 million
1.5 Very
optimistic
Competitor enters, but is
unable to succeed in the mar-
ket and exits after 6 months
again. Our company will thus
emerge stronger and be able
to position itself even better,
which will lead to a signifi-
cant increase in sales over the
next three years
3% +EUR 2 million
2. Interest
Rate Risk
2.1 …. …. …. ….
114 3 Creating Value Through ERM Process
correlations. These links were developed on the basis of plausible “risk stories” by
experts and not on the basis of historical data.
• However, some correlations may still exist between the key risk scenarios. For our
purposes, it is sufficient to roughly determine whether and in which direction indi-
vidual scenarios correlate. If two scenarios correlate completely positively (+1), they
can be combined into one scenario. If two scenarios correlate partially positively or
partially negatively (+0.5; −0.5), this can be taken into account in the subsequent risk
simulation via an adjustment factor. If scenarios do not correlate (0), nothing needs to
be done. Such adjustment factors (+0.5; −0.5) could be incorporated in Table 3.1 as a
separate column.
• Generally, experience shows that most key risk scenarios are not interdependent at all
(0). In fact, assessing correlations at the key risk scenario level is not a daunting task
as one might first suspect.
With this information at hand, we can now take the next important step in the ERM pro-
cess: We use all the quantified risk scenarios to support decision-making processes in the
best possible way.
3.4.3 Support Decision-Making
As already mentioned, the most important benefit of ERM is improving the quality of
decisions under uncertainty. ERM has to actively support decision-making processes by
creating a balance between management intuition and rationality provided by risk man-
agement. Often, however, ERM programmes are too concerned with simple risk minimi-
zation and isolated risk reporting, lack the link to real decision-making processes, and
hence miss to add value to the company and its stakeholders. Modern, effective ERM
aims at enhancing management confidence in achieving objectives, making uncertainty
transparent and supports rational, risk-based decision-making.
Only if ERM is fully integrated in the decision-making processes of the organisation,
we can even refer to it as a “positive risk culture”. The Swiss Post for example defines
this relationship in its risk policy as follows: “the risk management makes […] an impor-
tant contribution to decision quality and to increase the value of the company.” And the
Chief Risk Officer of the Gotebank concluded a few years ago: “one of the things we
have been struggling with over the last couple of years is how best to integrate mean-
ingful high-level risk information into the strategic planning process. […] The reason,
why the risk management function is called ‘strategic’ is that the purpose should really
be top-level coverage.” Both statements point to the importance of ERM integration
(Hunziker and Meissner 2017, p. 52).
115
In the following paragraphs, we discuss a few important preconditions of integrat-
ing risk information into decision-making processes and provide examples of how ERM
information can be effectively visualised and integrated into strategic decisions and busi-
ness planning.
3.4.4 Differentiate between Decisions and Outcomes
In practice, there is a latent danger of confusing a good or bad decision (high or low
decision quality) with a good or bad outcome of a decision. Among other things, this can
lead to wrong conclusions regarding the performance and quality of a risk assessment.
Interestingly, not only are good decisions often equated with good results internally, but
also externals such as politicians, consultants or journalists tend to differentiate too little
between decisions and results (see similar Spetzler et al. 2016, p. 6).
Assumption a strategic decision to enter a new market leads to a negative result. The
market launch has failed, which corresponds to the quantified worst case scenario dur-
ing the risk assessment process. Has this wrong decision been made based on our ERM
approach? If risk assessment was carefully created, and risk-reward profile presented by
risk manager led to a rational decision (which lies within risk appetite), decision was not
based on our ERM approach. The decision was correct, although the result is obviously
negative.
The quality of a risk assessment in practice must be evaluated at the time the decision
is taken. The reason for this is simple: decisions can be fully controlled by management,
risk-related scenarios that occur as a result of this decision can no longer be controlled.
Unfortunately, reality often looks different: in retrospect, supposedly incorrect or inad-
equate risk analyses are used to justify poor results. This would only make sense if there
were no uncertainty associated with the decision. And we know that in the vast majority
of cases, this is an unrealistic assumption in the business environment.
3.4.5 Overcome the Regulatory Risk Management Approach
One of the most dangerous obstacles to value-creating risk management is the exclusive
adherence to a defensive, regulatory risk management approach. What does that mean?
Traditionally, many risk management systems have been designed to comply with cer-
tain legal regulations, such as KonTraG in Germany or the Swiss Code of Obligations in
Switzerland. In order to facilitate the legally compliant implementation of risk manage-
ment, frameworks and standards such as COSO ERM or ISO 31000 are used. In many
cases, consultants are engaged to implement or optimise risk management so that the
legal requirements are met.
Regulatory risk management thus means that the risk management process and the
resulting reporting primarily serve to comply with external requirements. Regulatory risk
3.4 Assess Key Risk Scenarios
116 3 Creating Value Through ERM Process
management is usually defensive risk management. The dominant focus is on security
and avoidance of errors and risks. Risks are treated negatively in the sense of “what can
go wrong?” They are to be minimised or transferred as far as possible. Of course, defen-
sive risk management is of high importance for corporate management in order to prove
that risks are systematically identified and evaluated and that it complies with law. Under
certain circumstances, this may eliminate personal liability of decision-makers. The deci-
sive question in this case is whether the relevant information and risks have been ade-
quately taken into account at the time of the management decision. Such regulatory risk
management systems are often isolated, independent processes that are not coordinated
with decision-making processes.
It thus becomes clear that regulatory risk management is important and can pro-
tect decision-makers to a certain extent. Every risk manager should thus be familiar
with country-specific laws and requirements and take them into account accordingly.
However, such a regulatory risk management approach is not sufficient to increase the
quality of decision-making in a company. A number of steps need to be taken to achieve
this, which are briefly listed below. The list is by far not complete, but in practice they
are often the most important levers for shifting from regulatory risk management to
value-creating ERM.
• Management assumptions and corporate strategy are regularly challenged by risk
manager
• Risk is redefined: risks are uncertainties which can have an upside potential, too.
• Risk manager is welcomed at the strategy table
• Integration of risk information at the time decisions are taken
• Alignment of risk management process with strategy development and strategy
execution
• Quantification of all risks, independent of their source
• Focus is on strategic risks, not on operational and financial risks
• Focus is on management of objectives, not on isolated risk management
• Risk management is understood as a service for decision-makers, not as a cost-burden
The fulfilment of these requirements serves as an important basis for shifting from a
defensive, regulatory risk management approach to a decision-relevant ERM programme.
3.4.6 Overcome the Separation of Risk Analysis and Decision-
Making
Specifically in medium-sized and larger companies, decisions are made at management
level, however, necessary risk-relevant information is often processed at lower hierar-
chical levels and is thus separated from decision-makers. This separation increases the
risk of management relying primarily on intuition, personal preferences and experience,
117
although more rational information could be used to support decision-making. This
“decision opacity” may well be desired by management. For example, management
may prefer very simple, qualitative risk assessments that do not reveal or even disguise
the “true” risk exposure. The reason for this depends on the outcome of the decision:
If a decision leads to a positive outcome, it is often justified with high “management
quality”. However, if the result is unfavourable, poor and incomplete risk analyses from
lower hierarchical levels can be held responsible. The following example illustrates such
a case:
Example
A major manufacturer of medical products has to decide what its product portfolio
should look like in the future. Management is aware that the strategic risks can result
in a complete failure of the chosen strategy. Thus, the decision to introduce a new
product line for medical implants must be subject to careful risk analysis. The risks
and opportunities are discussed in a management meeting. The management comes
to the conclusion that the new product line should be introduced. Based on their expe-
rience, the decision-makers assess the expected returns significantly higher than the
associated market risks.
Specific risk-relevant information from the risk manager was not taken into
account for this decision. The risk manager is not a member of the management team
and is not directly involved in relevant decisions. The half-yearly risk reporting to
management and the board does not take place until two months later. By then, the
risk manager will probably have taken notice of this strategic decision and included
the risk in the risk inventory.
Risks at this company are assessed qualitatively on a scale of 5 with probability of
occurrence and impact. These measures are used to calculate an expected risk value.
The reason for qualitative risk management is that strategic risks in particular are
deemed not quantifiable due to their high complexity.
A few months after the introduction of the new product line, management has
to admit that it made the wrong decision. The market was incorrectly assessed and
the sales figures remained well below expectations. The market launch of the medi-
cal implants was a complete failure. The reason for the wrong decision was quickly
found: The risk was wrongly and inaccurately assessed by the risk manager. The
expected value disguised the true extent of the potential impact. Management stated
in its report to the board that an inaccurate and incomplete risk analysis was the rea-
son for the failure of the launch.
If a scenario-based risk assessment had been integrated into management’s decision-
making process at the manufacturer of medical products, this poor result would have had
to be considered as a negative scenario (among all other scenarios, including positive
ones). It is no longer possible to allocate responsibility for the poor and incomplete risk
management approach.
3.4 Assess Key Risk Scenarios
118 3 Creating Value Through ERM Process
The integration of risk-relevant, transparent information into decision-making pro-
cesses is obviously also a question of corporate culture or risk culture. An appropriate
risk culture that prevents qualitative risk assessments or very simple, static risk analyses
increases management’s responsibility for bad decisions. Even such a positive risk cul-
ture is desirable from a company’s point of view (including relevant stakeholders like
shareholders), it may not be in favour of the management’s point of view.
3.4.7 Assess Impact on Relevant Objectives
So far, we have dealt with the assessment of individual risk scenarios and stored them
in any kind of a database. Using a filter function, the top risks were selected and quanti-
fied applying the scenario technique. These “intermediate steps” have already produced
very important results, above all quantified key risk scenarios. Thus, every company
has already engaged in valuable discussions about probabilities of occurrence, possible
impacts on revenues and costs, and dependencies of individual risks with other risks as
part of the scenario development. This in-depth analysis of various scenarios has already
led to a significantly better understanding of risk compared to a purely qualitative
approach. Initial considerations as to whether specific risks can be accepted or whether
mitigation measures are beneficial can thus already be undertaken. The next, very impor-
tant step is to analyse the impact of several risks and their risk scenarios on business
objectives using the most sensible approach possible. Basically, there are many good rea-
sons to deal with simulated risk aggregation:
• Risk aggregation supports decision-making processes on the execution of strategic
initiatives or projects: does the risk taken justify the expected return? How does add-
ing or mitigating risk exposure change the overall risk to a business objective?
• Risk appetite statements (see Sect. 3.5.6) can only be meaningfully applied when
compared to overall risk exposures related to specific business objectives.
• The uncertainty attached to the achievement of business objectives can be presented
more transparently and comprehensively. All risk scenarios that affect simultaneously
one or more specific objectives can be assessed by looking at an overall risk distribu-
tion. Decision-makers can get a good grasp of the “full risk range” (downside and
upside risk) related to a specific decision or objective.
• Risk interdependencies can be incorporated in aggregated risk models. Diversification
effects can thus be taken into account.
• The prioritisation of risk mitigation measures can only be carried out meaningfully
if the relative benefit of the measures can be assessed. It is not very helpful to effec-
tively manage individual risks if the relative contribution to the overall risk exposure
does not justify this.
• Theoretically, a fully aggregated risk model at the highest corporate level could be
applied to compare the current risk exposure with available equity capital. This would
119
make it possible to include risk-bearing capacity considerations similar to those in
financial institutions. Since, however, securing the company’s existence is not the
main objective of our understanding of ERM (remember: it is increasing the qual-
ity of decision-making under uncertainty) and the calculation of a single aggregated
risk measure is associated with considerable problems, we will not go into any further
detail.
• After all, properly conducted risk aggregation supports the creation of a balance
between intuitive assessments by management and more objective, rational informa-
tion provided by risk analysis in decision-making processes (Rees 2015, p. 62).
Basically, only simulation models are capable of meaningfully assessing the impact
of multiple risks on a specific business objective. However, in practice there is still a
great reluctance to specifically simulate risks (using Monte Carlo (MC) simulation),
although this is not justified. MC simulation is often accused of something “voodoo-
like” that leads to results that are unrealistic and incomprehensible. That is certainly
wrong. MC-Simulation only translates input in exactly the way it is fed in by humans.
It shows in a structured way what potential realities a company might face by calculat-
ing and representing all possible future uncertainties (entered into the model) in a prob-
ability-weighted way. This has not much to with “voodoo”. In addition, meanwhile,
computing power is no longer an issue. Simulations that deal with key risks (we remem-
ber—between 20 and 50 at most) or their scenarios usually only take a few seconds to
calculate the current risk exposure.
For the high complexity or the failure of many risk models in practice, MC simulation
is not the problem per se. Two reasons why we observe many overly complex risk mod-
els in practice are the following:
• Often, the important filter function within the ERM process does not properly work
or is inexistent. Practitioners tend to consider many (too many) uncertainties (risks)
as important and essential. This problem is particularly exacerbated when people are
involved in risk modelling who may be unfamiliar with the uncertainty to be assessed
(e.g. risk assessments in not well-led workshops). This can lead to as many risks and
opportunities as possible being included in a risk model so that nothing is “over-
looked”. The risk model can thus quickly become too cumbersome and complex and
no longer focuses on key risk aspects.
• Moreover, practitioners often wish to cover all uncertainty-related problems within
one single risk simulation model. This is often reinforced by extant literature on com-
paring total risk exposure (expressed in one single metric) to risk appetite to decide
upon the required equity cushion to bear a certain “risk level” (specifically in the
financial industry). However, such models attempting to aggregate all possible uncer-
tainties within one risk model often fail due to complexity.
3.4 Assess Key Risk Scenarios
120 3 Creating Value Through ERM Process
However, risk aggregation regularly poses major practical challenges. In practice, vari-
ous other methods than MC simulation can be observed, but these must be viewed very
critically. Two of them are briefly described below.
3.4.8 Avoid Pseudo-Risk Aggregation
In practice, very pragmatic methods of risk aggregation can be observed, but they fail to
achieve their goal or can be classified as dangerous because they lead to a distorted over-
all view of risk. Let us look at the five management assumptions of the ski manufacturer
from the example in Fig. 3.5:
• Customer acquisition (marketing campaign) + 10%
• Stable exchange rates
• No new competitor
• No inflation
• Good to very good snow conditions
These are five individual assumptions that were analysed in more detail within the scope
of quantitative scenario development. For simplicity’s sake, we will look only at the
respective very pessimistic scenarios of the five management assumptions which are all
uncorrelated (independent from each other). These were assessed as shown in Table 3.2.
The first method of risk aggregation of all pessimistic risk scenarios that can affect
the “ski sales” objective is the simple addition of all impact values (see similar Gleißner
2004, pp. 353–354). In this case, the overall impact on the sales objective would be
$2,550,000. However, this approach neglects the probability of occurrence of each single
pessimistic risk scenario. The amount of $2,550,000 is completely useless in decision-
making processes because it represents a significant overestimation of the true risk expo-
sure. This large $-impact represents a situation where all single risk scenarios occur in
the same year. Of course, this happens very unlikely. The probability that the five risk
Table 3.2 Very pessimistic risk scenarios
Uncertain assumptions Very pessimistic scenario Probability of occurrence Impact
Customer acquisi-
tion (marketing
campaign) + 10%
−20% customer base 5% (1/20) −$300,000
Stable exchange rates −10% $/€ 10% (1/10) −$200,000
No new competitor −25% market share 3% (1/33) −$1,200,000
No inflation 3% inflation 5% (1/20) −$350,000
Good to very good snow
conditions
Bad snow conditions 10% (1/10) −$500,000
121
scenarios in the example will occur simultaneously is only 0.000075%. If the risk man-
ager applies this aggregation method and includes the aggregated scenario of $2,550,000
in his or her risk reporting, then wrong risk mitigation measures may be adopted and
resources unnecessarily wasted. In addition, the risk manager weakens the credibility
and thus his or her position as a “source of rationality “.
The second method of risk aggregation involves adding up the individual expected val-
ues of the risks. We have already learned that expected values are not true measures of
risk. An aggregation with this method would result in a value of $296,000 (calculated as
follows: 0.05*300,000 + 0.1*200,000 + 0.03*1,200,000 + 0.05*350,000 + 0.1*500,000). The
major problem with this approach is that individual, rare risks with high impact potential
are “hidden” in the expected value, i.e. are no longer transparent. For example, the risk of
a competitor entering the market may impact revenues by -$1,200,000. Obviously, the sole
occurrence of this single risk has a much higher impact on the company’s performance
than the aggregated expected value of $296,000. From a mathematical point of view, an
aggregation of individual expected values is correct because expected values are additive.
However, a comparison of the risk tolerance of a project or a strategic objective with the
aggregated sum of expected values makes no sense. The amount of $296,000 is the aver-
age expected impact over an infinite period of time. Expected values are not suitable as a
measure for assessing individual serious risks that deviate from the expected risk levels.
Obviously, both methods are not suitable for risk aggregation, although they are very
simple and pragmatic to apply and do not require a simulation model. We remain con-
sistent with the principle in this textbook that we explicitly consider methods in risk
management to be unsuitable if they are known not to work, but are still applied in
practice.
3.4.9 Develop Useful Risk Appetite Statements
Risk appetite is currently probably one of the most controversially discussed topics in the
field of ERM. No other keyword makes policy makers, risk professionals and consultants
alike admit that the development of decision-relevant risk appetites is difficult and that
it is even more difficult to implement these in practice. Some fundamentally question
the definition of risk appetite, others simply prefer qualitative statements and still others
believe that risk appetite must be quantified. Few detailed and convincing examples have
been published that articulate risk appetite properly. It may be argued that companies
having defined risk appetite statements often are sensitive about sharing their methodolo-
gies with the larger community (RIMS 2012, p. 5).
How is risk appetite defined? Risk appetite is the amount of risk a company is willing
to accept in pursuit of its objectives and is directly related to the company’s strategy. It
may be expressed verbally or quantitatively as the acceptable balance between risk and
return. It is often claimed that without a clearly defined risk appetite, there is no objective
for the risk management process as to what it should focus on. Ultimately, some argue that
3.4 Assess Key Risk Scenarios
122 3 Creating Value Through ERM Process
the most important goal of ERM is managing the overall risk exposure as close as possible
to the defined risk appetite and keeping it within a certain tolerance limit. However, practi-
cal experience shows that risk appetite is often defined incorrectly, insufficiently, not at all
or not used for decision-making. In addition, one can observe a rather low level of maturity
of risk appetite dialogues in many companies.
The development of risk appetite statements seems to be very difficult in practice. Some compa-
nies formulate risk appetite in a few words, e.g. as “generally low”, while other consider quantita-
tive measures (limits, e.g. in relation to EBIT, enterprise value, cash flow) being more suitable.
According to a recent study of Lucerne School of Business and SwissERM, only 25% of Swiss
non-financial companies have fully documented risk appetite statements. Every fifth Swiss com-
pany does not state risk appetite at all. For the remaining 55 percent, risk appetite is only poorly
or partially documented. Results of a recent study by EY (Ernst & Young 2015, p. 8) show similar
results for the financial industry: although the definition of risk appetite is one of a CRO’s top pri-
orities according to the study, only slightly more than 40 percent state that they have determined
and successfully transferred risk appetite to business activity.
The following reasons may explain the problems with risk appetite in practice:
• It is often wrongly assumed that risk appetite can somehow be calculated and derived
directly from the ERM process. This, however, is completely wrong. Risk appetite
is a matter of judgment based on each company’s specific circumstances and objec-
tives. Risk appetite is independent from the current risk exposure a company faces. It
is rather a sound assessment made by management and the board of directors of the
maximum acceptable level of risk exposure from the perspective of the most relevant
stakeholders (in many public companies the shareholders). Experience has shown that
the definition of risk appetite is a very challenging process requiring a great deal of
discussion and consensus (KPMG 2008).
• Risk appetite statements are often used to communicate corporate values to stake-
holders rather than being an internal decision-making criterion. For example, state-
ments are made in published risk policies or in annual reports that risks relating to
personal harm are not accepted. From the point of view of the stakeholders, this reads
admirably and often matches with their own values. However, such qualitative, gen-
eral phrases hardly guide the company’s day-to-day actions. What does this mean, for
example, for a hospital not to accept any risks that might harm people? If this state-
ment were applied strictly, the core business of the hospital (e.g. surgeries on patients)
could no longer be carried out.
• Often the comparison between risk exposure and risk appetite is not possible because
the two factors are measured differently. Most companies do not quantify and aggre-
gate risks into a risk-oriented figure such as EBIT at Risk (EaR) or Cash Flow at Risk
(CFaR). Often risk registers only contain individual risks. It thus does not make sense
to define a risk appetite in relation to EBIT or cash because the key figures required
for comparison are not available.
123
• The quantitative definition of risk appetite creates potentially unpleasant transparency,
accountability and vulnerability not desired by management. If, for example, it turns
out that the current risk exposure significantly exceeds the defined risk appetite, this
can lead to unpleasant situations and requires justifications by management. A subse-
quent adjustment of the risk appetite to the current risk exposure will potentially con-
siderably reduce the credibility of the entire ERM programme.
• Risk appetite is sometimes confused with risk tolerance. Risk appetite is derived from
the company’s objectives; it is a statement of how much risk the company is willing to
take in terms of markets, services and products to achieve a required level of return by
the stakeholders. Risk tolerance, on the other hand, is the maximum risk a company
can bear in order to avoid becoming illiquid or insolvent, no longer complying with
legal requirements or no longer meeting its obligations to customers and suppliers.
Thus, risk appetite and risk tolerance are fundamentally different concepts.
• Risk appetite statements explicitly define the boundaries within which management
is expected to run the company, i.e. which decisions may be taken and which not.
It is thus crucial that everyone at the highest hierarchical level of the company is
involved in the process of risk appetite definition. However, very often, risk appetite
is not equally well known and accepted at executive and board level. In many cases
risk appetite statements remain ineffective, i.e. they have little or no influence on
decisions.
• Statements at a too aggregated level, which are formulated purely qualitatively, are
often not actionable. An example of this is: “risks that put the existence of the whole
company at stake should be avoided”. Basically, this reads nicely and is fully compre-
hensible. But how can the company concretely act on that statement? How is this risk
appetite statement actually implemented in day-to-day business actions? Which deci-
sions are actually affected by such a general risk appetite statement? Probably none.
Such statements are no guidelines for action.
In principle, it is beyond doubt that a thorough dialogue to establish risk appetite state-
ments is very important. It seems important that the risk manager can be present at these
discussions and, if necessary, answer initial questions on possible risks and their man-
agement. Research on risk appetite is still in its infancy. Empirically validated recom-
mendations for the definition of risk appetite cannot be provided. However, experience
shows that it is worth considering the following questions:
• What kind of risks should be accepted to successfully pursue our strategy? For exam-
ple, a company aims at increasing market share. A risk appetite statement could read
as follows: We will aggressively expand in the DACH region to meet our market
share objectives of 5% and heavily invest in these markets. Thus, we accept the risks
attached to that growth strategy.
• What kind of risks should we not accept? For example, a company tries to avoid
any sources of risks that can negatively affect corporate reputation: “In case a risk
3.4 Assess Key Risk Scenarios
124 3 Creating Value Through ERM Process
occurred which has the potential to harm our reputation, we will counteract as effec-
tive and efficient as possible”.
• What risks are our stakeholders willing to bear and to what risk exposure? For exam-
ple, “We will keep a certain level of free cash flow target. Thus, we will monitor capi-
tal expenditures and investments closely to achieve the required cash flow level”.
• Is our risk appetite aligned with the desired risk culture? Risk culture consists of a set
of shared attitudes, values and practices that defines how a company considers risk
in its daily activities. The risk culture itself is primarily derived from an analysis of
organisational practices, specifically rewards or punishments for risk-taking or risk-
avoiding behaviour (Collier and Agyei-Ampomah 2006). In a modern ERM approach,
risk management should encourage a balanced risk-reward management by defining
risk appetite statements which put emphasis on connecting risk with opportunities
(reward).
• Is our risk appetite aligned with risk tolerance? Basically, risk appetite should not
exceed the maximum amount of risk bearable from a risk capital (equity) perspective.
• Do our risk appetite statements facilitate consistency in the strategic planning pro-
cesses and budgeting processes? Do they actually guide these processes in the sense
of setting relevant risk boundaries to plan within?
• How do our competitors set their risk appetite? Is it higher or lower than our risk
appetite, and if so, why is this the case? (Proviti 2013, p. 3)
• Do we communicate externally about our risk appetite statements? This can signal
good, proactive ERM practices and corporate governance to stakeholders and thus
enhance reputation and trustworthiness of the company (Willis 2015, p. 5).
Of course, the answer to these questions is a very individual matter. There is no best
solution that fits all companies equally. Companies with a high risk appetite generally
focus more on the potential for a more aggressive growth in value and earnings. As a
result, these companies are willing to take a higher risk in return. High-potential, high-
risk growth start-up companies (must) have a high willingness to take risks and are gen-
erally willing to accept greater volatility. Conversely, companies with lower risk appetite
are generally more risk averse as they focus on stable growth and earnings. They tend to
hedge possible market fluctuations and are often strongly influenced by legal and regula-
tory requirements.
As Sidorenko and Demidenko (2017) point out correctly, most companies have
already defined many risk appetite statements for decision-making and pursuing objec-
tives even if they are not explicitly called “risk appetite statements” (p. 20). Indeed, if we
look at investment policies, internal control documentations, procurement policies and
board level policies, we usually can find a vast amount of different risk appetite state-
ments. For example, many internal control systems clearly define segregation of duties
and zero tolerance to fraud risk. Companies usually develop finance policies which for
example define the maximum amount of petty cash held on a daily basis. Investments
policies provide accurate guidelines for minimum ratings required by Standards and
125
Poor’s or Moodys for any investments or explicitly list prohibited investment practices
such as trading structured products.
In line with the recommendations contributed by Sidorenko and Demidenko (2017), we
recommend to collect all existing risk appetite statements within current guidelines, poli-
cies and other management tools such as quality management or internal control systems.
They should be reviewed and monitored on a regular basis. Monitoring in this context
means that the risk manager may assess these statements concerning the following aspects:
• Up-to-dateness. Do the risk appetite statements correspond to the current company
objectives and the current business model?
• Consistency. Are the individual company objectives and risk appetite statements com-
patible with each other? It is pointless to pursue an aggressive growth strategy and
at the same time formulate a risk appetite statement that investment risks should be
kept to a minimum. It is also useless to define the same risk appetite statements for all
investments, independent of the expected return (and risk) of each investment.
• Adherence. Are the individual risk appetite statements actually adhered to? Do they
impact decisions correctly? It is pointless to define concrete risk appetite statements
in a policy that is not even considered for decisions (e.g. outdated or unknown policy).
• Appropriateness. Are the individual risk appetite statements realistically defined?
Does it make sense to define them so narrowly or broadly under given strategic objec-
tives? For example, it is pointless for a hospital to define a statement that “allows zero
tolerance for harm to patients”.
• Specificity. Some companies use very general descriptions of risk appetite statements
such as “we adhere to a very low overall risk appetite” or “we accept a quite high
risk appetite to satisfy our stakeholders”. We consider such broad statements as too
vague to be effective. Specificity is very important whether risk appetite statements
are actionable on a daily basis. It often depends on whether statements are expressed
qualitatively or quantitatively. In the latter case, specificity is usually higher: It is eas-
ier to implement a statement that allows a maximum of 30% cash on a single bank
account than a statement which asks for adhering to low counterparty risk.
The critical question remains: Is it useful for any company to create and develop new
risk appetite statements not already covered in existing policies, documents and guide-
lines? In some cases, this might be true. For some risks identified by means of e.g. chal-
lenging management assumptions, no or not all risk appetite statements can be found
in corporate policies or guidelines. Usually, most of the missing appetite statements
relate to enterprise-wide, long-term, strategy-relevant risks, i.e. many key risks identified
through our ERM approach. In contrast, many of the already existing risk appetite state-
ments are more operational in nature.
To illustrate this, let us revisit the example of the maximum amount of cash allowed
in the company cash register per day. Clearly, this is a very operational risk and not criti-
cal to the company’s success. Petty cash risk will usually not qualify as a key risk and
3.4 Assess Key Risk Scenarios
126 3 Creating Value Through ERM Process
thus is not relevant for achieving the strategic objectives. So it may be of need to develop
further risk appetite statements which address key risks and their (aggregated) impact on
specific high-level performance goals or key performance indicators. Such risk appetite
statements can be defined multidimensionally and preferably quantitatively, for example
in terms of acceptable changes in company value, reputation, sales growth, cash flow
stability, earnings per share, rating level and EBIT. However, remember that too high-
level or too generally stated risk appetite statements are no longer actionable and moni-
torable, such as: “our overall risk appetite is as follows: we like to create a reasonable
rate of return at a low to moderate level of risk with a well-diversified project portfolio.”
The following example illustrates how such risk appetite statements can be formulated in
concrete terms and it summarises the discussions so far on risk appetite.
Example
The ERM committee of a Swiss travel company, consisting of five members (CEO,
head of division A, head of division B, risk manager, CFO) has been tasked with the
definition of risk appetite statements. A half-day meeting is scheduled to submit a
proposal to the board of directors. The risk manager has already clarified in previous
meetings with the management for which strategy-relevant objectives corresponding
risk appetite statements are to be defined. In addition, the risk manager has already
thoroughly analysed existing policies, guidelines and documents for risk appetite
statements and summarised them in a list.
The company applies internal company valuation as a risk-based decision-mak-
ing tool, by which risk-reward contributions of future investments and projects can
be assessed. The identified key risks for the travel company are incorporated in the
company valuation model (discounted cash flow method) and allocated to the indi-
vidual line items (i.e. sales, costs). Using a Monte Carlo simulation, key risks and
their effects on the planned company value can be simulated. The risk manager has
concluded that the existing policies and guidelines do not contain any statements
on risk appetite with regard to the two relevant objectives sales and company value.
These missing appetite statements refer to the company-wide, aggregated impact of
risks that are not present in existing policies. These risk appetite statements need to be
newly developed.
During the risk appetite meeting, the risk manager plays a decisive role in moder-
ating this delicate discussion. She is aware that the people present from the risk com-
mittee represent different roles, perspectives and interests, which can make consensus
finding a difficult task. After an intensive discussion, various risk appetite statements
were prepared. In Table 3.3, an excerpt of the results of this risk appetite meeting is
presented:
In a next step, the ERM committee assessed the different risk exposures for the
next twelve months. The risk manager prepared this information together with risk
owners before the meeting. The committee also decided to define soft and hard limits
with regard to the sales and company value targets. Soft appetite statements can be
127
temporarily exceeded if a profitable project can be realised with a certain expected
positive net present value and internal rate of return (IRR). Hard limits, on the other
hand, must not be exceeded at any time. If this is the case, the overall risk exposure
needs to be reduced accordingly.
It is probably the case that the currently hotly debated topic of “risk appetite” is some-
what overrated and is primarily promoted by academics and consultants. Basically, it is
desirable for management to consider which risks should be taken and to what extent
in order to achieve the business objectives. This discussion is very relevant and pro-
motes the general discourse on the company’s attitude to risks. Risk appetite statements
reflect the corporate culture and indirectly express the values and ethics of each com-
pany. However, risk appetite is often strongly influenced or even largely determined by
the business model (e.g. return requirements of investors) and the industry (e.g. high reli-
ability organisations versus financial institutions). The definition of risk appetite is thus
not completely under the control of each individual company, but is often dominated by
competition and market conditions.
3.4 Assess Key Risk Scenarios
Table 3.3 Risk appetite statements
Source Risk appetite
(yearly basis)
Limit (yearly basis) Current exposure Status
Newly developed
through ERM
model
No more loss than
25% of company
value
Soft: Probability of
10%
Hard:
Probability of 15%
Probability of 5% Within risk
appetite
Newly developed
through ERM
model
No more loss
than 15% of
sales (basis:
3-year-average)
Soft:
Probability of 10%
Hard:
Probability of 20%
Probability of
12%
Exceeds soft
limit
Finance policy Rating downgrade
of one level
Probability of 10% Probability of 5% Within risk
appetite
Finance policy Minimum
required rating
of AA for any
investments
Better than AA Full adherence Within risk
appetite
Board level policy No more loss of
reputation as 15
index points
Probability of 15% Probability of 5% Risk appetite
exceeded
Internal con-
trol system
documentation
Segregation
of duties for
all financial
transactions
Full adherence None Within risk
appetite
Code of conduct Zero tolerance for
child labour
Full adherence None Within risk
appetite
128 3 Creating Value Through ERM Process
3.4.10 Make Uncertainties Transparent and Comprehensible
Basically, a variety of approaches are available for presenting the quantified key risk sce-
narios in a meaningful way to decision-makers (tables, diagrams, graphs, text). First and
foremost, the aim is to produce visualizations that are easy to understand and communi-
cate and can support decision-making processes. It is tempting to produce complex and
overloaded visualizations that look pretty but distract from the relevant information. At
this point, we will briefly discuss the risk map again (the author promises to do this for
the last time in this textbook). Unfortunately, risk (heat) maps still persists today as a
visualization tool in risk reporting. We have already discussed the disadvantages of risk
maps in detail. But they are a good example of how creative risk managers, academics,
consultants and policy makers are when it comes to making a risk map as “sophisticated”
as possible. We have seen “advanced” risk map approaches such as:
• The size of the circles (risks on the risk map) implies a degree of consensus between
different experts.
• Different colours of the risk circles show different risk categories.
• Differently coloured arrows on the map show trends of risk (risk increases, decreases,
is stable)
• Inserting a third dimension into the risk map, such as the controllability of risks or
their probability of detection.
• More colours besides yellow, red and orange are used to further differentiate between
bad, somewhat bad and good risks.
• Two risk maps are placed side by side, each showing the downside and upside poten-
tial of the individual risks.
These sometimes very colourful approaches usually do not bring any additional benefit,
especially not for our main ERM objective: to improve the quality of decision-making. A
risk map remains a risk map, no matter how much it is “further developed”. Hence, other
approaches are needed to effectively visualise risks. The following examples are by no
means exhaustive. However, there are three simple, meaningful options that have been
well tested and work in practice. Working means in this context: The decision-makers
understand the visualizations (they are kept as simple as possible) and they are directly
linked to objectives and thus relevant for decision-making processes.
The first meaningful way to present the risks associated with business objectives
effectively and simply originates from the discipline of decision analysis. It is called
tornado diagram analysis. One of the first known publications where this is introduced
can be found in the work of Howard (1988). The tornado diagram usually shows in
descending order of importance the relative impacts of individual variables on an objec-
tive of interest such as company value, EBIT, net present value of projects or cash flow.
Basically, a tornado diagram is similar to a common bar chart applied in sensitivity
analysis for comparing the relative relevance of different variables. It helps to assess the
129
degree to which each risk impacts the objective being assessed when all other risks are
kept at their baseline values (planned scenario). Usually, a tornado diagram depicts all
risks at their base values (plan) on the Y-axis and the X-axis shows the range (e.g. confi-
dence interval of 90%) of potential impact of each risk.
A tornado diagram is quite easy to prepare and requires only all relevant quantified
key risk scenario values. The diagram is intuitive to understand and looks like a tornado
in profile, that is why the name “tornado diagram”. It supports the decision-maker to
focus on the most relevant risk areas and their relative impact on business objectives.
In addition, tornado diagrams contain downside and upside risk ranges. Thus, they are
basically in line with our risk definition (deviation from plan) and support risk-reward
decisions. Tornado diagrams may thus serve as a basis for prioritization of relevant risk
areas and the subsequent decisions on risk mitigation. However, one must be aware that
the diagram depicts no probabilistic information regarding the occurrence of each possi-
ble scenario on the range of each bar. Also, expected values (probability-weighted plan)
are not calculated by this method. The different bars only provide a good first general
impression of risky areas. Usually, the bars do not represent single risk scenarios, rather
contain one or more different risk sources which have an impact on relevant areas of
interest (e.g. line items of income statements, discounted cash flow statement or cash
flow statements). Narrower or wider ranges indicate relatively more or less uncertainty
given a pre-defined confidence level (see similar Porter 2018, pp. 85–89). Figure 3.17
depicts an example of a tornado diagram.
As we can quickly notice, the diagram resembles the shape of a tornado. In descend-
ing order, the individual uncertain areas of interest (variables) and their impact on the
planned EBIT are presented. Obviously, the price per unit shows the highest effect on
EBIT. In the very pessimistic case (once in ten years, if the confidence level refers to
one year) EBIT could fall below EUR 300. However, the price risk also includes a cor-
respondingly high opportunity potential. In the best case scenario, EBIT could almost
double (EUR 19,500) due to favourable price developments. However, it remains unclear
what influence the company actually has on price setting. If one assumes that the com-
pany is a price taker, this uncertainty cannot be actively managed. In contrast to the
price, the raw material risk, which has the second highest impact on EBIT, can be miti-
gated by appropriate hedging strategies. The vertical line in Fig. 3.17 is drawn through
the baseline value, i.e. the planned EBIT for the corresponding year which amounts to
EUR 10,000.
Even tornado diagrams can lead to wrong decisions if it is not clear on which input
parameters the individual ranges are based. Depending on which confidence level is set
for the individual risks, broader or narrower bars result. The decision maker must thus
know that in 10% of all cases reality is either (much) better or (much) worse than the bar
shows. And this is precisely where the key problem is: we do not know what the value
of EBIT will be if an extreme scenario (outside e.g. the 90% confidence level) occurs.
The EBIT could even become negative if an extremely pessimistic scenario occurs.
This leads us back to the risk appetite discussions. The crucial question here is: Are the
3.4 Assess Key Risk Scenarios
130 3 Creating Value Through ERM Process
risk-based EBIT fluctuations still within the defined risk appetite? Does management
accept, for example, that EBIT can fall below EUR 2,200 once in ten years if raw mate-
rial prices develop very negatively? Does the corresponding upside potential justify tak-
ing that risk?
A second effective visual presentation of the key risk scenarios complements the tor-
nado diagrams ideally: the representation of all very pessimistic scenarios, similar to
Fig. 3.15 which distinguishes between key and non-key risks. In contrast to the tornado
diagram, the key risk scenario diagram:
• Shows impact values based on worst case scenarios (very pessimistic scenarios) with-
out any consideration of probabilities (see similar Segal 2011, p. 198).
• Contains only the downside impact on company objectives (what can go wrong?)
• Is based on source-based, single risk scenarios taken from the risk quantification pro-
cess rather than based on specific line items which may be impacted by several risks
simultaneously.
The information offered in this diagram answers different questions than in the tornado
diagram in Fig. 3.17: What can happen if a very rare but very pessimistic risk scenario
actually occurs, independent of its probability of occurrence? One could argue more
technically that this chart takes into account so-called very rare “tail risks”. These risks
Price per unit
Raw materials
Production cost
Quality cost
Exchange rate
Machine breakdown
20
00
–
12
00
0
–
14
00
0
–
16
00
0
–
18
00
0
–
40
00
–
60
00
–
80
00
–
10
00
0
–
20
00
0
–
[email protected] (90% Confidence)
EBIT Forecast EUR 10000.-
9690 10300
6852
6200
7820 13575
140006900
2250 16100
180502200
300 19500
0
–
Marketing cost
Market share
Fig. 3.17 Example tornado diagram
131
fall outside the usually considered risks within a certain confidence level (e.g. 90% or
95%). In this case management is not interested in probabilities, but want to know what
can actually happen in the worst case and whether the company needs to be prepared for
it or not. Figure 3.18 shows an example of a representation of very pessimistic key risk
scenarios. As in the tornado diagram, the single risk sources are shown in descending
order of relevance, again related to the planned EBIT of EUR 10,000.
If we take a closer look at Fig. 3.18, we can observe the following:
• The very pessimistic risk scenario 1 of the price risk has the highest impact on EBIT
(may cause a plan deviation of—EUR 18,000)
• A moderately pessimistic risk scenario 2 of the same underlying price risk still has a
major impact on EBIT (−EUR 8,000).
• All bars represent single risk scenario which qualify as key risk scenarios, in this case
five different scenarios independent of their respective probabilities.
Both types of presentation of top risks discussed so far are already attracting a great deal
of management attention. The reason for this is the direct connection between risks and
business objectives for which management is responsible. Both graphs clearly show the
uncertainty attached with the company’s financial performance. As already mentioned,
management is primarily interested in the achievement of objectives, not per se in iso-
lated management of risks.
The third type of presentation is based on the result of a Monte Carlo simulation.
Basically, the same input is used as in the two former graphs. In MC-simulations, we can
additionally correct for some known correlations between risk scenarios. As discussed in
3.4 Assess Key Risk Scenarios
Fig. 3.18 Quantified very
pessimistic scenarios
8000 –
Price Risk
Scenario 1
Q
uality Risk
Scenario 16000 –
Price Risk
Scenario 2
Com
pe�tor Risk
Scenario 1
M
arke�ng Risk
Scenario 1
Planned EBIT EUR 10000
4000 –
0 –
2000 –
– 2000 –
– 4000 –
– 6000 –
– 8000 –
132 3 Creating Value Through ERM Process
Sect. 3.4.2, however, these correlation adjustments are not the crucial part of risk quan-
tification. In contrast to the depiction of sensitivities (tornado diagram) and individual
key risk scenarios, the Monte Carlo simulation shows a distribution of all future pos-
sible risk-based EBIT’s. It resembles a probability-weighted, multi-scenario planning
approach which considers all possible combinations of key risk scenarios simultane-
ously. Figure 3.19 shows the output of a simulation with all key risk scenarios.
The graphs depict all risk-based deviations from the planned EBIT of EUR 10,000.
The y-axis represents the probability function. Of course, achieving exactly the planned
value is close to zero because of the many possible other EBIT outcomes. The distribu-
tion is slightly left skewed. This is quite realistic because the downside risk (left part
of the risk distribution) is often greater than the upside risk. Some risks have no upside
potential at all, as we have learned. This is now also well reflected in this distribution.
What can also be seen is that the distribution has some “tail risks”. In a few cases the
EBIT can get as worse as—EUR 20,000. However, the probability of this scenario
becoming reality is also very low.
In this illustration, the individual risk sources cannot be assessed directly. In order to
determine the relative impact of individual key risk scenarios on the EBIT distribution,
individual scenarios can be included in the first simulation run and excluded in a second
simulation run. The delta between the two simulation runs shows the “risk contribution”
to the overall risk exposure of the respective risk scenarios. In this sense, “sensitivity
analyses” can be made based on the simulation model, which can serve as a basis for fur-
ther decision-making processes.
P
ro
ba
bi
lit
y
of
oc
cu
rr
en
ce
Impact (EBIT)
– 10,000 -5,000 0 5,000 10,000 15,000 20,000 25,000
– – – – – – – –
EBIT
Plan
Downside Risk Upside Risk
– – – — — –
– 20,000
Fig. 3.19 Example of multi-scenario planning
133
These three presented types of diagrams are all superior to simple risk maps and are
all connected to managing objectives. Hopefully these types of diagrams will soon make
isolated risk maps no longer necessary in practice. The next paragraph outlines which
decisions can be supported by the ERM information produced so far.
3.4.11 Exploit the Full Decision-Making Potential of ERM
The claim at this point is that integrating ERM information into decision-making pro-
cesses leads to better decisions at the time the decision is taken. One major goal of a
modern ERM is to actively manage the current risk exposure by designing and imple-
menting decision-making processes that are in line with the defined risk appetite
statements. In practice however, ERM programmes are too concerned with simply mini-
mizing risk (regulatory risk approach, see Sect. 3.5.2) instead of linking it to decision-
making processes. Outcomes of the ERM process such as the three types of diagrams
discussed in the previous paragraph are beneficial in the development, selection and
optimisation of larger investments and can support the achievement of business objec-
tives by making better decisions. Basically, we can differentiate decisions which are pri-
marily driven by value creation and decisions which are predominantly focused on risk
mitigation:
• Taking into account the full range of quantified key risk scenarios (by means of MC
simulation) can support risk-reward decisions and complement management’s infor-
mal judgement (i.e. balances intuition with rationality). The CFO of a company is
interested to know how the current (pre-decisions) and future (post-decisions) risk
profile is related to the risk bearing capital, namely equity. So every risk-reward deci-
sion ultimately adds risk to the company which must be assessed from a risk bear-
ing perspective: What strategic option has the relative best risk-reward profile from
an equity-based perspective? A well-informed CFO about current key risk scenarios,
risk appetite statements and aggregated risk impacts on specific objectives can lead
rational discussions about strategic options, risk appetite and risk-reward options with
the management and the board of directors. In addition, if the risk manager is not part
of corporate management, the CFO may become the most important representative
of providing rational, risk-based input to larger investment decisions at management
meetings. Thus, apart of the risk manager, the CFO may play a crucial role in inte-
grating modern ERM into decision-making processes at top management level (see
similar Liu and Pergler 2013, p. 5).
• Sound risk analysis can enhance business decisions by improving the comparability
of different strategic options and their attached risk-reward profiles and thus, create an
ideal business portfolio. Quantified key risk scenarios enable a sort of “stress test” for
non-financial companies by comparing different strategic decisions and their impact
3.4 Assess Key Risk Scenarios
134 3 Creating Value Through ERM Process
on risk exposures, such as entering new markets or investing aggressively in specific
product lines.
• In analogy to the financial industry (value at risk), non-financial companies may carry
out similar “company value at risk” calculations and compare them with a pre-defined
risk appetite. For example, a risk-based simulation of the company value may con-
clude that, with a probability of more than 10%, one third of company value may be
reduced in the next year. If this risk exposure exceeds the risk appetite, management
has to decide how to reduce current risk exposure in order to make shareholders more
comfortable again.
• Another example of how risk appetite statements based on a more operational meas-
ure than “company value at risk”, as for example EBITDA or EBIT, may support
risky business decisions: For instance, a strategic option to enter a new market has a
15% probability that a very pessimistic risk scenario reduces expected EBIT over the
next two years by two third. Depending on the set risk appetite, the strategic option
could either be approved or rejected.
• More effective decisions can be made about risk mitigation options because of a more
formalised assessment of mitigation measures, i.e. it allows companies to develop an
effectiveness ranking by the means of quantified cost-benefit-considerations. The cost
in this context refers to the implementation of a mitigation measure, the benefit is the
reduced amount of risk exposure.
• If risk appetite exceeds risk exposure, mitigation options must be assessed and
decided upon. Such mitigation options can reduce probability of occurrence and/or
reduce impact of a specific risk. The focus of risk mitigation should lie on risk pre-
vention, i.e. risk mitigation measures which lower the probability of occurrence of a
risk rather than reducing its impact (after-the-fact).
• A vast amount of standard risk management textbooks discuss the different options
of risk elimination, risk transfer, risk reduction and risk diversification. At this point,
it is not the aim of this textbook to reproduce all these approaches of risk mitigation
measures. Risk mitigation measures can reduce the current risk exposure to a level
which does not exceed risk appetite, enable a better credit rating (rating strategy), and
prevent a company from illiquidity and bankruptcy. Figure 3.20 shows an example of
decisions which can be taken towards risk mitigation as the primary goal. It depicts a
few risk mitigation options which are preventive (left side of the graph) and correc-
tive (right side) in nature. Usually, preventive risk measures are more efficient (lower
costs, less risk impact) than corrective ones. The bow-tie method has already been
introduced in Sect. 3.3.1 as an effective, easy-to-use tool to support scenario analysis
and the visualised reporting of full information on risks and mitigation measures.
• Business planning (e.g. budgeting) can be supported by incorporating information
provided by the risk management function, such as quantified scenarios regarding
sales, costs, etc. and contrast it with the company’s objectives. If it turns out that the
probability of the current plan to become reality is too low to meet management’s
objectives, further strategic options may be taken. The consideration of key risk
1353.4 Assess Key Risk Scenarios
C
au
se
s
E
ve
nt
s
Im
pa
ct
R
oc
ks
o
n
st
re
et
B
ro
ke
n
he
ad
lig
ht
S
ic
k
dr
iv
er
Lo
w
v
is
ib
ili
ty
C
ar
p
as
se
ng
er
in
ju
ry
Ta
xi
d
am
ag
e
€
R
ep
ut
at
io
n
im
pa
ct
R
ed
uc
ed
re
ve
nu
es
€
Fi
ne
s
€
C
om
pe
ns
at
io
n
€
D
ri
ve
r
fa
tig
ue
Ti
pp
in
g M
ed
ia
co
ve
ra
ge
R
eg
ul
at
or
y
br
ea
ch
C
ol
lis
io
n
O
bs
ta
cl
e
ov
er
lo
ok
ed
P
re
ve
nt
iv
e
m
ea
su
re
s
C
or
re
ct
iv
e
m
ea
su
re
s
C
ar
in
sp
ec
tio
n
D
eb
ri
s
gu
ar
ds
In
su
ra
nc
e
A
ir
ba
gs
C
om
m
un
ic
at
io
n
Fi
g
. 3
.2
0
R
is
k
m
it
ig
at
io
n
m
ea
su
re
s
in
a
b
ow
-t
ie
d
ia
gr
am
. (
ad
ap
te
d
fr
om
P
ro
te
ch
t
20
13
)
136 3 Creating Value Through ERM Process
scenarios in the financial planning process can enhance a more rational, more formal
risk-based decision-making approach at management level which ultimately leads to a
more balanced risk and return management and in turn, creates value to the company.
Because the integration of ERM into business planning serves as the most important
precondition to improve decision quality, it is further detailed in the next paragraph
and illustrated with an example.
3.4.12 Align ERM with Business Planning
Unfortunately, very often in practice risk scenarios are discussed after business plans
have been developed and approved. Thus, the sole role of risk management is risk mini-
mization, similar to what we have called the “regulatory risk management approach” in
this textbook. Accordingly, risk-reward decisions and strategic choices based on rational
ERM input at the time decisions are taken is prevented. In many cases, planning pro-
cesses do not adequately represent risks and opportunities and represent risks incom-
pletely. Often, they underestimate the true risks and are positively biased. In addition,
at the time of the planning, many companies solely rely on historical data that is slightly
adjusted for future expectations (Schilling 2018, p. 30). A very important step is thus the
alignment of ERM and business-planning processes. Relying on the business plan rather
than on often too short-term, operational key figures enables a more future-oriented view
on risks and opportunities. This is obviously not a challenge unique to ERM, rather an
organisational and cultural challenge which involves far more personnel than only the
ERM team. A few of these challenges (not an exhaustive list) are presented as follows
(see similar NC State Pool College of Management, p. 3):
• First of all, integrating ERM into planning processes means a change in the company
that must be initiated and supported by the management (tone at the top). This change
process equals a shift from a rather risk-centric risk management approach (e.g. with
risk maps) to a more business-centric risk thinking. All parties involved should be
informed and trained accordingly as to why risk-adjusted planning adds value for the
company (Schilling 2018, p. 34).
• The CFO does not want to share his or her financial planning, forecasts and budget
information with the risk manager. This may be for political reasons or because the
CFO believes that the risk manager cannot provide relevant information to improve
the planning process. Specifically if the risk manager is hierarchically lower than the
CFO, this information often does not flow. Obviously, CFO’s must play an important
role in integrating risk management into planning and the subsequent decision-mak-
ing processes (Liu and Pergler 2013 p. 2).
• Management often believes that they already have a sound understanding of the inter-
nal and external uncertain environment. Management often has no reason to validate
137
its assumptions through a separate risk assessment. Thus, it perceives no value added
through the consideration of outcomes provided by the risk manager.
• If the company often has personnel changes in the area of business planning, the
underlying basic planning processes also may change again and again. This can lead
to frequent adjustments of how ERM can be integrated. For example, it may be the
case that before a change of personnel, the risk manager was involved in the planning
process by providing rational input to many assumptions underlying the planning.
This may fundamentally change with the appointment of the new staff. The planning
team now only considers its own information gained from other internal and external
sources and no longer considers the ERM team as part of the planning process.
If these challenges are successfully mastered, there are basically no more obstacles to
ERM into business planning. Usually, planning processes and the ERM process are initi-
ated in separate organisational units or departments. The strategic planning process for
example may begin with the CEO and the strategic planning team. The ERM process
ideally opens with the challenging of management assumptions followed by interviewing
management and board members (see Sect. 3.3.6 and 3.3.7). Very often, these two pro-
cesses are carried out in parallel on an annual basis. In many cases, the two processes are
completely separated from each other. There is no exchange of information between the
risk manager and the planning team. The processes are often not synchronised and thus
do not allow integration. In the following, a few hints on what to consider when aligning
ERM and business planning are discussed.
• Time-based synchronization of the two processes is the very first step for success-
ful integration. The planning teams depend on risk information before the plan will
be approved by management. Thus, all key risk scenarios that may have a significant
impact on business objectives must be communicated to the planning team well ahead
of the planning deadline(s).
• In larger companies, the planning process is often subdivided into several complex
sub-processes. Often it is an interaction between top-down and bottom-up processes.
From the group’s point of view, specifications and requirements commonly have to be
coordinated with plans from the individual business units. From a business unit per-
spective, each business unit manager basically must receive both the corporate stra-
tegic objectives and the key risk scenarios which may have an impact on the business
unit’s objectives. Ideally, each business unit takes this information into account in its
own planning.
• Before the kick-off of the planning process, the risk manager should contact the plan-
ning team. The aim is to clarify how to ensure that the risk manager and the planning
team discuss all planning assumptions and key risk scenarios in a structured manner
at the right time. Planning assumptions are potential key risk scenarios and must be
assessed accordingly by the risk manager. Conversely, it must be assessed whether
3.4 Assess Key Risk Scenarios
138 3 Creating Value Through ERM Process
key risks can cause deviations from the plan. The planning team and risk manager
should thus always coordinate potential risk information.
• Relevant risk scenarios need to be assigned to individual line items of the planning. It
is essential to determine which risk scenario can affect which planning item to what
degree (e.g. revenues, costs, discount rate). It is important to be aware that certain key
risks can affect planning over several years.
• Of course, the integration of ERM into planning only works if all risks are quanti-
fied, as recommended in this textbook. Risks that are only assessed verbally or quali-
tatively with ratings and scales cannot be incorporated directly into planning. These
risks are de facto assessed with zero impact (Gleißner 2014, p. 38).
• In order to fully exploit the benefits of integrating ERM into financial planning, it is
advisable to integrate ERM into an internal company valuation based on a discounted
cash flow (DCF) approach. Why is that the case? Basically, strategic risk scenarios
that affect a certain planning variable (e.g. revenues) for several years can be taken
into account. Budgets that are generally set for one year or less can not fully reflect
the long-term effects of strategic risks or any risk with a time horizon longer than
one year. Secondly, only at the cash flow level is it possible to capture financially all
impacts of any type of risk. In practice, the underlying key figure of ERM is often
EBIT or a similar profit figure. The use of a key performance indicator such as EBIT
is, of course, better than to dispense with it altogether and pursue isolated risk man-
agement. However, EBIT, for example, can not directly reflect interest and tax risk
scenarios. These would have to be taken into account additionally, which often is not
the case.
The following is a simplified example of how risk scenarios can be incorporated into cor-
porate planning.
Example
GreatSki Ltd. is a company based in Switzerland which manufactures and distributes
skis and, as part of a diversification strategy, ski clothing and ski accessories for sev-
eral years. GreatSki Ltd. has been valuing its company using a discounted cash flow
method for several years. This valuation serves as a basis for decisions on new strate-
gic options. Below is a simplified 4-year financial plan. From the fifth year onwards, a
residual value is calculated (based on a perpetuity calculation without growth).
Table 3.4 depicts that the planned company value without incorporating ERM rel-
evant information is EUR 28,614 based on all expected and discounted future cash
flows. The risk manager of GreatSki Ltd. discussed all possible risk scenarios and
uncertain assumptions in a meeting with the controller. Ultimately, it was agreed
which key risk scenarios affect which line item and thus could lead to unexpected
deviations of the planned values. For the sake of simplicity, only four risk scenarios
(3, 5, 7, 12) are included in Table 3.4, which may have an impact on revenues, costs
and taxes. The next step is to quantify the four identified key risks. The risk manager
139
uses the quantitative scenario technique and develops several quantified scenarios for
each risk.
The assessment of two example risks is shown in the following two tables. Risk 3
represents “new competitor entering the market” whereas risk 12 is briefly described
as “unfavourable tax negotiations”.
Table 3.5 shows the quantification results of risk scenario 3. Only two scenarios
have been assessed, a pessimistic and an optimistic one. The risk manager attached to
each risk scenario a probability of occurrence of 10%. The probability that this plan
will unfold as planned is thus the residual value of 100% – 10% – 10% = 80%. It is
further expected that the impact of that risk occurring lasts for two years (2020 and
2021).
Table 3.6 shows the second quantified risk scenario 12. Compared to the former
one, the tax risk does not comprise an “upside scenario”. It is assumed (or expected)
that this risk will not occur (75% probability). Thus, only a pessimistic scenario exists
for the tax risk.
With this information, the expected company value can now be reassessed taking
into account these risk scenarios. On the one hand, the isolated impact of each single
individual key risk scenario on the planned values can be considered. On the other
hand, it is possible to simulate all possible combinations of risks and their simultane-
ous impacts on the planned value using a Monte Carlo simulation. Figure 3.21 shows
3.4 Assess Key Risk Scenarios
Table 3.4 Financial plan of greatSki AG
EUR thousand Risk scenarios 2019 2020 2021 2022 2023 2024 and
thereafter
Revenues 3, 5, 7 4,150 2,450 3,000 2,700 2,475
− Costs 3, 7 600 400 450 450 425
= EBITDA 3,550 2,050 2,550 2,250 2,050
− Amortisation 75 75 75 75 75
= EBIT 3,475 1,975 2,475 2,175 1,975
− Tax 12 50 50 50 50 50
= NOPAT 3,425 1,925 2,425 2,125 1,925
+ Amortisation 75 75 75 75 75
= FCF Entity 3,500 2,000 2,500 2,200 2,000
WACC (Weighted
average cost of capital)
7.5% 7.5% 7.5% 7.5% 7.5%
Net present value FCFs
2020–2023
3,256 1,731 2,012 1,647 19,968
Residual value – – – – 19,968
Company value 28,614 – – – – –
140 3 Creating Value Through ERM Process
Table 3.5 Quantified risk scenario 3 „new competitor”
Scenario 3 (EUR
thousand)
Probability (in
%)
ΔRevenues
2020
ΔCosts 2020 ΔRevenues
2021
ΔCosts 2021
Pessimistic
Scenario
10% −01,000 −200 −750 −200
Plan (no risk) 80%
Optimistic Scenario 10% +200 0 +500 0
Table 3.6 Quantified risk scenario 12 „unfavourable tax negotiations”
Scenario 3 (EUR
thousand)
Probability (in %) ΔTax 2020 ΔTax 2021 ΔTax 2022 ΔTax 2023
Pessimistic
scenario
25% −1,400 −200 −400 −500
Plan (no risk) 75%
Optimistic scenario 0%
18000 22891 28614 33000 38000
– – – – – – – –
Company Value
Plan
20% Loss of
Company Value
– – – — — –
13000
12%
Fig. 3.21 Simulated company value greatSki Ltd.
141
the result of the simulation run which included all key risk scenarios 3, 5, 7 and 12
incorporated in the financial plan.
The risk appetite defined by the board of directors is a maximum of 10% probabil-
ity of losing more than 20% of company value. The planned company value amounts
to EUR 28,614 (see above). The output of the simulation shows that the probability
of losing more than 20% of the company value next year (corresponds to a value of
22,891) is 12%. This corresponds to the current risk exposure. The absolute deviation
thus is EUR 5,723. However, the risk appetite of GreatSki Ltd. is set at a maximum
of 10%. The risk exposure (current situation) is thus higher than the risk appetite (tar-
get). Management would now have to decide about measures to reduce the risk expo-
sure accordingly.
Ultimately, integration of ERM into business planning only provides value if decisions
are actually based on it or are at least supported by the information gained through that
alignment.
3.4.13 Replace Standard Risk Reporting
Normally, many books on risk management include standard risk reporting as an inde-
pendent chapter at the end of the risk management process. It is often defined as a rela-
tively independent process step that ultimately produces several specific risk reports for
business units, top management, internal audit and the board. Commonly, risk manage-
ment standards and policies promote that both the managers and many other stakehold-
ers must be informed about possible risk sources, risk events and potential impacts.
Information and communication on risks must be clear, timely and accurate. As not all
recipients of risk reports require the same risk information, risk reports shall be created
for different hierarchical levels (Erben 2015, p. 163).
Risk reporting is often considered as the most important deliverable of the risk man-
ager’s work. But what do we mean by a standard risk report, and why is risk reporting
included in this chapter on decision-making? Let us first have a look at the following
example of a very traditional risk reporting approach.
Example
The risk report of the CleverRisk Ltd. for the board of directors contains all risks
that the risk committee defined as key risks. The report comprises about 80 pages,
as it describes around 180 key risks in detail. All risks are assessed according to their
financial impact on EBIT and probability of occurrence and are described in various
scenarios. The risk report also contains planned and already implemented risk mitiga-
tion measures and their corresponding degree effectiveness. A risk owner is assigned
to each risk. Trends for each risk (increasing, stable, decreasing risk) are also included
in the risk report.
3.4 Assess Key Risk Scenarios
142 3 Creating Value Through ERM Process
The report enables the board of directors to fulfil its legal obligation to manage
risk. In particular, the board may
• review the implementation of risk management,
• discuss the most important risks of CleverRisk Ltd.,
• decide on the implementation of risk mitigation measures and delegate their imple-
mentation to the executive committee and
• compare risk appetite statements with current risk exposures.
The risk report is prepared once a year and must be approved by the board. Only the
management receives an update of the top risks during the year, i.e. on a quarterly
basis.
The agenda of the today’s board meeting includes, among other items, decisions
on new production sites and the development of a new product line. The last item on
the agenda will be the risk report, which will allow 20 min of discussion time. The
discussion about the new production sites is taking longer than planned. However,
since it is absolutely necessary to cope with all the items on the agenda, the time
required to discuss the risk report is reduced to 10 min. The risk manager was invited
to the meeting specifically for the last item on the agenda and is already eagerly
awaiting his appearance in front of the meeting room. Meanwhile, the most impor-
tant strategic decisions have been made and the risk manager sits down at the meeting
table.
All board members bend over the comprehensive risk report before the chair-
man asks the risk manager: “Has anything changed since the last report? Have new
top risks been added?” The risk manager replies: “We added the data loss risk. This
was not previously rated as a top risk”. A few minutes are spent discussing whether
the proposed risk mitigation measures are sufficient for this risk. Then the chairman
of the board asks: “If everyone agrees with the risk report, can we approve it in this
way?” The risk report was approved within the shortened 10 min discussion period.
One member of the board suggested that it was not ideal for some risk owners not to
have the authority to decide on risk mitigation measures. The risk manager is tasked
to check this problem within the next three months and provide a brief update. The
meeting is thus closed and the risk manager is gratefully acknowledged for the com-
prehensive risk report.
This example is, of course, an extreme case, but not so rare in practice. It shows what
we mean by standard risk reporting: providing an isolated risk report on a yearly basis,
which basically is irrelevant for decision-making processes. The example clearly shows
that relevant decisions were made without taking the risk report into account. Since
the report is only made available to the board of directors once a year and to manage-
ment twice a year, no risk-relevant information flows into any other meetings at all.
Although the board of directors is required to understand a company’s risk exposure and
143
corresponding risk mitigations, board members often decide predominantly on intuitive
knowledge without taking into account the more rational information created by a sound
ERM programme.
Standard risk reporting on single risks (often visualised by means of risk maps) often
lack a comprehensive view on company-wide risks. Even if it is the case that the board
recognises the risk report as an important decision-making resource, the often missing
view on aggregated risks on specific objectives makes it difficult to assess the total risk
exposure a company faces. Even if the board perceives all risks connected to the decision
of the new product line as acceptable, it may be the case that other product lines require
more risk taking to compensate some cannibalization effects of the new line. Actually,
the board considers only a very small slice of the risk pie and ignores the risks attached
to other areas of the company. Maybe the new risks associated with the positive deci-
sion on the new product line would become relevant from a portfolio view on all risks
(see a similar example in Levine 2015, p. 12). The message here is that very often, only
the risks connected to a specific decision are taken into account, ignoring the shift of the
overall risk exposure.
In many companies, traditional, independent risk reporting is common practice in risk
management today. Usually the board of directors or management specifically require a
standalone risk report on a regular basis. In some cases, there are specific legal require-
ments to prepare such isolated risk reports. Of course, these requirements must be met.
However, instead of creating isolated risk reports that in most cases are treated indepen-
dently from relevant decision-making processes, risk managers should aim at integrating
relevant risk information into management and board reporting and presentations.
Why is this the case? Let us recall what management reports are made for. Ultimately,
top management reports are designed to support decision-making processes and strat-
egy execution by providing transparent information on current business conditions and
potential uncertainties regarding future developments (Deloitte 2016, p. 2). These reports
include financial, marketing or operational information that is reported to internal man-
agement to be used as a basis for decision-making within the company. Management
reports are usually prepared monthly or even more often. Management reports are volun-
tary reports, so they can be created according the needs of every company freely and do
not have to meet any formal principles or regulatory requirements.
For example, management reports typically include items such as product-line profit
and loss statements, management dashboards including key performance indicators
(KPI) and early warning indicators, profitability reports, budget variance reports, infor-
mation about strategic initiatives and strategic projects, profit and cost centre reports and
many more. Ideally, management reports may provide answers to questions such as why
significant deviations from plans occurred, what is going to happen in the future or what
kind of measures, actions or controls can be implemented to increase the probability that
certain objectives will be achieved. All these questions can be answered partially or com-
pletely by risk-relevant information. When management reports are relevant to decision
3.4 Assess Key Risk Scenarios
144 3 Creating Value Through ERM Process
making, these decisions relate to measures and actions that lie in the future and are thus
uncertain (risky).
The same is true for management reports as for risk reports: to be relevant for decision-
making purposes, the reports must be provided to decision-makers at the time the deci-
sion is taken and must contain relevant information to ideally support decision-making
processes. For example, in a recent European survey conducted by Deloitte (2016) that
covers different industries, one finding is that there is basically need for more business
information in management reports. Often, management reporting is too heavily focused
on past financial information. However, decisions are related to future developments and
trends and require thus more future-oriented business related information beyond finan-
cials. Specifically, management is increasingly interested in information about relevant
sources (business drivers) which affect financial results (Deloitte 2016, p. 3).
Although the term “risk management” does not appear explicitly in the survey by
Deloitte, it is obvious that for example the business drivers can be subjected to a risk
analysis (risk-oriented assumption analysis). The individual business drivers could thus
be supplemented with a more rational, quantified scenario analysis provided by risk
management. The required additional future-oriented information in management reports
could be enriched with decision-relevant strategic risk scenarios. Additionally, KPI could
be supplemented with key risk indicators (KRI) which may serve as risk-based early
warning indicators. To make the long story short: We strongly believe that it is a good
idea to integrate risk management information in management reports where useful, so
that an isolated risk report is no longer necessary.
Apart from management reports, it is crucial to provide complete and accurate risk
management information at board level where essential decisions are steered. As pre-
viously discussed, very often decisions of the board are taken independently from risk
reporting. To change this, the board of directors should consider risk scenarios at the
time of decision-making. To do so, one suggestion is to provide the risk management
with relevant board presentations prior to the meeting. This enables the risk manager to
include one or two slides on risks and opportunities for all upcoming decisions. Again,
the aim with that is balancing intuition with more rational risk information. This is a
straightforward example of how ERM information can enhance decision quality imme-
diately. More generally, a company may consider including in a policy that information
from risk management on risk appetites and risk exposures must be taken into account
in all relevant decisions and objective setting processes. Subsequently, internal reporting
templates could adapted accordingly. The following examples illustrate a concrete proce-
dure how to integrate risk information into decision-making (see similar Sidorenko and
Demidenko 2017, pp. 23, 81).
Example
The controller at GreatSki Ltd. has decided to advance ERM to a decision-making
tool. She is pondering how the risk management of GreatSki can be better integrated
into decision-making processes. After having read a modern textbook on ERM, she
145
is aware that risk management should never be treated as a stand-alone process. An
effective way to foster a positive risk culture is to integrate accurate and consistent
risk assessments into various decision-making processes at GreatSki Ltd.
She suggested the following procedure how to start that process of integration risk
information into decision-making (adapted from Sidorenko and Demidenko 2017,
pp. 23, 81):
• She offered to review all important business decisions of the last few years to
assess whether rational information on decision-relevant risks and opportunities
have been collected, analysed and used as a basis for these decisions. Surprisingly,
no information flowed from risk management into all of these decisions. On the
basis of a number of past decisions, she was able to show that the decision quality
would have been higher if corresponding risk scenarios had been incorporated into
the decisions at that time.
• After discussing these important findings with the management, it was decided
which type of business decisions (e.g. financing, strategic, operational), which are
regularly made by management, could benefit most from an additional rational risk
analysis (balancing intuition with rationality).
• As a quick win, it was decided that key risk scenarios are no longer reported as a
separate agenda item at the end of the meetings. The reason is that these key risk
scenarios have not been considered in any type of decision.
• Despite some initial scepticism, the board of directors has decided that risk analy-
ses can be directly included in all board presentations. The controller developed
concrete suggestions on how risk-relevant information can be made available to
decision-makers at board level at the right time, i.e. before decisions are made: in
order to this process, she proposed some changes to the current MS PowerPoint
templates which have been used to date for the discussion of decisions. The inclu-
sion of a simple section in such templates entitled “risks related to the proposed
decisions and possible actions” can help to raise risk awareness, increase the need
for timely risk analysis and enhance the “risk attitude” of decision-makers.
3.4.14 Disclose Risks Appropriately
One major challenge of the on-going risk debate is the adequate disclosure of risk infor-
mation by companies to its external stakeholders (Linsley and Shrives 2006). Many neg-
ative events in the last two decades as the 09/11 attacks, the global financial crisis, fraud
scandals and bankruptcies of a few large companies as the famous grounding of Swissair
has led to increased interest in ERM in general and risk disclosures specifically. Causes
for such negative events with subsequent broad media coverage are amongst others to
be found in immature ERM programmes and deficiencies in adequate risk disclosures
(OECD 2014; Soliman and Adam 2017). These developments have forced regulatory
3.4 Assess Key Risk Scenarios
146 3 Creating Value Through ERM Process
bodies to reassess their existing corporate governance recommendations and guidelines
and to adapt them in order to better protect shareholders, lenders and investors (Soliman
and Adam 2017). Switzerland for example started an initiative at the beginning of the
year 2000 to enhance transparency in the business sector by issuing the Swiss Code of
Best Practice for Corporate Governance (OECD 2014).
Basically, we can differentiate between mandatory and voluntary risk disclosures.
Mandatory risk disclosures forces companies by law to publicly discuss—among other
items—specific information of the risk management process and specific risks which
may significantly affect the company’s performance. These mandatory disclosures are
country-specific, i.e. it depends on the legal requirements where a company is located.
Such mandatory risk disclosures in annual reports or in SEC filings (USA) encourage
companies to invest in their ERM programme (Tian and Chen 2009). In contrast, vol-
untary risk disclosures may be used as a business communication strategy, i.e. to signal
the maintenance of adequate risk management processes in order to positively influence
external decision-makers. Ultimately, risk disclosures shall create a positive relationship
of trust and transparency between external stakeholders and the company, which in turn
may lead to an increase in shareholder value (Deloitte 2012).
However, such risk disclosures are critically discussed. For example, many listed
companies which are required to disclose risks are rather wary or even reluctant to share
true and relevant risk information in any more detail (e.g. quantitative scenarios of stra-
tegic risks) than required by law. The reason is quite simple: companies are not willing
to be perceived more risky than any competitor in the same industry. This could expose a
company to the risk of losing company value (drop in share price). Why is this the case?
To be a first-mover in the sense of disclosing “true and relevant” risk information is con-
sidered as a relative disadvantage compared to all other companies disclosing rather
vague risk information.
Recent research supports the hypothesis that much of the information on risk that is
disclosed in company annual reports is boilerplate in nature and not particularly useful.
Further, it appears to be little interest among professional users of this information due
to concerns about the quality and usefulness of this type of disclosures (OECD 2014):
„where disclosure is non–specific, (…) or merely describes a risk management policy,
its use is limited” (Abraham and Shrives 2014, pp. 91–92). Thus, most companies only
disclose risk information at a very much aggregated level that is not relevant for any
decision-maker. In addition, most mandatory disclosed risk information is at best only
industry-specific and very rarely company-specific.
These symbolic, rather boilerplate disclosures (Day and Woodward 2004) will be of
very limited use to readers and external stakeholders may find it difficult to obtain more
information about the companies in order to assess the risk exposures faced, assess the
overall risk profile and understand the risk appetite. In the long run, such disclosures will
be ignored as they are seen as irrelevant. Company-specific information is much more
likely to differ from year to year rather than very general information that might apply to
every year. This suggests that management needs to reassess all risk disclosures regularly
147
to decide which disclosures are still relevant and which need to be updated or deleted.
Very often, management prefers routine general disclosures that are persistent over time
over ongoing change and reassessments. Another reason for limited interest in disclosing
company-specific risk information is that managers are not convinced that risk disclo-
sures actually lead to improvements in their own ERM programme. While this behaviour
is comprehensible in practice, such disclosures are of limited practical use (Abraham and
Shrives 2014; Kunz 2015, p. 13). Thus, many risk professionals, analysts and investors
believe that there is not much value for decision-makers to consider these risk disclo-
sures thoroughly (see similar Rees 2015, p. 10).
Research on that topic is ambivalent, too. For example, Linsley and Shrives (2006)
argue that companies with higher levels of risk will disclose more risk information as
management is forced to explain the causes of the higher risk exposures. On the other
hand, companies having higher risk “may not to want to draw attention to their ‘riski-
ness’ and, conversely, therefore may be reluctant to voluntarily disclose significant
amounts of risk information” (Linsley and Shrives 2006, p. 391). From this an investor
or lender is not able to conclude with certainty whether a company is actually riskier if it
discloses more about its risks than another one disclosing less.
Theoretically, risk disclosures are of course very important and shall support deci-
sion-makers with transparent information about the maturity level of the ERM pro-
gramme as well with company-specific risks and opportunities related to strategy and
operations. Conversely, many stakeholders indeed expect companies to discuss the
most relevant business risks thoroughly. From a signalling theory perspective, it may
be meaningful to include statements in the annual report about the overall high com-
mitment to risk-oriented strategy development and execution as well about how ERM
is incorporated in major investments and decisions. Signalling theory has been used by
many researches to explain the motivation of companies to disclose risks voluntarily. For
example, Elzahar and Hussainey (2012) suggest that companies in the same industry sec-
tor are more likely to adopt the same level of disclosure. The reason is if a company dis-
closes less risk information than others within the same industry, it may be interpreted as
a signal of hiding bad news. This again can lead to a loss in shareholder value. However,
again, it is still not empirically validated if such risk disclosures have primarily a posi-
tive, a negative or a neutral effect on company value or any performance measures. In
addition, it is not yet clear what role such disclosures actually play in the decision-mak-
ing process of investors, lenders and shareholders.
Companies usually disclose their risk information in a separate section of the annual
report. At this point, we can refer to the discussions on internal risk reporting. One major
requirement of sound internal risk reporting has been the integration of risk relevant
information in management reports or board’s presentations to provide risk information
at the time the decision is taken. Analogous to internal risk reporting, we can draw sim-
ilar conclusions for external risk reporting. It is probably most appropriate to allocate
risk disclosures according to the various topics in the annual report. For example, stra-
tegic risk scenarios can be added to the discussion of strategic objectives. Financial risk
3.4 Assess Key Risk Scenarios
148 3 Creating Value Through ERM Process
scenarios can be assigned to the financial reporting. Thus, it shall be attempted not to
present risks in a separate chapter in the annual report, but to include them where they
have a corresponding reference to specific topics (see similar Sidorenko and Demidenko
2017, p. 79). The following example illustrates two companies which disclose risks in
a separate risk management section, independent from the corresponding management
topics. These two examples are chosen randomly and represent the current structure of
Swiss annual reports.
Example
Looking at a recent annual report of Swisscom AG (Swisscom is a major telecommu-
nications provider in Switzerland, headquartered in Worblaufen near Bern), the reader
can find the following disclosures on risks related to the telecommunication market on
page 53:
Increasing competition driven by national infrastructure providers and service providers
who do not have their own telecoms infrastructure is exerting transformation pressure on the
business. During this transformation, the complexity resulting from the parallel operation
of old and new technologies has to be reduced to enable new, attractive services. Here there
is a risk that the revenue from the classic telecoms business will not be secured sustain-
ably during the transformation process, while at the same time technical complexity remains
undiminished. Moreover, a trend can currently be observed towards national and interna-
tional cooperation among telecommunications providers, the purpose of which is to provide
low-cost services internationally and exploit major synergies and economies of scale. There
is a risk that Swisscom will not be able to align its cost structures with its current and future
competitors, which would narrow the scope for investment, innovation and price reductions.
If such risks materialise, this could delay implementation of the strategy or have a detrimen-
tal effect on customer satisfaction. Swisscom has initiated measures in various areas to man-
age these risks (Swisscom 2017, p. 53).
This risk factor, as it is called in the annual report, is part of the last (!) paragraph
“risks” of the chapter “management commentary”. However, the very first paragraph
of that chapter deals with “strategy and environment” starting on page 16. So basi-
cally, as the risks associated with the telecommunication market are highly relevant
for achieving the strategic objectives of Swisscom, it might be a good idea to incorpo-
rate risk information into the strategy discussions.
Another example is Sika, a specialty chemical company for building and motor
vehicle supplies, headquartered in Baar, Switzerland, disclosed the following infor-
mation on its “customer and market” risks:
Sika has a policy of strategic diversification to limit market and customer-related risks.
Geographical diversification is tremendously important in the locally based construction
industry given the sometimes contrary business trends witnessed in this sector in different
regions of the world. Customer diversification—with no single customer accounting for
more than 2.0% of Sika’s turnover—is another stabilizing factor. As a further safeguard
against economic fluctuations, Sika operates both in the new-build sector and in the less
cyclical renovation and maintenance market (Sika 2017, p. 34).
149
As Sika states, their risk management is geared towards integration into strategic
decision-making processes. However, the same applies here as in the Swisscom exam-
ple: The risk disclosures (pp. 33–35) are completely separated from information on
strategy and the business environment (pp. 14–16).
A recent study conducted in Switzerland on how and what Swiss companies disclose
about risks in their annual reports revealed that most of the companies are very positive
about their business risks and their performance and one rather gets the impression that
annual reports underestimate true downside business risks or are biased towards good
risks. This is supported by the fact that two third of the total amount of risk disclosures
collected in 2014 are “good risks” (opportunities), downside risks are barely mentioned.
Maybe, these risk disclosures rather act as a marketing tool convincing the potential
investor of the many future upside potentials. What all risk reports have in common is
stating that risk management exists and is of high importance. Usually, there is also a
statement that the board of directors is ultimately responsible for risk management and
how frequent the (regulatory) risk management process is performed (Kunz 2015, p. 46).
In summary, it can be said that the current practice of risk disclosures in many coun-
tries offers only very limited added value. As long as no company-specific, quantified
risk scenarios are published and no information is provided on how they are considered
in decisions, no support can be created for external decision-makers. Policy makers need
to think about how they will deal with external risk disclosures in the future. An integra-
tion of risk-relevant information into the strategy discussion of annual reports would be a
first step in the right direction.
3.5 Assess and Improve ERM Quality
Once ERM has been implemented, it must be continuously improved. This means that it
needs to be subjected to effectiveness tests. It is important to find out whether ERM has
performed as intended, i.e. if it supported the creation of a balance between rationality
and intuition in decision-making processes. Many companies are not able to answer the
question whether their ERM is effective and how it can be assessed. Specific “perfor-
mance indicators” for ERM programmes are largely lacking. The following paragraphs
present some approaches on how companies can assess ERM effectiveness and which
are less meaningful in practice.
3.5.1 Test ERM Effectiveness Appropriately
Although the first presented test is widely used, it is not sufficient to test ERM effective-
ness (Gleißner 2018, pp. 18–19). It is a formal test and is similar to an audit-like proce-
dure. Basically, the test is about checking whether formal ERM requirements are met.
3.5 Assess and Improve ERM Quality
150 3 Creating Value Through ERM Process
This requires a review of all available documents and policies related to ERM. Following
our approach of ERM presented in this textbook, we can collect information on how
risks are being identified, assessed, aggregated, and linked to objectives and to decision-
making processes. Further, we might check how risk information is incorporated in exist-
ing reporting structures. In addition, we can have a look at documents containing risk
appetite statements and how ERM is organised, i.e. what roles and responsibilities have
been defined. If separate risk reports exist, we can check if these reports are updated
regularly and provided timely to the different decision-makers.
All these documents can be assessed according to the following criteria:
• Up-to-date
• Completion
• Responsibility for creating and maintaining these documents
• Clear definition of the recipients of the documents (reporting)
Of course, this formal check of the documents does not yet tell us anything about
whether ERM is actually used for decision-making and what the quality of the ERM pro-
cess results looks like. The second test focuses more on the quality of the information
provided by the ERM process. As we have learned, results from the ERM process should
be available at the time decisions are taken. This test is based on challenging whether the
ERM requirements of the different stakeholders have been met. First and foremost, man-
agement and the board must assess whether
• relevant risk categories are covered (no exclusive focus on financial risk)
• risks are comprehensibly assessed (by means of quantitative scenario analysis, not
stochastic black box models)
• risks are graphically prepared in such a way that they can be used for decision-mak-
ing (no risk maps)
• opportunities and risks have been assessed, not only the downside risk
• individual risk exposures are compared with the defined risk appetite statements
• key risk scenarios are communicated in a comprehensible way and their impacts are
linked to relevant key figures (company value, EBIT, cash flow, etc.)
A third approach to test ERM effectiveness is particularly well suited to assessing
whether ERM is achieving its ultimate goals. The two previous approaches can comple-
ment this test by contributing to a more comprehensive assessment. The following test is
relatively simple and asks whether all relevant decisions (investments, financing, strate-
gic options, risk mitigation measures) were supported by ERM information in the past
(e.g. last fiscal year). For this purpose, past decision-making processes should be recon-
structed. Basically, it is desirable that intuitive analyses of the management are well bal-
anced with the quantitative risk analyses of the risk manager in all relevant decisions.
The point here is not to assess whether the risk manager or the management was “right”
past decision (cf. Sect. 3.5.1). Rather, it plays a crucial role whether the discussion on
151
“rationality versus intuition” took place at the time of the decisions. It is clear that the
proportion of such “balanced” decisions in relation to all decisions within a company
may indicate the ERM relevance. If the test result reveals that ERM information is not
relevant for most of the decisions or such quantitative risk information is usually overrid-
den by management, this indicates very low ERM effectiveness.
A last suggestion to test ERM effectiveness relates to the analysis of target deviations
and their causes (see similar Gleißner 2018, p. 19). Based on this test, a statement can be
made as to whether ERM can actually provide relevant information about uncertainties
affecting business objectives. All past target deviations for a specific period, for exam-
ple for the last fiscal year, are collected and analysed. For all identified deviations (e.g.
strategic deviation regarding market shares, operational deviation regarding production
costs) the corresponding causes should be identified. The first purpose of this test is thus
to understand which causes contributed to the missed targets. If all (or at least most)
causes are known, it must be analysed whether these causes have been identified as risks
in the risk identification process or not. The more deviations can be explained by risks
identified at that time, the more effective the ERM is. Let us illustrate that effectiveness
test with the following concrete example.
Example
The world’s leading supplier of high-quality chocolate and cocoa products, Barry
Callebaut, is exposed to a variety of risks and uncertainties. An excerpt of the key risk
list (the full list consists of 12 key risks) according to the publicly available risk dis-
closures in the annual report 2017/2018 is provided in Table 3.7.
So how could an ERM effective test look like? Barry Callebaut recently announced
an important innovation in the chocolate industry: In addition to milk chocolate, dark
chocolate and white chocolate, a fourth variety, named “ruby”, has been created. The
launch of an innovative product is always associated with risks and opportunities.
One particular risk related to that newly introduced product occurred in 2017. Barry
Callebaut’s creation “ruby” did not fit the US Food and Drug Administration (FDA)
definition of what is allowed to be sold under the label “chocolate”. At that time,
Barry Callebaut was not allowed to sell its invention as “chocolate” in the United
States of America.
Obviously, this is a risk which falls into the regulatory risk category. Referring to
the effectiveness test, the relevant question at this point is: Has this risk been identi-
fied and included in any type of risk assessment by risk management? Or is this risk
occurrence a deviation from plan not previously recognised and assessed by the ERM
team? If we have a look at the key risk list, it is obvious that legal, regulatory and
compliance risks have been identified and assessed as key risks (see the last key risk
in Table 3.7). In so far, from an external point of view, we can assume that these kind
of risks (regulatory hurdles) have been incorporated in the ERM process. The same
procedure applies for any risk that occurred in that fiscal year. If Barry Callebaut
can match each deviation from budget with corresponding risks, the ERM process is
highly effective (even if the outcome was a bad one).
3.5 Assess and Improve ERM Quality
152 3 Creating Value Through ERM Process
Table 3.7 Excerpt of key risk list of Barry Callebaut 2017/2018. (Barry Callebaut 2018,
pp. 12–13)
Key risk Risk description Risk mitigation
Long-term
sustainable
supply of
cocoa
(…). Risk factors such as declining
productivity attributable to aging trees,
aging farmers and little interest from
the next generation in becoming farm-
ers, the conversion of cocoa bean fields
to other, more attractive crops, and
also the long-term impacts of climate
change could lead to a shortfall in
high-quality cocoa beans in the mid- to
long-term
Under the umbrella of its overall sustain-
ability strategy Forever Chocolate, the
Group aims to improve the productivity
and livelihood of farmers. Long-term
measures also include the continuous
evaluation and diversification of supply
sources in origin countries, develop-
ing improved agricultural practices for
cocoa farms and maintaining an industry
dialogue with key stakeholders in origin
countries
Rapidly
shifting
consumer
trends
Rapidly shifting consumer trends may
disrupt market and industry dynamics
that could impact the future growth of
the Group’s business
Trend analysis by the Group’s marketing
and customer insight teams, together with
cross functional commercial teams work-
ing closely with customers, aim to identify
trends early in the marketplace, both posi-
tive and negative. The Group constantly
invests in R&D as part of a well-structured
process, enabling the Group to develop
products which proactively address new
trends and changing demand patterns
Business
transfor-
mation
(…). Ineffective project portfolio man-
agement and implementation, insuffi-
cient due diligence, inaccurate business
plan assumptions or inadequate
post-merger integration processes can
all have negative consequences. Failure
to invest in technology that is no longer
competitive or becomes obsolete may
further impact the successful execution
of business transformation. These fac-
tors can result in an underperforming
base business, reduced synergies, or
higher costs than expected
All major business transformation
projects are prioritised and monitored
by the Group’s Executive Committee
and Strategy Team. The Group deploys
dedicated teams with significant experi-
ence and capability for their respective
business transformation projects. These
teams proactively follow market, technol-
ogy and other trends and work in close
collaboration with functional and regional
experts, external advisors, and the Group’s
Executive Committee. (…)
(continued)
153
In addition, reviewing the effectiveness of ERM programmes gives management an
opportunity to adjust its risk appetite statements and subsequently to decide about fur-
ther risk mitigation measures. One major objective of a sound ERM programme is to
steer risk exposures as close as possible to the corresponding risk appetite statements. In
other words, the maximum amount of accepted risk may be taken to exploit the expected
rewards associated with that risk. For example, management may closely monitor the
financial performance of a product line in a specific country over the last three years and
assesses competitor risk. If management concludes that the risk exposure of that product
line is less than originally determined (due to high market entry barriers), the company
can decrease the risk appetite for this product line in order to take on more risk in other
strategic initiatives.
3.5.2 Increase ERM Maturity Level
Using a meaningful risk maturity model allows companies to benchmark how their cur-
rent ERM practices match the suggested approaches in this textbook. Maturity models
are simple instruments that support corporate management to assess and improve their
business processes and organisational structures (Moutchnik 2015, p. 162). In the fol-
lowing, we will briefly explain the basics about maturity model and its components (see
Müller 2018).
Maturity models enable corporate management to review internal processes like
ERM and structures like risk governance in order to identify weaknesses within the
company. They can be considered as tools that help to analyse an as-is situation or a
3.5 Assess and Improve ERM Quality
Table 3.7 (continued)
Key risk Risk description Risk mitigation
Legal, reg-
ulatory and
compliance
The Group is subject to both interna-
tional and national laws, regulations
and standards in such diverse areas as
product safety, product labelling, envi-
ronment, health and safety, intellectual
property rights, antitrust, anti-bribery,
employment, trade sanctions, data pri-
vacy, corporate transactions and taxes
in all the countries in which it operates
in as well as stock exchange listing and
disclosure regulations in a constantly
changing regulatory environment. (…)
Dedicated regional and local functional
managers, supported by specialised
corporate functions and external advi-
sors, ensure compliance with applicable
laws and regulations. The Group has
robust policies and procedures in place
in the relevant areas. The Group’s Legal
Department oversees the Group’s compli-
ance programme, which ensures awareness
of the compliance risks and the Group’s
compliance standards. The Code of
Conduct and other Group policies set out
the legal and ethical standards of behav-
iour expected from all employees working
within the Group
154 3 Creating Value Through ERM Process
so-called current state. In some cases, maturity models also suggest improvement activi-
ties in order to obtain a higher-ranked to-be state. In other words, they either assess the
current state for benchmarking reasons or they can be used for continuous improvement
of the company. In that sense, maturity models postulate that a certain object, tool or
process progresses through different stages of maturity (Moutchnik 2015, p. 162; Frick
et al. 2013, p. 274). The ultimate goal for some companies is to achieve the final maturity
stage, which can be seen as the “perfect state” where no further improvement is possible
anymore (Müller 2018, p. 22). Maturity models are widely used in practice. Nowadays,
more than a hundred different concepts are available (De Bruin et al. 2005, p. 3). The
spectrum of such models start from a specific area of the company (process, function) up
to the company as a whole (Wendler 2012, pp. 1317–1318). Maturity models are nowa-
days applied in many different fields of business, likewise in risk management.
Maturity models consist of two main components: The capabilities and the maturity
levels (Müller 2018). Capabilities are the main areas of interest that an organisation likes
to assess. These objects, like the ERM process, can be decomposed by a list of criteria
and can be consequently measured. Examples for such capabilities are processes, docu-
ments, experiences, knowledge, or application steps. Most of the maturity models refer
to more than one assessment criterion (capabilities) and are thus called multidimensional
models. Maturity levels are the second component of a maturity model. They consist of
consecutive stages starting from a very low to a very high maturity level. Many maturity
models comprise five maturity levels, but their number can vary from three to six levels
(Wendler 2012, p. 1319). Based on suggestions by Romeike (2018, p. 57) and Hunziker
(2018, pp. 21–26) and on some updates suggested for this textbook, the following ERM
maturity levels can be differentiated:
• Level 1—Informal ERM: The first level is predominantly characterised by a miss-
ing (formal) commitment of the management for ERM. The value-adding compo-
nents of ERM are not acknowledged by management. This fundamentally prevents
a company from an adequate development of a positive risk culture and an effective
ERM. Usually, at this stage, no documented risk policy is available which serves as an
important guideline for ERM objectives and ERM implementation. Additionally, no
formal ERM process for identifying, assessing and managing risks has been defined.
Thus, risks are mainly identified only on an ad hoc basis. Companies at this stage
often lack ERM expertise and ERM tools. Some companies deliberately do without
a formal ERM since dealing with risks can make (too) risky businesses and missing
ERM competencies transparent. “Level 1 companies” perceive risks as weaknesses
(downside risk perception) and are thus not systematically assessed and disclosed.
Such companies may be under constant economic pressure or in crisis situations that
lead to a lack of resources or a lack of willingness to implement an additional ERM
process. Also, fast-growing start-ups at the beginning of their business lifecycle may
be at this very informal ERM maturity level.
155
• Level 2—Basic ERM: At this second stage, companies implemented a very basic, par-
tial ERM. Usually, it is not harmonised in terms of process steps and terminologies
and only focuses on a limited amount of (risk) areas. There is only little commitment
and interest of the management in ERM and, consequently, credibility and added
value is limited. No formalised ERM process is defined, and ERM knowledge within
the organisation is not shared and thus very limited. Often, a risk policy is still miss-
ing which prevents the development of a supportive risk culture.
Moreover, only (negative) risks of the most important current projects are covered.
As a rule, the risk manager is not very welcomed at the strategy table as he or she is
perceived as an obstacle to lucrative business. Risk information and adequate tools
for risk identification and risk assessment are rarely or insufficiently used. Employees
who are tasked with ERM assignments usually receive little support from manage-
ment due to a rather negative risk culture.
A partial and inconsistent (often purely qualitative) implementation of the ERM
process at this stage often leads to the absence of important key figures that could
demonstrate the value of an ERM. Risk aggregation, for example, is generally not
performed. As a result, ERM lacks credibility and is not perceived as a value-creating
tool for decision-makers. “Level 2 companies” are very common, specifically small
and medium-sized companies in Switzerland (and presumably in other countries too)
often run an incomplete, partial ERM which is not integrated into decision-making
processes (see Hunziker et al. 2016).
• Level 3—Evolved ERM: In contrast to the two previous maturity levels, level 3 is
characterised by a more formalised ERM process. There is a well-defined and docu-
mented ERM process available which allows identifying and assessing all types of
risks equally, i.e. strategic, operational and financial risks. Risks are assessed with
at least semi-quantitative approaches, often based on probability of occurrence and
financial impact. Roles and responsibilities of risk managers and risk owners are
defined and ERM is supported by simple software tools. A separate risk report is usu-
ally provided to management and the Board of Directors on a regular basis. However,
ERM is still not fully accepted as value-creating process which reflects in a miss-
ing risk policy and rather inappropriate risk culture (negative risk orientation). ERM
usually still exists as an independent approach at this maturity stage. Thus, it is not
sufficiently embedded in decision-making processes or strategy development and
execution. ERM is primarily perceived as a tool to prevent severe losses and not as
a management tool which can increase decision quality. The risk manager is still not
very welcomed at the strategy table for the same reason as in level 2. A sound risk
policy is still missing. Although ERM is accepted as important, a fundamental reluc-
tance to regularly invest in ERM can be observed. “Level 3 companies” do not fully
exploit the potential of ERM as it is still not incorporated in decision-making pro-
cesses. This maturity level dominates in Switzerland (see Hunziker et al. 2016).
• Level 4—Advanced ERM: For most companies, an upgrade from level 3 to level 4
is probably the largest hurdle and requires a fundamental reconsideration of the
3.5 Assess and Improve ERM Quality
156 3 Creating Value Through ERM Process
objectives of an ERM. The board of directors is in charge to develop an appropriate
risk policy. It is considered the cornerstone of any ERM programme. This includes,
for example, the objectives of ERM, the ERM organisation, individual risk limits,
sound risk appetite statements (see Sect. 3.5.6), the role of internal audit and risk
management mitigation strategies. The risk policy is a crucial precondition for reach-
ing level 4. All risks are equally quantified at level 4 (in monetary units), categorised
according to their causes and related to specific business objectives. Where useful,
risks are aggregated by means of a Monte Carlo-simulation and risk interdependen-
cies are taken into account. Risk exposures are compared to risk appetite statements
as a basis for decisions on risk mitigation measures. Risk information produced by
the ERM process is considered relevant for decision-making processes. Although risk
maps are often still in place, they do no longer serve as a major basis for decision-
making. At this level 4, key risks are quantitatively assessed using various scenarios.
Maturity level 4 requires a uniform ERM language throughout the entire company
(often, different terms, definitions and assessment methods have evolved over time in
individual risk areas which lead to confusion and non-comparability of different risk
categories). A sophisticated risk reporting enables decision-makers to take risk infor-
mation into account at the time decisions are taken. ERM is regularly assessed for
its performance (effectiveness tests) and, if necessary, companies invest in new tools,
techniques or know-how. At this high maturity level, ERM is also explicitly seen as
part of successful strategy development and execution. The risk manager is usually
member of management and a welcomed sparring partner in strategy meetings.
• Level 5—Leading ERM: To achieve the highest maturity level of an ERM, it requires
the following optimisations in addition to the previous level 4: Intuitive decisions are
consistently balanced with rational risk information provided by risk management.
Consequently, impacts of potential decisions under uncertainty (e.g. new market
entry) on company value or another key figure (e.g. EBIT or cash flow) are analysed
and discussed through the lens of several risk scenarios. Decisions are regularly made
based on risk-opportunities-considerations and, thus, ERM has evolved to a strate-
gic management tool. Moreover, ERM is linked to business planning to enhance the
robustness of the planning process (multi-scenario planning). At this stage, ERM is
noticeably lived within the organisation and embedded in the employee’s mindsets
and business processes. Management perceives ERM as a value-adding process which
significantly improves decision quality. Separate risk reports will only be produced
upon special request. Relevant risk information is integrated into existing policies,
templates and other documents which serve as a basis for decision-making. All risks
are fully quantified by means of scenario technique and are no longer depicted in
traditional risk (heat) maps. Instead, more powerful aids to visualise risks are used
such as tornado diagrams and other types of bar charts which enable the connection
between uncertainties and business objectives.
157
Key Aspects to Remember
Promote ERM as a tool to balance rationality with intuition
The main goal of ERM is to increase the quality of decision-making within the
company. This requires a full integration of risk information into decision-making
processes. Management often makes important decisions primarily intuitively. This
may be appropriate in some situations, but often there is a lack of more rational
information about risks and opportunities at the time such decisions are taken.
ERM can make a decisive contribution to a better balance between intuition and
rationality.
Challenge management assumptions first, then complement with traditional
risk identification
As a rule, the traditional risk management process starts with risk identification.
This process step is often supported by sending templates to different people
within the company or by conducting one-on-one interviews. A more effective way
is to analyse the assumptions underlying the business strategy and business objec-
tives first. This approach automatically leads to the identification of many, if not
almost all, relevant risks affecting business objectives. After having analysed these
assumptions, traditional risk identification techniques may complement the key
risk list.
Focus on fully quantified, credible key risk scenarios
Traditional risk maps promote the so called “binary thinking” about risk: either a
risk occurs or it does not. And when it does, it always has the same (financial)
impact. Of course, this simplified approach is usually wrong. Risks can emerge
in very different scenarios, which are more or less probable and have different
impacts. Consequently, a key success factor of ERM is to translate risks into plau-
sible, quantified stories using scenario technique. Effective ERM programmes use
clever filters to distinguish key risks from risks that are not (yet) decision-relevant.
Integrate risk information and avoid isolated risk reporting
Isolated risk reports are rarely used for decision-making. Although they are pro-
duced with a great deal of effort, they often receive little or no attention from man-
agement. Decisions on the board’s agenda are usually taken before the risk report
is discussed. In order to change this, relevant risk information must be available
at the time decisions are made. For all strategic decisions, associated key risk sce-
narios must be included in the corresponding documents or presentations on these
decisions.
3.5 Assess and Improve ERM Quality
158 3 Creating Value Through ERM Process
Continuously increase ERM quality
Traditional risk management is usually not geared towards supporting decision-
making. Thus, it must be continuously improved. Using a meaningful risk maturity
model allows companies to benchmark their current ERM practice. In many cases,
companies do not perceive and added value provided by risk management. To
change this, use the suggested maturity model in this textbook as a starting point:
If your company scores low (in most cases level 2 or 3), make the case for your
company to enhance ERM quality and promote improved decision-quality as the
major reason to further invest in ERM.
Critical Thinking Questions
1. What is the main difference between a regulatory risk management approach
and modern ERM?
2. Why do many ERM programmes fail in practice?
3. Risk maps are still very popular in practice. Can you explain why they are still
widely-accepted? What are the major drawbacks of this tool?
4. Why is it crucial to quantify all risks equally, even no or scarce data is available
for some types of risks?
5. Why is the risk manager often not welcomed at the strategy table in the com-
pany? How can this be changed in the future?
References
Abraham, S., & Shrives, P. J. (2014). Improving the relevance of risk factor disclosure in corporate
annual reports. The British Accounting Review, 46 (1), 91–107.
Andersen, T. J., & Winther Schrøder, P. (2010). Strategic risk management practice. How to deal
effectively with major corporate exposures. Cambridge: Cambridge University Press.
Andrews, K. R. (1971). The Concept of Corporate Strategy. Irwin: Homewood.
Barnett, M., Jermier, J., & Lafferty, B. (2006). Corporate reputation: The definitional landscape.
Corporate Reputation Review, 9 (1), 26–38.
Barney, J. B. (2002). Gaining and sustaining competitive advantage (2nd Ed.). Upper Saddle
River, NJ: Prentice-Hall.
Barney, J. B., & Hesterly, W. S. (2006). Strategic management and competitive advantage. Upper
Saddle River, NJ: Pearson Education.
Barry Callebaut (2018). Annual Report 2017/18. https://www.barry-callebaut.com/sites/default/
files/publications/barry_callebaut_annual_report_2017-18.pdf. Accessed 24 January 2019.
Beasley, M. S., & Frigo, M. L. (2007). Strategic Risk Management: Creating and Protecting Value.
Strategic Finance, May, 24–31.
Budescu, D. V., Broomell, S., & Por, H.-H. (2009). Improving Communication of Uncertainty in
the Reports of the Intergovernmental Panel on Climate Change. Psychological Science, 20 (3),
299–308.
159
Bunnenberg, S. (2016). Reputationsrisikomanagement: „Es fängt mit der Kultur an“. https://
www.3grc.de/risikomanagement/reputationsrisikomanagement-es-faengt-mit-der-kultur-an/.
Accessed 24 January 2019.
Buss, E. (2007). Image und Reputation—Werttreiber für das Management. In M. Piwinger &
A. Zerfaß (Eds.), Handbuch Unternehmenskommunikation (pp. 227–243). Wiesbaden: Gabler.
Calabretta, G., Gemser, G., & Wijnberg, N. M. (2016). The Interplay between Intuition and
Rationality in Strategic Decision Making: A Paradox Perspective. Organization Studies, 38
(3–4), 1–37.
Casas i Klett, T. (2008). Der Mensch in der Uncertainty Governance: Wertschöpfung jenseits von
Risiko-Management. In R. Wunderer (Ed.), Corporate Governance—zur personalen und sozi-
alen Dimension (pp. 26–30). Köln: Luchterhand.
Chapelle, A. (2015). Is reputation risk overstated? Operational incidents do not always give firms
a bad name. https://www.risk.net/risk-management/operational-risk/2394437/reputation-risk-
overstated. Accessed 24 January 2019.
Choo, C. W. (1999). The Art of Scanning the Environment. Bulletin of the American Society for
Information Science and Technology, 25 (3), 21–24.
Clayton Christensen (n.d.). Disruptive Innovation. http://www.claytonchristensen.com/key-concepts/.
Accessed 20 November 2018.
Collier, P. M., & Agyei-Ampomah, S. (2006). CIMA Learning System 2007 Management
Accounting—Risk and Control Strategy. Elsevier Science & Technology.
Collis, D. J., & Montgomery, C. A. (2004). Corporate strategy: Resources and the scope of the
firm (2nd Ed.). Chicago: McGraw-Hill Irwin.
Collis, D. J., & Rukstad, M. G. (2008). Can You Say What Your Strategy Is? Harvard Business
Review, 86, 82–90.
Committee of Sponsoring Organizations of the Treadway Commission (COSO) (2017). Enterprise
Risk Management—Integrating with Strategy and Performance. Jersey City, NJ: AICPA.
Cox, L. A. (2008). What’s Wrong with Risk Matrices? Risk Analysis, 28 (2), 497–512.
Dane, E., & Pratt, M. G. (2007). Exploring intuition and its role in managerial decision making.
Academy of Management Review, 32 (1), 33–54.
Day, R., & Woodward, T. (2004). Disclosure of information about employees in the Directors’
report of UK published financial statements: substantive or symbolic? Accounting Forum, 8,
43–59.
De Bruin, T., Freeze, R., Kulkarni, U., & Rosemann, M. (2005). Understanding the Main Phases of
Developing a Maturity Assessment Model. ACIS 2005 Proceedings. 109.
Dean, J. W., & Sharfman, M. P. (1996). Does decision making process matter? A study of strategic
decision making effectiveness. Academy of Management Journal, 39 (2), 368–396.
Deloitte (2012). Cultivating a Risk Intelligent Culture. Understand, measure, strengthen, and
report. Luxembourg. https://www2.deloitte.com/content/dam/Deloitte/lu/Documents/risk/lu_
en_wp_riskintelligentculture_01082012.pdf. Accessed 18 December 2018.
Deloitte (Ed.) (2017). Strategic Risk. A cornerstone of risk transformation. https://www2.deloitte.
com/content/dam/Deloitte/global/Documents/Risk/gx-ers-risk-transformation.pdf. Accessed 24
January 2019.
Deloitte (Ed.) (2016). How to meet top management reporting expectations? https://www2.
deloitte.com/content/dam/Deloitte/be/Documents/finance/POV_top%20management%20
reporting%20survey_v8.pdf. Accessed 28 January 2019.
Deloitte (Ed.) (2015). Global Survey on Reputation Risk. https://www2.deloitte.com/content/
dam/Deloitte/za/Documents/risk/NEWReputationRiskSurveyReport_25FEB.pdf. Accessed 24
January 2019.
Diederichs, M. (2013). Risikomanagement und Risikocontrolling (3rd Ed.). München: Vahlen.
References
160 3 Creating Value Through ERM Process
Duijm, N. J. (2015). Recommendations on the Use and Design of Risk Matrices. Safety Science 76
(1), 21–31.
Eccles, R. G., Newquist, S. C., & Schatz, R. (2007). Reputation and its risks. Harvard Business
Review, 85 (2), 104–114.
Elzahar, H., & Hussainey, K. (2012) Determinants of narrative risk disclosures in UK interim reports.
The Journal of Risk Finance, 13 (2), 133–147. https://doi.org/10.1108/15265941211203189
Erben, R. F. (2015). Normen und Standards im Risikomanagement—Anwendbarkeit und Nutzen
von ISO 31000, ONR 49000 ff. und COSO ERM. In W. Gleißner & F. Romeike (Eds.),
Praxishandbuch Risikomanagement: Konzepte, Methoden, Umsetzung (pp. 143–174). Berlin:
Erich Schmidt Verlag.
Ernst & Young (2015). Rethinking risk management. https://www.ey.com/Publication/
vwLUAssets/EY-rethinking-risk-management-banks-focus-on-non-financial-risks-and-
accountability/$FILE/EY-rethinking-risk-management-banks-focus-on-non-financial-risks-and-
accountability.pdf. Accessed 28 Januar 2019.
Filatotchev, I., Toms, S., Wright, M. (2006). The firm’s strategic dynamics and corporate gov-
ernance life‐cycle. International Journal of Managerial Finance, 2 (4), 256–279. https://doi.
org/10.1108/17439130610705481
Fleischer, A. (2015). Reputation und Wahrnehmung. Wie Unternehmensreputation entsteht und wie
sie sich beeinflussen lässt. Wiesbaden: VS Verlag für Sozialwissenschaften.
Frick, N., Küttner, T. F., & Schuber, P. (2013). Assessment Methodology for a Maturity Model
for Interorganizational Systems—The Search for an Assessment Procedure. 46th Hawaii
International Conference on System Sciences.
Frigo, M. L., & Anderson, R. J. (2011). Strategic Risk Management: A Foundation for Improving
Enterprise Risk Management and Governance. Journal of Corporate Accounting & Finance,
22, 81–88.
Frigo, M. L., & Anderson, R. J. (2009). A Strategic Framework for Governance, Risk, and
Compliance. Strategic Finance, 90, 20–61.
Gleißner, W. (2018). Prüfung des Risikomanagements—ein Reifegradmodell. Der Aufsichtsrat,
2/2018, 18–21.
Gleißner, W. (2014). 10 Gebote für gute unternehmerische Entscheidungen. Controller Magazin,
4/2014, 34–41.
Gleißner, W. (2004). Die Aggregation von Risiken im Kontext der Unternehmensplanung. ZfCM—
Zeitschrift für Controlling & Management, 5/2004, 350–359.
Grundy, T. (2006). Rethinking and reinventing Michael Porter’s five forces model. Briefings in
Entrepreneurial Finance, 15 (5), 213–229.
Hillmann M. (2011). Storytelling: Mit Geschichten Unternehmen gestalten. In M. Hillmann (Ed.),
Unternehmenskommunikation kompakt (pp. 63–73). Wiesbaden: Gabler.
Howard, R. A. (1988). Decision analysis: practice and promise. Management Science, 34 (6),
679–695.
Hubbard, D. W. (2009). The failure of risk management. Why it’s broken and how to fix it.
Hoboken, NJ: John Wiley & Sons Inc.
Hubbard, D. W., & Evans, D. (2010). Problems with scoring methods and ordinal scales in risk
assessment. Journal of Research and Development, 54 (3), 2:1–2:10.
Hunziker, S. (2018). Erfolgskriterien von Enterprise Risk Management in der praktischen
Umsetzung. In S. Hunziker & J. O. Meissner (Eds.), Ganzheitliches Chancen- und
Risikomanagement. Interdisziplinäre und praxisnahe Konzepte (pp. 1–28). Wiesbaden: Springer
Gabler.
Hunziker, S., & Meissner, J. O. (2017). Risikomanagement in 10 Schritten. Wiesbaden: Springer
Gabler.
161
Hunziker, S., & Rautenstrauch, T. (2015). Risk Map: Instrument im Risikocontrolling—
Breit akzeptiert, kaum hinterfragt. https://www.weka.ch/themen/finanzen-controlling/
iks-und-risikomanagement/risikocontrolling/article/risk-map-instrument-im-risikocontrolling-
breit-akzeptiert-kaum-hinterfragt/. Accessed 24 January 2019.
Hunziker, S., Balmer, P., & Schellenberg C. (2016). Enterprise Risk Management Studie zum
Risikomanagement in Schweizer Unternehmen. Zug: SwissERM und IFZ—Hochschule
Luzern.
Hunziker, S., Fallegger, M., & Jovic, K. (2018). Risiko-Management im Führungssystem einbin-
den. Controlling & Management Review, 62 (9), 54–59.
Jonkman, S. N., van Gelder, P. H., & Vrijling, J. K. (2003). An overview of quantitative risk meas-
ures for loss of life and economic damage. Journal of Hazardous Materials, 99 (1), 1–30.
Kirstein, S. (2009). Unternehmensreputation. Corporate Social Responsibility als strategische
Option für deutsche Automobilhersteller. Wiesbaden: Gabler Verlag.
KPMG (2008). Understanding and articulating risk appetite. http://www.kpmg.com.au/Portals/0/
ias_erm-riskappetite200806.pdf. Accessed 24 January 2019.
Kunz, M. (2015). Non-financial risk disclosures in annual reports and the relationship to com-
pany risk factors: Evidence from Swiss listed companies. Master Thesis, Lucerne University of
Applied Sciences and Arts.
Levine, D. (2015). ERM at the Speed of Thought: Mitigation of Cognitive Bias in Risk Assessment.
2015 Enterprise Risk Management Symposium. National Harbor, Maryland.
Linsley, P. M., & Shrives, P. J. (2006). Risk reporting: A study of risk disclosures in the annual
reports of UK companies. The British Accounting Review, 38 (4), 387–404.
Liu, W., & Pergler, M. (2013). Concrete steps for CFOs to improve strategic risk management.
McKinsey Working Papers on Risk. https://www.mckinsey.com/~/media/mckinsey/dotcom/cli-
ent_service/risk/working%20papers/44_role_of_cfo.ashx. Accessed 23 January 2019.
Moutchnik, A. (2015). The maturity model for corporate environmental management. uwf
UmweltWirtschaftsForum, 23 (4), 161–170.
Müller, M. (2018). Risk Culture at Roche. Development of a Risk Culture Measurement
Framework. Master Thesis, Lucerne University of Applied Sciences and Arts.
OECD (2014). Risk Management and Corporate Governance. Corporate Governance, OECD
Publishing. http://dx.doi.org/10.1787/9789264208636-en
Porter, K. (2018). A Beginner’s Guide to Fragility, Vulnerability, and Risk. University of Colorado
Boulder. http://spot.colorado.edu/~porterka/Porter-beginners-guide.pdf. Accessed 21 November
2018.
Porter, M. E. (1985). The Competitive Advantage: Creating and Sustaining Superior Performance.
New York: Free Press.
Porter, M. E. (1980). Competitive Strategy: Techniques for Analyzing Industries and Competitors.
New York: Free Press.
Protecht (2013). A Bow Tie Event. https://www.youtube.com/watch?v=dpGKHncw-d8. Accessed
24 April 2019.
Proviti (2013). Board Perspectives: Risk Oversight. https://www.protiviti.com/sites/default/files/
united_states/insights/board-perspectives-risk-oversight-issue48-risk-appetite-dialogue-protiv-
iti.pdf. Accessed 23 January 2019.
Rautenstrauch, T., & Hunziker, S. (2011). Internes Kontrollsystem—Perspektiven der Internen
Kontrolle. Zürich: WEKA Business Media AG.
Rees, M. (2015). Business Risk and Simulation Modelling in Practice: Using Excel, VBA and @
RISK. Chichester: John Wiley & Sons.
RIMS (Ed.). (2012). Exploring Risk Appetite and Risk Tolerance. https://www.rims.org/resources/
ERM/Documents/RIMS_Exploring_Risk_Appetite_Risk_Tolerance_0412.pdf. Accessed 24
January 2019.
References
162 3 Creating Value Through ERM Process
Romeike, F. (2018). Risikomanagement. Wiesbaden: Springer Gabler.
Romeike, F., & Weissensteiner, C. (2015). Reputation: A Risk Factor. Risk Management Review,
6–10.
Roth, M. (2015). Compliance—in a nutshell (3rd Ed.). Zürich, St. Gallen: Dike Verlag.
Samad-Khan, A. (2005). Why COSO is flawed. Operational Risk, January, 1–6.
Schilling, B. (2018). Risikoadjustierte Unternehmensplanung—Integration von Unternehmensplanung
und Risikomanagement. Controller Magazin, 6/2018, 30–36.
Segal, S. (2011). Corporate Value of Enterprise Risk Management: The Next Step in Business
Management. New Jersey: John Wiley & Sons, Inc.
Sidorenko, A., & Demidenko, E. (2017). Guide to effective risk management 3.0. https://papers.
ssrn.com/sol3/papers.cfm?abstract_id=3014251. Accessed 18 December 2018.
Sieler, C. (2007). Präventives Reputationsrisikomanagement: Reputationsrisiken als Handlungsfeld
im Enterprise Risk Management. Risiko Manager, 11, 6–11.
Sika (2017). ANNUAL REPORT 2017. Risk Management. https://www.sika.com/content/corp/
main/en/group/investors_2016/risk-management.html. Accessed 28 January 2019.
Simon, H. A. (1987). Making management decisions: The role of intuition and emotion. The
Academy of Management Executive, 1 (1), 57–64.
Slywotzky, A., & Drzik, J. (2005). Countering the Biggest Risk of All. Harvard Business Review,
83 (4), 78–88.
Spetzler, C., Winter, H., & Meyer, J. (2016). Decision Quality: Value Creation from Better
Business Decisions. New York: Wiley.
Soliman, A., & Adam, M. (2017). Enterprise Risk Management and firm performance: an inte-
grated model for the banking sector. Banks and Bank Systems, 12 (2), 116–123.
Swisscom (2017). Annual Report 2017. Risk situation. http://reports.swisscom.ch/en/2017/report/
annual-report/management-commentary/risks/risk-situation. Accessed 24 January 2019.
Taleb, N. N. (2007). The black swan: The impact of the highly improbable. New York: Penguin
Books.
Tian, Y., & Chen, J. (2009). Concept of Voluntary Information Disclosure and A Review of
Relevant Studies. International Journal of Economics and Finance, 1 (2), 55–59.
Weissensteiner, C. (2014). Reputation als Risikofaktor in technologieorientierten Unternehmen.
Wiesbaden: Gabler Verlag.
Wendler, R. (2012). The maturity of maturity model research: A systematic mapping study.
Journal Information and Software Technology, 54 (12), 1317–1339.
Willis (2015). Risk Appetite Statements – Make or Break. https://www.willis.com/subsites/
australia/Documents/Publications/services/BusinessRisk/W0477AU_Thought_Leadership_
Article_Risk_Appetite_Statement_web.pdf. Accessed 26 April 2019.
163© Springer Fachmedien Wiesbaden GmbH, part of Springer Nature 2019
S. Hunziker, Enterprise Risk Management,
https://doi.org/10.1007/978-3-658-25357-8_4
Setting up Enterprise Risk Governance 4
Contents
4.1 Comply with Laws and Check Relevant Governance Codes . . . . . . . . . . . . . . . . . . . . . . . . 165
4.2 Consider ERM-Frameworks Thoughtfully . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
4.2.1 Motivation for Risk Management Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
4.2.2 ISO 31000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
4.2.3 COSO ERM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
4.2.4 Similarities and Differences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
4.2.5 Limitations of ERM Frameworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
4.3 Develop a Sound Risk Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
4.3.1 Risk Policy and Corporate Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
4.3.2 Risk Policy as the Basis for Dealing with Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
4.3.3 Limitations of Risk Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
4.4 Enhance Risk Culture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
4.4.1 Relate Risk Culture to Corporate Culture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
4.4.2 Understand How Risk Culture Evolves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
4.4.3 Increase Risk Culture Maturity Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
4.5 Organise ERM Properly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
4.5.1 Does a Best-Practice ERM Organisation Exist? . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
4.5.2 ERM Organisation Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
4.5.3 Some Thoughts on Roles and Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
164 4 Setting up Enterprise Risk Governance
Learning Objectives
When you have finished studying this chapter, you should be able to:
• know the legal and enterprise risk governance requirements regarding ERM
• explain why the establishment of a sound risk culture is highly relevant
• formulate a risk policy which is based on the principles of modern ERM
• organise ERM effectively and efficiently within the company
• assess the appropriateness of ERM frameworks and norms in your company
Many textbooks on risk management place this chapter (or a similar one) before discuss-
ing the concrete ERM process. They commonly start broadly by describing ERM as a
part of overall corporate governance, highlighting its legal relevance and discussing vari-
ous ways in which risk management can be organised. In this textbook this is obviously
different. We have discussed the different cognitive and motivational biases and then pre-
sented the ERM process. Finally, we turn to risk governance. There are the following
reasons for this:
• We do not focus on legal requirements as we do not follow primarily a regulatory risk
management approach. Modern ERM should provide economic value by improving
decisions. Compliance with regulations does not create any obvious added value per
se. However, because laws must be adhered to, the legal situation is briefly discussed.
• Adapting the corporate culture (or risk culture) is a difficult and often long-winded
process. It is easier to implement the ERM process first (as good as possible) and con-
sider it as a starting point for subsequent cultural change. Going through the ERM
process reveals many examples that can be used as good arguments for cultural
change. Practical examples of past decisions whose quality could have been improved
by ERM convince management much more than theoretical presentations on how
ERM could be effective in the future.
• It is very important to have a current risk policy approved by the board of directors.
However, the elaboration of a risk policy also depends on having experience with
and results of the ERM process. The risk policy can be developed in parallel with
the ERM process. Experience has shown that a sound risk policy often requires sev-
eral meetings and workshops with the board. Here, too, it is better to have convincing
examples from the ERM process that reinforce the basic ideas of a modern ERM.
• It would be a wrong signal to the reader to present ERM frameworks and standards
too early as a main chapter at the beginning of the textbook. The reason is simple:
they do not fully reflect the modern ERM approach. In some (but not all) respects
they are an ideal complement to this textbook.
• Last but not least, it may be difficult to fully define roles and responsibilities as well
as other organisational aspects without having any experience with the ERM process.
1654.1 Comply with Laws and Check Relevant Governance Codes
For example, relevant stakeholders of ERM, such as risk owners and subject matter
experts may be selected on the basis of the process step “risk scenario collection”.
For this reason, it may be useful to consider the organisation of ERM, but this is not
the most important first step and can still adapt after having gone through the ERM
process.
With these preliminary remarks in mind, we can now turn to the different aspect of cor-
porate governance and enterprise risk governance. Basically, corporate governance can
be defined as the actions, processes, traditions and institutions through which author-
ity is exercised and decisions are made and implemented. Corporate governance is the
legal and regulatory framework for the management and supervision of any organisation
(von Werder 2015). In addition to the legal framework with all its laws, norms and stand-
ards, corporate governance focuses on the goal of good, responsible management which
allows long-term value creation (Romeike and Hager 2013, p. 111). In turn, enterprise
risk governance applies the principles of good governance to the identification, assess-
ment, management, communication and integration of risks into decision-making pro-
cesses (adapted from IRGC 2018).
4.1 Comply with Laws and Check Relevant Governance Codes
Risk management principles have found their influence in the respective laws and codes
of corporate governance. The focus and structure of these laws and codes can vary
greatly from country to country. According to the focus of this textbook, the situation in
Germany and Switzerland is very briefly discussed in the following.
Germany: “Gesetz zur Kontrolle und Transparenz im Unternehmensbereich”
(KonTraG)
The legal framework includes, among others, the comprehensive article act “Gesetz
zur Kontrolle und Transparenz im Unternehmensbereich” (KonTraG for short) which
requires the establishment of a risk management system and a monitoring system
(Sect. 91 (2) AktG), including the implementation of a risk early warning system and
appropriate communication structures. In addition, § 43 GmbHG provides for the duty
of care of the management and § 76 (1) AktG provides for the general management duty
of the Management Board. Hence, the executive board and the managing director must
deal appropriately with risks. In summary, this leads to the following conclusion: Risk
management is an original management duty of the executive board or managing director
(Romeike 2018).
Section 91 (2) AktG already makes it clear that the Executive Board must take suit-
able measures, including the establishment of an internal monitoring system, so that
developments that could endanger the existence of the organisation can be identi-
fied at an early stage and countermeasures initiated. Conversely, this requires a risk
166 4 Setting up Enterprise Risk Governance
management system that is effective throughout the organisation, provides management
with a comprehensive information and decision-making basis, and is future-oriented.
Important factors here include the appropriateness and effectiveness of the risk early
warning and monitoring systems used. This should take the form of an internal control
system (ICS). And the Business Judgement Rule also makes it clear that every business
decision is associated with risks (Hartmann and Romeike 2015). In this context, the
Executive Board of an AG (Corp., Inc.) is threatened with personal liability arising from
a breach of duty. Other specific regulations such as the Sarbanes-Oxley Act, Basel I to IV
or MaRisk for banks as well as VAG and Solvency II in the insurance environment are
among the regulations relating to risk management (Romeike 2018).
German Corporate Governance Code
The German Corporate Governance Code represents the essential statutory regulations
for the management and supervision of German listed companies and contains interna-
tionally and nationally recognised standards of good and responsible corporate govern-
ance in the form of recommendations and suggestions.
The code stipulates that the Management Board informs the Supervisory Board
regularly, promptly and comprehensively of all issues of relevance to the organisation
relating to strategy, planning, business development, risk situation, risk management
and compliance. The Executive Board should deal with deviations of the current busi-
ness development from the existing plans and targets and state the reasons for these
deviations.
The Management Board ensures appropriate risk management and risk control in the
company (DCGK 2017).
In addition, the management board is to ensure that all statutory provisions and the inter-
nal guidelines of the company are complied with and endeavours to achieve compliance
with them by the group companies (compliance). It also takes appropriate measures that
reflect the company’s risk situation (compliance management system) and discloses the
main features of these measures. Employees must be given the opportunity to report
suspected violations of the law in a protected manner; this opportunity should also be
granted to third parties (DCGK 2017).
Switzerland: Swiss Code of Obligations (CO)
Regarding legislation in Switzerland, the Swiss Code of Obligations (CO) addresses risk
management as one of the responsibilities that the board of directors can delegate to the
executive board, but has to maintain oversight of (OECD 2014). However, only larger
companies that are subject to an ordinary audit (according Art. 727 CO) have to prepare
a management report which provides information on the conduct of a risk assessment.
167
CO Art. 961c
1 The management report presents the business performance and the economic position
of the undertaking and, if applicable, of the corporate group at the end of the financial
year from points of view not covered in the annual accounts.
2 The management report must in particular provide information on:
1. the number of full-time positions on annual average;
2. the conduct of a risk assessment;
3. orders and assignments;
4. research and development activities;
5. extraordinary events;
6. future prospects.
3 The management report must not contradict the economic position presented in the
annual accounts.
Unfortunately, the Swiss Code of Obligations does not provide any concrete guide-
lines on how corporate management and the board of directors must comply with their
statutory duties of care with regard to ERM. Switzerland’s legislation does not address
how ERM should be implemented. However, some provisions in different Swiss laws
require diligent business management at all hierarchical levels. One of the most relevant
statute in this sense is article 716a CO, which lists the non-transferable and inalienable
duties of the members of the Board of Directors of a limited stock company. This provi-
sion emphasises the board’s responsibility for compliance with the law throughout the
entire company. Some financial market laws, such as the Swiss Banking Act (BankA),
the Swiss Banking Ordinance (BankO) and the Anti-Money Laundering Act stipu-
late a range of obligations regarding to risk and compliance management of financial
intermediaries.
Thus, every board member should have a deep interest in establishing an ERM pro-
gramme within the company. However, there is a widespread (false) opinion that a board
of directors of a small or medium-sized (SME) company in Switzerland is exempt from
the legal obligation of risk management. This misconception is based on the fact that, as
a result of the OR revision in 2013, only “larger companies” have to provide information
on the conduct of a risk assessment in their management report. However, this reporting
obligation does not apply to SMEs that are not subject to an ordinary audit. On the other
hand, due to the above stated duties by law (Art. 716a OR), the board is obliged to assess
the ERM of the company. This obligation is completely independent of company size
and industry.
Swiss Code of Best Practice for Corporate Governance (SCBP)
The Swiss Code of Best Practice for Corporate Governance (SCBP) (revised 2007) pub-
lished by the industry association Economiesuisse in 2002 contains legally non-binding
recommendations, in particular for Swiss stock corporations. Corporate governance
4.1 Comply with Laws and Check Relevant Governance Codes
168 4 Setting up Enterprise Risk Governance
encompasses all principles for safeguarding sustainable corporate interests. These princi-
ples are intended to ensure transparency and a healthy balance between management and
control, while at the same time maintaining a company’s decision-making ability and
efficiency at the highest level (SCBPCG 2016).
With regard to internal controls and risk management, it is expected that non-listed
economically significant companies will be able to develop appropriate policies from the
SCBP. The Code strongly recommends that the board of directors ensure that the internal
control system is appropriate to the size, complexity and risk profile of the company and,
depending on the nature of the company, to the risk profile of the company. The system
should also include risk management, which includes both financial and operational risks
(OECD 2014). The board should take measures to ensure compliance with the applicable
rules and may also delegate compliance to the internal control system. It should review
at least once a year whether the principles applicable to itself and the company are suf-
ficiently well known and continuously complied with (OECD 2014).
4.2 Consider ERM-Frameworks Thoughtfully
In the area of risk management, many frameworks and norms have been published. As
introduced in Sect. 1.4, COSO ERM (2017) and ISO 31000:2018 are the best-known and
most widely used guidelines to implement ERM. This is the reason why we will focus
solely on these two frameworks.
4.2.1 Motivation for Risk Management Standards
Why do risk management standards emerge and what is the motivation for them?
Basically, various environmental developments can be observed to which compa-
nies have to adapt. First, the increase in the perceived risk exposure can be mentioned.
Globalization is leading to greater complexity, dynamism and networking of companies
and states. Today, many companies operate worldwide and internet makes borders less
and less an obstacle. Corporate collapses (Enron, Worldcom, etc.) or scandals that have
put companies in dire straits (BP, UBS, etc.) have also contributed to the increased risk
exposure or made it more obvious. Finally, natural disasters and terrorist attacks have
contributed to managers increased risk perception.
Secondly, we face higher security requirements today. Environmental protection and
labour safety issues in particular are increasingly becoming one of the central issues that
companies have to deal with. Environmental goals are increasingly being set by national
governments, which is why companies have to respond to them. In addition, the require-
ments regarding product liability have grown. Products must meet numerous require-
ments and often be attractively designed to consumers at the same time.
169
Thirdly, the demands placed on company management have increased. Corporate gov-
ernance is an issue that concerns most companies. This is reflected in the fact that guide-
lines, codes and other requirements have been established that companies can hardly
ignore. Financial reporting must also cover the needs of many stakeholders. Listed com-
panies in particular face the challenge of complying with international frameworks. In
addition, corporate financing has become more difficult. This is due both to the distor-
tions caused by the 2007/08 financial crisis and the increased capital requirements by the
banks (Basel II/III).
A number of standards and frameworks have been developed globally to support com-
panies in the structured and effective implementation of ERM. These guidelines aim to
develop a common view of governance structures, processes and practices and are gener-
ally defined by recognised international standardization bodies or industry groups. ERM
is a fast-moving discipline, often due to changes in the environment and in regulations,
and standards are regularly supplemented and updated.
The different standards reflect the different technical focus of their developers and
are suitable for different organisations and situations. Standards are generally voluntary,
although compliance with a standard may be required by regulatory authorities or by
contract (IRM 2018). Romeike (2018) comments on the latter as follows: “laws are com-
plicated, but at least irrefutable and binding. The situation in the field of standardization
is less clear. There are currently more than 100 directives, norms and standards in the
field of risk management (a selection is shown in Table. 4.1). These include industry- and
topic-specific regulations, such as the specifications of the Federal Office for Information
Security (BSI) or the international regulations ISO 17799 on information security or ISO
22301 on business continuity.
Many other authors (mostly academics and consultants) have developed recommenda-
tions for ERM implementation such as Segal 2011, Hopkin 2017 and Lam 2017. Segal
(2011) is one of the very rare authors offering a strict value-oriented ERM approach with
a detailed implementation guide for ERM in practice. The guideline consists of a four-
step process consisting of risk identification, risk quantification, risk decision and risk
reporting. In contrast to the international standardization bodies, these guidelines are
not primarily aimed at setting global standards. Rather, they address a specific group of
enterprises (e.g. small and medium-sized enterprises, individual sectors). In the follow-
ing, ISO 31000 and COSO ERM are assessed in more detail. Particularly, the revised
frameworks from 2017 and 2018 are examined.
4.2.2 ISO 31000
The ERM process cycle according to ISO 31000 is one of the most widespread, accepted
and currently most up-to date standard. The process follows several consequent steps
(IRM 2018). At first, management needs to establish the context. This means that a
risk management strategy and risk management organisation is defined. It includes the
4.2 Consider ERM-Frameworks Thoughtfully
170 4 Setting up Enterprise Risk Governance
establishment of a governance structure, the definition of roles and responsibilities as
well as supporting tools (ISO 2018a). Next, risks are assessed in three main steps. Firstly,
risk identification takes place. Risks are identified by source, for a certain timeframe, and
for each of the different risk categories. The outcome is a qualitative assessment of the
risks. The second step, risk analysis, aims at generating a better understanding of each
risk. Different positive and negative risk scenarios are defined and their likelihood and
potential impacts are estimated. According to the framework, risk identification and anal-
ysis can be quantitative, semi-quantitative, qualitative, or a combination of it.
Table 4.1 Selected risk management standards. (adapted and updated from Winter 2008)
Standard Description
AS/NZS 4360 Risk Management,
Australia/New Zealand
Oldest and best-known risk management standard, univer-
sally applicable and industry-independent, continuously
developed, risk and opportunity oriented, accompanying
manual, application for recognition as ISO standard, entry
into ISO/DIS 31000
CAN/CSA Q850 Risk Management
Guidelines for Decision-Makers,
Canada
Second oldest risk management standard, decision-
related, emphasis on the importance of (public) risk
perception, acceptance and communication, good docu-
mentation notes
PD 6668:2000 Managing Risk for
Corporate Governance, United
Kingdom
Top management and corporate governance ori-
ented, benchmark questionnaire to determine the Risk
Management status quo, PDCA-based (reference to ISO
management standards)
JIS Q 2001 Guidelines for develop-
ment and implementation of a risk
management system, Japan
Terminology based on ISO Guide 51 & 73, PDCA-based
on ISO management standards, emphasis on overall social
responsibility
COSO ERM Enterprise Risk
Management—Integrated
Framework, USA
Professional guidelines, based on the COSO Internal
Control Framework, strongly oriented towards corpo-
rate governance, auditing, accompanying handbook
with application notes. The most recent update (2017)
puts emphasis on the link between ERM and strategy/
decision-making
ONR 4900x Risk Management for
Organisations and Systems
Terminology analogous to ISO Guide 73, objectives/
framework/process analogous to ISO/DIS 31000 (concre-
tization & extension), PDCA-based, multipart standard
family, system & personal certification, management
system integration
ISO/DIS 31000 Risk Management
–Guidelines for principles and
implementation of risk management,
International
Generic and concise top-level guideline (principles &
generic guidelines), basis for other standards, PDCA-
based, terminology ISO Guide 73, Organisational
Integration ONR 49001, RMP AS/NZS 4360. The most
recent update was published in 2018
171
Thirdly, within the risk evaluation part, all risks are assessed by comparing the results
of the risk analysis with established risk criteria to support decisions if risks are signifi-
cant or not (IRM 2018). For example, a sensitivity analysis can be used to prioritise the
quantified risk scenarios. The information generated by the previous process steps allows
aggregating and evaluating the overall risk exposure, which leads to the final risk treat-
ment step that defines the risk mitigation measures of each single key risk. The whole
process of risk management needs to be continuously monitored and reviewed. This way
management can ensure that the risk mitigation measures are implemented correctly and
effectively. In parallel, a major focus lies on an effective communication and consulta-
tion process. It is stated that risk communication is an effective instrument for develop-
ment of a positive risk culture (Romeike 2018, pp. 36–38).
Like all ISO standards, the risk management standard ISO 31000 has been revised
and published in 2018 to ensure that the tools remain relevant and useful, taking into
account the changing market environment and the new challenges facing companies
since the standard was first published in 2009 (ISO 2018a). This revised version also
intends to reflect the evolution of risk management over the past decade from a separate
activity to an integrated management competency (Fox 2018). Risk is now defined as
the “effect of uncertainty on objectives”, which focuses on the challenge of incomplete
knowledge in decision-making processes. This requires a change in the traditional under-
standing of risk and forces companies to tailor risk management to their needs and objec-
tives what can be seen as a major advantage of the updated standard (Tranchard 2018).
According to ISO (2018b), the most important changes to the revised standard include
a stronger focus on both the inclusion of senior management and the embedment of risk
management into the corporate management. The version of 2018 also recommends
that ERM should be part of the company’s structure, processes, objectives, strategy and
activities and emphasises value creation as the main driver of risk management. Another
important objective of this revision is to make the content clearer and simpler by defining
the principles of risk management in simple, practical terms.
Below, we briefly discuss five important updates of the new ISO 31000:2018 version
(ISO 2018b).
• Simplified language. The principles of risk management are stated in simple, practi-
cal and more accessible terms. The ISO 31000:2009 version was too technical and
required a detailed understanding of risk management. Terms and definitions were
reduced from twenty-nine to eight. The standard now includes risk management mem-
oranda of understanding, principles, frameworks and processes. Considering that com-
panies already have a minimum set of principles, frameworks and processes for risk
management in place, the content has been streamlined to encourage users to adapt
and improve their risk management through the updated guidance of the standard.
• Focus on value creation and protection. ISO 31000:2018 puts more emphasis on
value creation and value protection as the main goals of ERM. To achieve this goal,
the standard contains eight principles to improve a company’s risk management
4.2 Consider ERM-Frameworks Thoughtfully
172 4 Setting up Enterprise Risk Governance
framework and process. ISO 31000 outlines, that risk management can create value if
risk management is an integral part of a company’s activities and decisions and imple-
mented in a structured and comprehensive approach. It also promotes the considera-
tion of different stakeholder perspectives and the importance of human and cultural
factors.
• Focus on management leadership. To achieve full integration of risk management
across the company, managers need to understand the importance of ERM and shall
be fully committed to ERM (tone at the top). In this respect, ISO 31000:2018 stresses
the need for management to play a leading role in risk management development.
Without management’s commitment and leadership, the process cannot be naturally
integrated. The standard thus emphasises that top management is responsible for risk
management, while regulators are responsible for monitoring the effectiveness of risk
management.
• Risk management as an iterative process. ISO 31000:2018 reminds us that stakehold-
ers of ERM should communicate and consult with each other throughout the process.
Although the risk management process is presented as sequential, the standard explic-
itly states that in practice the process is iterative for decision-makers and stakeholders.
This underlines the importance of risk management and its supportive role in deci-
sion-making. ERM is not an additional step after decisions have already been taken.
This requirement is fully in line with our ERM approach in this textbook.
• Flexible standard. Finally, it can be stated that ISO, due to its flexibility, is also useful
in the revised version for a large number of companies, regardless of their size and
industry.
4.2.3 COSO ERM
The Committee of Sponsoring Organizations of the Treadway Commission (COSO) is a
joint initiative of the five private sector organisations listed on the left and has set itself
the goal of playing a pioneering role by developing frameworks and guidelines for ERM,
internal control and fraud prevention (COSO 2019). The revised COSO ERM framework
puts emphasis on the importance of the two additional components of ERM that may
have a significant impact on company value.
Firstly, the risk that the strategy is not aligned with an entity’s mission, vision and
core values is central to consider in strategic decisions. Mission, vision and core values
matter most when it comes to sound risk management. COSO claims that it is crucial
that the selected strategy supports the organisation’s mission and vision. A failure in the
alignment of the strategy increases the risk that the company may not realise its goals
related to mission and vision even though the strategy is executed successfully. As a
result, ERM should explicitly deal with that risk of a strategy not being aligned with the
company’s mission and vision (COSO 2017). Secondly, ERM must consider the implica-
tions which are caused by the selected strategy. Since each alternative strategy has its
173
own risk profile, the board and the management need to decide if the selected strategy is
in line with the company’s risk appetite, as well as how the chosen strategy supports the
company achieving its objectives (COSO 2017).
The five components of the strategy setting process in the updated framework are sup-
ported by a set of principles and are explained in the following (COSO 2017).
• Governance and culture. Governance reinforces the importance of ERM and creates
the oversight responsibilities. In addition, governance sets the company’s tone. Culture
refers to ethical values, desired behaviours and the understanding of risk in the firm.
• Strategy and objective-Setting. Strategic planning process involves ERM, strategy and
objective-setting. The basis for identifying, assessing and responding to risk is the
creation of a company’s risk appetite aligned with the strategy.
• Performance. Risks that could hinder the achievement of strategy and business objec-
tives have to be identified and evaluated first. Then, these risks are prioritised by
severity taking into account the company’s risk appetite. Subsequently, appropriate
risk mitigation measures are selected. A portfolio view of the overall risk exposure
should be produced by ERM and is communicated to key risk stakeholders.
• Review and revision. A company can assess how well the ERM components
are working as time goes by through a review of the company’s performance.
Furthermore, it can determine required revisions in the light of substantial changes.
• Information, communication, and reporting. ERM demands an iterative process
of collecting and sharing meaningful information from both internal and external
sources which flows across the entire company.
If COSO ERM 2017 is compared with the current state of knowledge on modern ERM,
some efforts made by COSO to improve ERM toward a decision-relevant tool become
visible. This is clearly shown by the fact that cognitive biases are now taken into account
in decision-making processes, that ERM is aligned with strategy, that integration into
business processes is required, and that the structure of the entire framework is more
closely aligned with business.
4.2.4 Similarities and Differences
ISO 31000 and COSO ERM have many common principles and they aim both at better
integrating risk management into strategy and overall governance. Risk practitioners will
definitely benefit from having such frameworks as they offer a common terminology and
principles for benchmarking. Basically, simple and practically-oriented, holistic frame-
works and standards would help to eliminate inconsistencies and ambiguities between
practice and the academic community. Fortunately, both frameworks stress the importance
of the link between ERM and strategic management. However, it clearly remains vague
how the economic benefit (i.e. the added value) can be verified or measured in practice.
4.2 Consider ERM-Frameworks Thoughtfully
174 4 Setting up Enterprise Risk Governance
Taking into account that most companies do not yet perceive ERM as value creating, this
is very important.
ISO 31000 and COSO ERM lack a sound and comprehensive explanation of the link
between risk appetite statements and decision-making processes. As many companies
struggle with the development of adequate risk appetite statements, this may be consid-
ered as a weakness of both frameworks. However, it has to be mentioned that the current
COSO ERM framework has tried to provide more clarity in this respect. Unfortunately,
the risk appetite statements suggested by COSO are partially confusing and not directly
actionable.
At this stage it is useful to be aware of some important differences between ISO and
COSO. This may support the decision which framework is more suitable as a guideline
for an own ERM implementation (see Table 4.2).
In addition, instead of considering risk management as a periodic risk assessment and
change, both revisions emphasise that ERM is an integral part of a company’s decision-
making process and is essential to fulfilling its mission and improving performance.
Both revisions also recognise that risk and uncertainty are important considerations as
management develops the strategy, run the operations and implement project initiatives
(Fox 2018). Which framework is better suited for implementing modern ERM? As stated
in Sect. 1.4, neither ISO 31000 nor COSO ERM. Both approaches do not address all
relevant ERM topics. Both can be used as a starting point due to their holistic, value-cre-
ating perspective on ERM. Additionally, they are largely consistent. ISO 31000 is much
shorter and written on a more aggregated level than COSO ERM.
As previously mentioned, such frameworks are usually not very innovative, as they
base on broad consensus (Risk Spotlight 2015). Moreover, there is still very limited
empirical evidence as to whether the two frameworks actually work in practice. It should
also be noted that particularly the implementation of COSO ERM can be very resource-
intensive, as the standard is strongly oriented towards operational process management.
In addition, COSO promotes a risk assessment of all process risks. This approach can
quickly develop into an excessive expense. Both frameworks offer relatively simplified
risk assessment techniques, with ISO 31000 taking a more differentiated and meaning-
ful approach. Finally, a consistent prioritization and assessment of all key risks is a clear
prerequisite for determining risk exposures related to business objectives and compar-
ing these risk exposures with risk appetite statements. These aspects are not sufficiently
taken into account in both frameworks (Hunziker and Meissner 2017, p. 10).
4.2.5 Limitations of ERM Frameworks
The aim of ERM frameworks is to provide companies a guideline that enables them
to assess, take on and manage risks more anticipatively and effectively and to support
decision-making processes. However, ERM frameworks in general can have a number
of shortcomings. A common and wrong criticism not unique to ERM frameworks, but
175
Ta
b
le
4
.2
C
om
pa
ri
ng
t
he
I
S
O
3
10
00
:2
01
8
an
d
C
O
S
O
E
R
M
2
01
7.
(
ad
ap
te
d
an
d
up
da
te
d
fr
om
H
uw
yl
er
2
01
6)
IS
O
3
10
00
:2
01
8
C
O
S
O
E
R
M
2
01
7
S
co
pe
P
ri
nc
ip
le
s
an
d
ve
ry
g
en
er
ic
g
ui
de
li
ne
s.
N
ot
a
ud
it
ab
le
or
c
er
ti
fi
ab
le
. S
tr
uc
tu
re
d
in
te
gr
at
ed
a
pp
ro
ac
h.
R
at
he
r
bu
si
ne
ss
-d
ri
ve
n
M
ul
ti
-l
ay
er
ed
a
nd
v
er
y
de
ta
il
ed
f
ra
m
ew
or
k.
T
op
d
ow
n
ap
pr
oa
ch
. B
as
ed
o
n
th
e
C
O
S
O
I
nt
er
na
l
C
on
tr
ol
F
ra
m
ew
or
k.
N
ot
a
ud
it
ab
le
o
r
ce
rt
ifi
ab
le
. R
at
he
r
au
di
t-
dr
iv
en
T
ar
ge
t
A
ll
c
om
pa
ni
es
, i
nd
ep
en
de
nt
f
ro
m
i
nd
us
tr
y
an
d
si
ze
R
at
he
r
la
rg
er
c
om
pa
ni
es
, a
ll
i
nd
us
tr
ie
s
D
ev
el
op
ed
b
y
R
is
k
m
an
ag
em
en
t
ad
vi
so
rs
w
it
h
in
te
rn
at
io
na
l
ex
pe
ri
en
ce
.
C
on
se
ns
us
-b
as
ed
P
ri
m
ar
il
y
ac
co
un
ta
nt
s
an
d
au
di
to
rs
, b
ut
a
ls
o
ri
sk
p
ro
fe
s-
si
on
al
s
du
ri
ng
c
on
su
lt
at
io
n
st
ag
e.
P
w
C
a
s
m
ai
n
au
th
or
.
P
ar
ti
al
ly
c
on
se
ns
us
-b
as
ed
A
dd
re
ss
ed
s
ta
ke
ho
ld
er
s
A
ll
r
is
k
ow
ne
rs
, i
nd
ep
en
de
nt
f
ro
m
h
ie
ra
rc
hi
ca
l
le
ve
ls
P
ri
m
ar
il
y
B
oa
rd
o
f
D
ir
ec
to
rs
a
nd
m
an
ag
em
en
t
R
is
k
de
fi
ni
ti
on
T
he
e
ff
ec
t
of
u
nc
er
ta
in
ty
o
n
ob
je
ct
iv
es
. A
n
ef
fe
ct
i
s
a
de
vi
at
io
n
fr
om
t
he
e
xp
ec
te
d.
I
t
ca
n
be
p
os
it
iv
e,
n
eg
at
iv
e
or
b
ot
h,
a
nd
c
an
a
dd
re
ss
, c
re
at
e
or
r
es
ul
t
in
o
pp
or
tu
ni
ti
es
an
d
th
re
at
s.
T
he
l
in
k
to
b
us
in
es
s
ob
je
ct
iv
es
a
ll
ow
s
ri
sk
m
an
ag
em
en
t
to
h
av
e
vi
si
bi
li
ty
a
nd
a
ll
ow
s
to
m
an
ag
e
al
l
ki
nd
s
of
r
is
ks
a
nd
o
pp
or
tu
ni
ti
es
. O
ri
en
te
d
to
w
ar
ds
b
us
in
es
s
ob
je
ct
iv
es
T
he
p
os
si
bi
li
ty
t
ha
t
ev
en
ts
w
il
l
oc
cu
r
an
d
af
fe
ct
t
he
ac
hi
ev
em
en
t
of
s
tr
at
eg
y
an
d
bu
si
ne
ss
o
bj
ec
ti
ve
s.
R
is
k
is
un
de
rs
to
od
a
s
th
e
st
at
e
of
n
ot
k
no
w
in
g
ho
w
o
r
if
p
ot
en
ti
al
ev
en
ts
m
ay
m
an
if
es
t.
O
ri
en
te
d
to
w
ar
ds
s
tr
at
eg
y
an
d
bu
si
–
ne
ss
o
bj
ec
ti
ve
s
F
oc
us
F
oc
us
o
n
ad
de
d
va
lu
e.
C
le
ar
ly
d
efi
ne
s
th
e
m
ai
n
re
sp
on
si
–
bi
li
ti
es
i
n
im
pl
em
en
ti
ng
a
nd
c
om
m
un
ic
at
in
g
a
ri
sk
m
an
ag
e-
m
en
t
po
li
cy
S
tr
on
g
fo
cu
s
on
a
li
gn
m
en
t
of
E
R
M
w
it
h
st
ra
te
gy
. T
he
re
la
ti
on
sh
ip
b
et
w
ee
n
E
R
M
a
nd
v
al
ue
c
re
at
io
n
is
s
tr
es
se
d
in
th
e
re
vi
se
d
20
17
v
er
si
on
R
is
k
ap
pe
ti
te
T
er
m
n
ot
u
se
d.
I
ns
te
ad
, s
o
ca
ll
ed
r
is
k
cr
it
er
ia
d
efi
ne
t
he
am
ou
nt
a
nd
t
yp
e
of
r
is
k
th
at
a
c
om
pa
ny
m
ay
o
r
m
ay
n
ot
ta
ke
, r
el
at
iv
e
to
o
bj
ec
ti
ve
s
an
d
ri
sk
c
ap
ac
it
y.
N
o
co
nc
re
te
ex
am
pl
es
a
va
il
ab
le
R
is
k
ap
pe
ti
te
i
s
de
fi
ne
d
as
t
he
t
yp
es
a
nd
a
m
ou
nt
o
f
ri
sk
, o
n
a
br
oa
d
le
ve
l,
a
c
om
pa
ny
i
s
w
il
li
ng
t
o
ac
ce
pt
i
n
it
s
pu
rs
ui
t
of
v
al
ue
. C
on
cr
et
e
ex
am
pl
es
a
va
il
ab
le
R
is
k
cu
lt
ur
e
R
is
k
m
an
ag
em
en
t
sh
ou
ld
b
e
ta
il
or
ed
t
o
th
e
cu
lt
ur
e
of
t
he
o
rg
an
is
at
io
n.
T
he
c
ul
tu
re
a
nd
r
is
k
m
an
ag
em
en
t
po
li
cy
o
f
th
e
or
ga
ni
sa
ti
on
s
ho
ul
d
be
a
li
gn
ed
. B
ot
h
ap
pr
oa
ch
es
n
ee
d
to
b
e
cl
ar
ifi
ed
t
ha
t
an
a
pp
ro
pr
ia
te
r
is
k
cu
lt
ur
e
is
n
ec
es
sa
ry
f
or
ef
fe
ct
iv
e
ri
sk
m
an
ag
em
en
t.
C
O
S
O
E
R
M
f
ra
m
ew
or
k
ta
ke
s
in
to
a
cc
ou
nt
t
he
i
m
po
rt
an
ce
o
f
th
e
in
fl
ue
nc
e
of
c
ul
tu
re
o
n
th
e
ri
sk
m
an
ag
em
en
t
pr
ac
ti
ce
s
of
c
om
pa
ni
es
4.2 Consider ERM-Frameworks Thoughtfully
176 4 Setting up Enterprise Risk Governance
often associated with them, is that ERM is interpreted as an extended internal control
framework. For example, COSO ERM has been considered as a formalised broadening
of Sarbanes-Oxley (Sect. 404) to an enterprise-wide risk management process with an
audit focus.
While the various ERM frameworks stress that ERM should be developed as part
of the company’s overall strategy and should be incorporated into business processes,
the primary objective of many frameworks is to ensure that strategic objectives are met.
This in turn means they focus heavily on internal controls rather than actively support-
ing decisions in the strategy development process. This can be considered as a critical
weakness, as general risk assessments are essential to balance rationality with intuition
in strategic decisions. However, the weak focus on decision-making is not very much
surprising as the various ERM frameworks have emerged in response to the corporate
scandals that have been widespread in recent decades (Andersen and Winther Schrøder
2010, pp. 138–139).
However, the danger of enforcing a comprehensive and more control-based frame-
work is that the risk management process becomes a formal checklist designed to
comply with restrictive regulations and provide the comfort that managers and board
members have fulfilled their duties when things go wrong. Worse still, implementing a
very restrictive ERM framework can limit creative thinking and hinder the development
of responsive solutions to changing conditions. As this happens, the formal risk manage-
ment process can become a straitjacket rather than an effective promoter of good risk
practices as intended. As a result, the introduction of ERM frameworks can become a
heavy bureaucratic task, reducing upward benefits and replacing downward risk impacts
with excessive administrative costs (Andersen and Winther Schrøder 2010, pp. 138–
142). Fortunately, the most recent updates of COSO ERM and ISO 31000 in 2017 and
2018 respectively have an increased focus on integration ERM into business and aligning
ERM with strategy. Additionally, both recognise risk as uncertainty on objectives, which
can be positive or negative. In this respect, the developments of the two most important
ERM frameworks are very promising.
Of course, all ERM frameworks require customisation and adaption. For exam-
ple, ISO 31000 is barely directly implementable, as its contents are written on a very
aggregated and general level. In contrast, COSO ERM might be overwhelming for many
companies in terms of scope and detail. As a result, ERM frameworks might serve as a
starting point and they might reduce planning efforts, but companies usually still require
much resources to achieve a mature, value creating ERM (Tomhave 2015).
4.3 Develop a Sound Risk Policy
The implementation of ERM raises many questions, some of them are subject to consid-
erable uncertainty: Which ERM standards or frameworks should be followed and which
principles should be focused? How is ERM related to the mission, vision and strategy of
177
the company? What kind of connections between strategy and ERM exist and to what
degree should ERM be aligned with strategic management? What is the ultimate pur-
pose of ERM? Which ERM structure and organisation suits our company best? Which
competencies, roles and responsibilities are relevant for an effective ERM? Such and
many more questions can be answered in a strategic ERM paper, usually called the “risk
policy”.
As introduced in this chapter, it is crucial to develop a sound risk policy which is
approved by the board of directors. However, as the formulation of a risk policy depends
on existing experience with the ERM process, it does not make sense to approve a very
detailed risk policy prior to the start of an ERM project. The risk policy may change
depending on the experience gained over time with the ERM process. Accordingly, it
should be understood as a provisional document, providing only rough implementa-
tion guidelines and containing the main objectives of ERM. Since risk policies can vary
greatly from company to company, this textbook does not aim at to providing a com-
plete, detailed guide to developing a comprehensive risk policy. In the following, some
important aspects that should be taken into account when developing an appropriate risk
policy are introduced.
4.3.1 Risk Policy and Corporate Strategy
One major aspect of an adequate risk policy is its connection between corporate strategy
and ERM. A risk policy may be considered as an effort to combine both corporate func-
tions: Strategic management and risk management needs to understand the risk policy
statements and judge them as appropriate. As soon as a risk policy raises more questions
than it is able to clarify or contradicts with strategic initiatives, the main purpose of a risk
policy is missed (Hunziker and Meissner 2017, pp. 14–15). In other words, the risk pol-
icy is a strategic paper that outlines how ERM can support the achievement of strategic
goals and how ERM can support the development of adequate strategies (i.e. strategies
that are within risk appetite and have a reasonable risk-reward profile). This inevitably
leads to some challenges in developing guidelines which allow the alignment of ERM
with corporate strategy.
Before we specifically address risk policies, we need to understand some important
characteristics of corporate strategies. One important objective of strategy develop-
ment is the creation of goal orientation without getting lost in too many details. To put
it differently: Those who are strategically oriented (board and management) can overlook
operational details, as long as they do not threaten the achievement of the overall stra-
tegic goals. Of course, even a well-defined strategy provides only goal orientation that
never fits exactly, but must always be consistent. This is precisely what makes strategy
development a very demanding issue: it requires both a precise definition of content and
target-oriented flexibility at the same time. Paradoxically, the art of strategy is to create
4.3 Develop a Sound Risk Policy
178 4 Setting up Enterprise Risk Governance
decision-making certainty for the actors while maintaining a certain openness and flex-
ibility (Wimmer et al. 2014).
Why is this inherent challenge of strategy development important for developing ade-
quate risk policies? As we focus on the link between ERM and corporate strategy, this
issue has several important consequences that need to be considered when developing a
risk policy (see similar Hunziker and Meissner 2017, p. 15):
• The fundamental ambivalence (precise content versus flexibility) of any strategic
action cannot be eliminated by a risk policy.
• A sound risk policy which accounts for this fact can provide a provisional, tempo-
rary decision-making resource which allows a strategy execution which is within risk
appetite.
• A naive belief that a risk policy is based on unequivocal, clear and irrefutable strate-
gies is not appropriate.
• The risk policy itself can affect strategy development by clearly defining that the
respective risk-oriented scenarios are taken into account for all strategic decisions.
• Strategic frameworks must be differentiated according to size and type of organisa-
tion. In medium-sized and larger companies, overall strategies are usually decom-
posed in sub-strategies. Sub-strategies are usually defined according to business areas
and/or business functions. This also applies to the risk policy. Basically, it must be
aligned with overall corporate strategy and the corresponding sub-strategies. For
example, a sub-strategy could read as “realising international business in cooperation
with partner companies along the value chain” has an impact on how strategic part-
nerships are established, supervised and monitored, but also on how the company’s
supply processes are controlled. A risk policy in turn has to address supply chain risks
(logistics and operations sub-strategy) as well as the strategic risks of international,
and thus, cultural cooperation (human resources and corporate development sub
strategy).
It is obvious that the entire strategic framework should be as coherent as possible, i.e. it
must provide a coherent decision-making framework so that companies can make high-
quality decisions (Rüegg-Stürm and Grand 2017).
4.3.2 Risk Policy as the Basis for Dealing with Risks
The risk policy forms the basis for implementing ERM in coordination with corporate
policy. This is an agreement of the management that explicitly defines how a company
is dealing with uncertainty on objectives. Of course, a risk policy is closely linked to
overall corporate culture. This is demonstrated by the fact that a risk policy determines
how and to what extent risk awareness is to be increased in the company. In so far, the
risk policy is an integral part of internal training and communication in the area of risk
179
culture: It clearly outlines the attitude of a company towards uncertainties and how risk
awareness of employees shall be fostered.
The risk policy further defines the ultimate purpose of ERM. Information on the
ERM process for assessing, quantifying, mitigating and reporting key risks as well as
monitoring ERM effectiveness are important parts of every risk policy. Usually, a risk
policy quickly reveals whether ERM is predominantly geared towards a “regulatory risk
approach” or towards value-creating ERM by adopting adequate uncertainty governance
(see Sect. 3.2). In summary, a risk policy defines the basic understanding of ERM, i.e.
how a company plans, implements, assesses and improves the management of uncertain-
ties. A risk policy could be structured as follows:
• Definition of the purpose of a risk policy (e.g. why is a risk policy important? what is
the ultimate goal of a risk policy?)
• Precise formulation of the ultimate goals of ERM (e.g. improving decision-quality by
providing rational risk information)
• Description of how ERM is linked to corporate strategy and objective-setting, includ-
ing sub-strategies
• Precise definitions of management responsibilities for ERM (e.g. ultimate responsibil-
ity of ERM resides with board of directors)
• Clear definitions of ERM and risk (e.g. ERM is the process of assessing, quantify-
ing, reporting key risks to support decision-making and to ultimately add value to the
company, risk is deviation from expectations). Reasons for clearly defining the term
risk are, for example, the following practical phenomena: Management often per-
ceives risks as fully manageable and controllable, which contradicts our basic defini-
tion of risk (unexpected deviation of a future event). In practice, it is also observed
that risk is often defined primarily as a possibility of loss.
• Definition of the scope of ERM (all risk categories are equally relevant, such as strate-
gic, operational, financial).
• The risk policy should also define which risks should be consciously taken. Every
business objective is necessarily associated with risks (and rewards). For example,
a company could decide to bear all strategic key risks (risks from pursuing strategic
goals) and to mitigate all non-core risks (caused by support processes).
• Brief explanation of the ERM process steps (risk identification, risk assessment tech-
niques, risk reporting, risk disclosures, monitoring, benchmarking).
• Definition of risk appetite statements. The risk policy should define clear, quantified
risk limits for specific individual risks or business objectives. For example, an indi-
vidual customer should not account for more than 20% of total revenues, or the equity
ratio should be at least 40%.
• Definition of roles and responsibilities (risk owners, risk manager, subject matter
experts, role of management, role of Board, role of internal audit)
• Description of relevant mitigation measure options. The risk policy defines basic pro-
cedures and principles for mitigating risks. For example, non-strategic risks are to be
4.3 Develop a Sound Risk Policy
180 4 Setting up Enterprise Risk Governance
insured, strategic risks are to be accepted, currency risks are to be hedged by call or
put options.
• Optional: The description of a rating strategy. Since loans granted by a bank must be
backed by equity corresponding to the risks of lending, lending policies (specifically
interest rate conditions) are increasingly aligned with the rating of individual com-
panies. Companies that fall into a low rating category must expect higher financing
costs. The risk policy—and thus the design and objectives of an ERM—can have a
decisive impact on the financial rating (e.g. creation of stable cash flows by means of
appropriate ERM measures).
• Development of glossary in the appendix that defines all relevant terms and abbrevia-
tions (Hunziker and Meissner 2017, pp. 16–17).
The risk policy usually starts with the purpose of the document. This is illustrated, for
example, in the risk policy of the Swiss federal administration as follows.
Example
The Confederation is exposed to numerous risks. The increasing networking and com-
plexity of the environment, the demand for increased efficiency and effectiveness in
the provision of services, the requirements for responsible administrative manage-
ment, the diverse range of tasks of the federal administration and fiscal policy restric-
tions lead to additional challenges for the Confederation.
The risk policy is intended to create a sound foundation for an ERM at the federal
level, focusing on the financial impacts.
The risk policy
• defines the homogeneous, systematic and consistent management of the numerous
risks in the federal administration,
• is part of the due diligence duties which the departments and administrative units
must exercise in the course of their activities,
• supports the departments and administrative units in the efficient and effective per-
formance of the activities entrusted to and carried out by them, and
• contains the instruments and measures aimed at systematically recording, assess-
ing, managing and monitoring risk potential in an efficient manner (Swiss Federal
Finance Administration 2004)
The second paragraph of the confederation example deals with basics of the ERM con-
cept. Moreover, the focus is on financial impacts which can be easily explained by the
publishing administrative unit, namely the Swiss Federal Finance Administration. Of
course, it is important to assess also all sources of the risks, as learned in Sect. 3.3.1. The
second and third bullet point reveals that individual administrative units are risk own-
ers and can expect support from the finance administration. Additionally, the risk policy
defines the scope, objectives, responsibilities, principles for risk management and the
basic ERM process.
181
Another example of a risk policy by ABB stresses the purpose of ERM, the responsi-
bilities of ERM and the continuous improvement first, as illustrated in the following:
Example
(Excerpt)
Responsibility and organisation
Risk management forms an integral part of the management system and determines
the risk situation in business processes and organisational units. Risk management
provides the organisation at all levels with an instrument for detecting risks early
and taking steps to eliminate, reduce, and consciously deal with risks. Responsibility
for implementing the risk management policy, from both a strategic and operational
standpoint, lies with management in the relevant organisational units as appropriate
for a given level. A risk manager is appointed to support implementation methods in
the business process.
Continuous improvement in risk management
The risk management policy is integrated into the business processes. Continuous
monitoring and analysis of risks and the measures taken on this basis is a require-
ment for business success. Particular attention is paid to critical success factors and
the interrelation between different risks and opportunities.
Raising awareness among employees
Employees at ABB Switzerland are conscious of the main risks in their environment
and are made aware of possible hazards in their sphere of activity.
Responsibility of suppliers
ABB Switzerland prefers suppliers that implement a sustainable risk management
system, among other measures.
Society
An effective risk management policy is a key requirement for long-term profitability.
With this ABB Switzerland enhances its competitiveness and thereby contributes to
society.
4.3 Develop a Sound Risk Policy
182 4 Setting up Enterprise Risk Governance
Legal compliance
Legal regulations are complied with, along with all requirements that are recognised
by ABB Switzerland.
Contact with government agencies and interested groups
ABB Switzerland works openly and actively in cooperation with government agen-
cies, associations, as well as interested groups, and maintains a relationship of trust
with them.
(Management resolution of ABB Switzerland as of 2015-01-01, ABB 2015).
On the one hand, the importance of workplace safety is emphasised and thus system-
atically linked to ERM. In addition, ERM is defined as a selection criterion for the sup-
ply chain—similar to what is often addressed by quality management standards. The
question arises as to whether the three following topics of society, legal compliance and
dealing with government agencies should be included in a risk policy, as these require-
ments should already be fulfilled within the context of good corporate governance. They
offer no added value in a risk policy. ABB chooses a very aggregated and short form of
presenting their risk policy online. It is questionable whether this risk policy addresses
all relevant aspects in sufficient detail. However, it can be assumed that the internally
used risk policy differs from the version published on the company’s website (see similar
Hunziker and Meissner 2017, pp. 18–19).
4.3.3 Limitations of Risk Policies
As already mentioned, the development of an appropriate risk policy may require a lot of
energy and time. The different perspectives and experiences of the board members make
it often difficult to find a consensus. In addition, this consensus should largely reflect
our modern, value-creating ERM approach and not lead to a regulatory risk management
approach. Guiding this discussion on risk policy in the right direction is a major chal-
lenge for any risk manager.
After the extensive discussions have led to the approval of a risk policy, we must be
aware that this is of course an important achievement, but only one of many towards an
effective ERM. Additionally, even well-defined risk policies have limited effectiveness.
Some limitations are briefly introduced in the following.
• A risk policy is a document containing formal rules, definitions, roles and responsibil-
ities. To enhance risk culture, it is important that this document is appropriately com-
municated to all relevant stakeholders of ERM within the company. In many cases,
183
the risk policy is not well known to all risk owners due to communication, infrastruc-
ture or other organisational boundaries.
• The document itself does not protect against fraud, corruption and other illegal behav-
iour, even if it addresses them explicitly.
• Risk policies can not adequately address or translate intercultural risk components.
Thus, international differences in risk perception, risk awareness and risk assessments
cannot be fully captured in risk policies. For example, it might be challenging to com-
municate Europeans why risk about legal claims in the US can lead to exorbitant
claims.
• Once a risk policy has been approved, its validity is very limited in time. The increas-
ing dynamism of economic activity and the associated pace of change in day-to-day
business require a more abstract and aggregated risk policy description to ensure that
it does not become obsolete again within a very short time. This, however, reduces the
substance and concreteness of the policy.
• Finally, a risk policy must not deteriorate into a pure marketing tool. In particular, in
cases the risk policy is publicly available, the danger is great that socially expected
phrases (e.g. on risk appetite) will replace true ERM statements that lead to action and
decisions.
Finally, it should be noted that the board of directors often does not have sufficient time
to discuss the risk policy. In purely practical terms, the complexity of the ERM to be reg-
ulated is frequently treated with (too) little attention. However, if too few time resources
are available for the “risk policy” agenda item, the ERM system as a whole is probably
not expected to be highly professional either (Hunziker and Meissner 2017, p. 20).
4.4 Enhance Risk Culture
Risk culture is probably one of the most used and fuzzy terms to explain why ERM may
be effective or not in practice. Similarly to ERM, also risk culture has been increasingly
discussed over the last decade. Literature often mentions the financial crisis in 2008
and 2009 as the starting point of a new risk culture area. Since then, it is addressed by
many publications of consultants, risk professionals, risk organisations, publishers of
ERM frameworks and academics. However, definitions greatly vary and it remains often
unclear, what a risk culture is, how it is related to corporate culture and how it can con-
tribute to ERM effectiveness. The main question remains: How can a company transform
its risk policy into observable, self-evident action by all its employees? Or to put it dif-
ferently: If a risk manager is tasked with implementing ERM, how can he or she foster
a positive risk culture to increase ERM effectiveness? In order to understand what a risk
culture might be, we must first address the topic of corporate culture.
4.4 Enhance Risk Culture
184 4 Setting up Enterprise Risk Governance
4.4.1 Relate Risk Culture to Corporate Culture
Corporate culture is very differently defined in theory as well as in practice (Müller
2018, p. 16). In literature, we usually come across the well-accepted definition of Edgar
Schein, one of the pioneers in that area of research. Schein (2010) defines corporate cul-
ture as follows:
u “The culture of a group can now be defined as a pattern of shared basic assumptions
learned by a group as it solved its problems of external adaption and internal integration,
which has worked well enough to be considered valid and, therefore, to be taught to new
members as the correct way to perceive, think, and feel in relation to those problem.”
(Schein 2010, p. 18)
In order to better decompose corporate culture and to make it more accessible to
decision-makers, Schein (2010) divides corporate culture in a three level concept
(pp. 23–24):
• Artefacts and symbols are related to the surface of the company. They constitute the
visible elements of culture such as structure, architecture, processes, code of con-
ducts, annual reports.
• Espoused values are partly visible and partly perceived unconsciously. Examples
include common values, rules of conduct, ideologies, standards, aspirations, and
ideas. They may be congruent with the artefacts mentioned above, but they not neces-
sarily have to.
• Basic underlying assumptions are often only unconsciously perceived and are deeply
embedded in the company’s culture. They are experienced as self-evident and not
visible to people. Usually they are not questioned, but taken for granted instead.
Examples are norms, values, and beliefs that significantly determine the behaviour of
people. They are considered as the most important driver for corporate culture.
Is corporate culture important for a company? Consequently, why is that the case?
Research shows that corporate culture might be a crucial differentiation factor in today’s
global competitive markets. Adequate corporate culture has the power to trigger a so-
called fan factor in the company that leads to increased success. In so far, corporate cul-
ture has become a high priority topic (Heidbrink et al. 2014; Wien und Franzke 2014).
More specifically, if employees perceive top managers as trust worthy and ethical, a
company’s performance is stronger (Guiso et al. 2015, p. 60). For our purposes, we can
conclude that ERM is dependent on a sound corporate culture: In order to successfully
implement an ERM, a company and its employees must be open and willing to share
and develop teamwork among all hierarchical levels—from the board of directors, to
management, down to the hierarchical levels at the bottom. It can be concluded that a
185
company’s chances of implementing an effective ERM are directly related to its cultural
capacity for openness, transparency and teamwork (Fraser and Simkins 2016, p. 690).
After having briefly touched on definitions of corporate culture, the next paragraphs
sheds light on how corporate culture is related risk culture (see similar Müller 2018,
pp 17–18). Not very surprisingly, previous research on this relationship has been quite
ambivalent. Many authors strongly believe that risk culture and corporate culture are
essentially the same. It is for example claimed that if ERM shall be truly embedded into
business management, it should not be seen as a separate tool, but rather as part of the
overall corporate culture. However, proper risk management deserves and needs specific
attention (Davidson et al. 2012, p. 13), as it does not operate in a vacuum and is influ-
enced by corporate culture in many ways and thus they can be considered as quite the
same (DeLoach 2015).
Other authors state that corporate culture and risk culture have some aspects in com-
mon, but are not the same. For example, Ring et al. (2015) argue that risk culture is inex-
tricably linked to, but not the same as, organisational culture. They mention that ERM
has become an important topic when discussing corporate culture. Additionally, they
admit that risk culture can be shaped by corporate culture and, thus, is naturally part of
the overall corporate culture, but nevertheless not the same. Romeike (2018) confirms
this view by stating that corporate culture forms the relevant basis for a sound risk cul-
ture (p. 48). What do these findings and research observations mean for our textbook?
We accept the different views on these complex topics and note that there is at least
agreement that risk culture is very closely linked to corporate culture. An “isolated” risk
culture does not exist, it always depends on or is shaped by the corresponding corporate
culture.
In practice, risk culture has been defined in various ways. Most of the risk culture
definitions put emphasis on the employee’s behaviour and their practices in the pro-
cess of defining and managing risks (Blanco et al. 2014). For example, this is explicitly
expressed in the following definition of the Institute of International Finance (IIF):
u Risk culture can be understood as “the norms and traditions of behaviour of individu-
als and of groups within an organisation that determine the way in which they identify,
understand, discuss, and act on the risks the organisation confronts and the risks it takes”
(IRM 2012, p. 82).
Lam (2017) states that risk culture is shaped either positively or negatively by a wide
array of different forces such as the leadership, the shared values and beliefs, the incen-
tives, and habits. He also considers culture as the driver for human behaviour and in
that respect also for actions taken regarding ERM (p. 116). Other authors define risk
culture as something that binds all elements of ERM together (DeLoach 2015) or the
DNA that “shapes judgements, ethics and behaviours displayed at those key moments,
big or small, that matter to the performance and reputation of firms” (Adamson 2013).
DeLoach (2015) states that risk culture should be embedded into the organisation’s
4.4 Enhance Risk Culture
186 4 Setting up Enterprise Risk Governance
decision making processes. This requirement is fully in line with our ERM approach. He
describes risk culture similar to a look into the soul of any company to determine if risk
and reward trade-offs really matter.
So far, these definitions have quite a broad focus and are thus very general in nature
(Müller 2018, p. 18). Other authors discern risk culture more narrowly. Pan et al. (2017)
for example describe risk culture of a company as “the shared preferences toward risk
and uncertainty of those at the top of the firm” (p. 2328). They highlight the important
tone at the top that has a significant impact on risk culture throughout the company.
Similar aspects are put forward by Gleißner (2008) who states that risk culture is mainly
represented by risk appetite statements. In his view, risk culture is defined by the degree
of willingness of a person to bear risks. Risk tolerance is further dependent on the cur-
rent business situation. Employees are expected to take less risk during times of high
profits, and accept more risks during times of losses (p. 35).
In summary, two different approaches to define risk culture have been observed.
First, a description that relates predominantly to the behaviour of the employees towards
ERM processes and the embedding into their mindset. The second approach puts more
emphasis on how much risk management and employees are willing to take. Taylor
(2007) reinforces these two different views on risk culture as he differentiates between
the improvements of the cultural management to ascertain that employees behave in an
appropriate manner and the communication of the risk and return trade-offs in a com-
pany to all risk owners (p. 12).
No single best practice solution regarding risk culture exists (Deloitte 2012).
However, for the purpose of this textbook, risk culture shall be understood as a culture
that includes all values, norms and behaviours that support, enable, and positively impact
management and employees to effectively manage key risks in a modern ERM approach.
Additionally, it reflects the company’s way of how people are treated, including the
implicit rules and the assumptions that drive ERM towards the successful achievement
of its business objectives. In this respect, we rather refer to the first, broader introduced
definition in this textbook. Moreover, we appreciate a positive risk culture as a powerful
tool that motivates management and the Board to increase decision quality and as a tool
that leads to commitment towards the ERM’s objectives (Vazquez 2014; Hopkin 2017).
To put it differently: A positive risk culture is ultimately related to what extent ERM
information is incorporated in decision-making processes and thus, how well intuitive
decisions are balanced with rationality.
The following practical example may be considered as a typical phenomenon of poor
risk culture that can be observed on a regular basis: Despite having implemented for-
mal ERM processes and structures, risks occur that have not been adequately addressed
by management. In addition, risk information provided by the risk manager has not
been considered in decision-making processes. As a consequence, the benefits of ERM
are questioned and budgets to improve ERM will have to be justified even more in the
future.
187
Example
Esstisch AG, a German furniture manufacturer with 120 employees, runs a modern
ERM system. A risk policy with clearly assigned responsibilities was discussed and
approved by the Board of Directors. Risks from the internal and external environment
were identified, analysed and assessed taking risk interdependencies into account.
The risk manager monitors all accepted key risks (primarily strategic and operational
risks) in close cooperation with those responsible for strategy development and pro-
cess management. In addition, mitigation measures to reduce risks are defined and
reported regularly to management.
Nevertheless, Esstisch AG is caught on the wrong foot by unexpected risk events:
Firstly, the financial manager was absent for a longer period due to an accident, then
one of the most important customers announced his insolvency. Moreover, despite
tough negotiations, the cooperation with an important online retailer could not be
intensified. As a result, the risk manager and the methods and instruments used were
criticised because theses consequences could not be anticipated.
So far, risks had only been discussed at the top management level of Esstisch AG.
Due to the high work load, hardly any lessons were learned from previous risk events
or near misses at the operating level. For example, payments by major customers were
already delayed in the past. In addition, tone at the top was poor, as the cooperation
mentioned above failed due to a conflict within management. Ultimately, the risk
manager’s recommended mitigation measures were perceived as a pure cost burden.
The risk report provided by the risk manager was also mostly ignored, as there was
hardly any time left in the jam-packed board meetings (Hunziker et al. 2017, p. 22).
A recent study conducted by the Lucerne University of Applied Sciences and Arts sur-
veyed risk culture maturity of Swiss companies in detail. It turned out that only one
out of four companies consciously promotes a positive risk culture. For two third of the
respondents, risk culture is only partially within scope, while every tenth company pays
little or no attention at all to the risk culture (Hunziker et al. 2016). Obviously, risk cul-
ture poses a major challenge for many companies. Considering its importance, we can
observe lot of work to be done to catch up in this respect.
Let us sum up as follows: With a positive risk culture in the company, ERM can lead
to a strategic competitive advantage by consciously taking risks in order to exploit poten-
tial rewards and by integration risk information at the time decisions are taken. In doing
so, it will also be possible to counter the still bad image of ERM as a pure cost burden. If
companies can develop and communicate values, norms and behaviours that support and
enable balancing risk and rewards appropriately, a positive risk culture can be anchored
in the company and thus lead to improved decision quality.
4.4 Enhance Risk Culture
188 4 Setting up Enterprise Risk Governance
4.4.2 Understand How Risk Culture Evolves
According to the Institute for Risk Management, there are two ways in which the risk
culture can develop. Either a conscious implementation takes place on the basis of
intended decisions, or the risk culture naturally develops without explicit management.
In practice, both ways are possible to foster a risk culture. If it is to be directly influ-
enced, a clear statement from the company’s top management is required. It requires
a clear risk vision and risk policy with a value statement that emphasises the value of
risk management. Equally important is appropriate communication with the risk com-
munity to promote and encourage appropriate risk behaviour (Müller 2018, pp. 19–20).
If the risk culture is to develop naturally, the focus is on implementing practical exam-
ples. Employees who deal with risk management in their daily work unconsciously rec-
ognise the importance of risk management. The repetition of these risk activities leads
to smooth processes and increased quality. This creates a positive cycle in which ERM
creates a strong risk culture and this in turn promotes appropriate risk behaviour. In other
words, there are two ways to develop the risk culture, either top-down or bottom-up, and
both approaches have their advantages and disadvantages (IRM 2012, p. 22).
The Institute of Risk Management (2012) has suggested a framework to understand
how risk culture might work in practice. Their A-B-C framework is based on the three
pillars attitudes, behaviour, and culture which are described as follows:
• Risk attitude is how an individual’s or a group’s position towards risk taking is char-
acterised. It might be influenced by risk perception and character traits. Examples are
risk-averse or risk-seeking attitudes.
• Risk behaviour includes all risk-management based actions that can be observed. In
other words the “doing” of risk management activities. Examples include decision-
making, processes, and communications.
• Risk culture includes all values and beliefs that the risk community shares in order to
work towards a common purpose (p. 22).
An interesting characteristic of this model is that all three elements are integrated into
a feedback loop, which means that culture is dynamic. Culture is formed by repeated
behaviour and influences the attitudes of its members. Culture also impacts behaviour
through a set of values and beliefs. In this respect, culture is part of different cycles that
can have either reinforcing or diminishing effects (IRM 2012, p. 22). In summary, it can
be clearly stated: The implementation of risk culture in a company is a challenging jour-
ney that takes time. It requires value recognition, dedicated commitment towards ERM,
and a persistent management that keeps its focus over years and beyond (Adamson 2013).
Generally speaking, risk culture influences ERM, and vice versa. Embedding ERM
as an integral part of a company so as it matters in decision-making processes is a great
challenge. Probably the highest hurdle to surmount is undoubtedly the people them-
selves. Every human being is unique and brings own attitudes and perceptions of risks
189
into the company, which ultimately forms the risk culture of a whole organisation.
Having said that, risk culture inevitably influences the ERM mechanisms and processes,
but in turn, ERM and its processes do also affect the risk culture (IRM 2012, p. 16).
Crossan et al. (2013) suggest similarly that risk culture does not evolve independently as
it is always linked to the ERM processes and structures (p. 2).
Thus, it is necessary that risk policies, ERM structures and processes are well defined
in order to support a positive risk culture. This interdependency between ERM and risk
culture was empirically tested by Sheedy and Griffin (2018) who tried to explain the
relationship between risk culture and ERM structures with the ultimate goal to enhance
risk behaviour in financial institutions. Their results confirm that the ERM structures,
such as trainings, incentive systems, and clear ERM frameworks, support to strengthen
a positive risk culture, and so does it the other way around (pp. 15–20). Finally, it can
be concluded that there is a strong relationship between risk culture and the set-up of the
ERM in every company. However, research on that interplay of risk culture and ERM
effectiveness is still scarce. Thus, it is no surprise that due to the complexity of these top-
ics, risk culture benchmarking tools are barely available.
4.4.3 Increase Risk Culture Maturity Level
The understanding of the “soft side” (risk culture) of ERM is probably at least as impor-
tant as the hard side (ERM process and structures). The financial crisis was one of the
triggers that the topic of risk culture resurfaced. Specifically in the financial industry,
pressurised to understand, to measure, and to improve risk culture. So far, as we have
learned, risk culture is still a vague concept that lacks a clear definition and an accepted
conceptualization (Müller 2018, p. 29). The main reason for that is that many risk pro-
fessionals, management and employees consider risk culture as an unmeasurable objec-
tive, or they perceive it as very difficult to capture compared to other hard facts (Lam
2017, p. 116; Davidson et al. 2012, p. 12). However, it would be very supportive to have
a benchmarking tool which enables a quantitative measurement of risk culture in order to
identify weaknesses and to follow up on these. (Hopkin 2017, p. 295). So far, companies
struggle to capture their own risk culture appropriately. For these reasons, it is not sur-
prising that the development of benchmarking tools to assess risk culture remain scarce.
However, some approaches have been developed and published by the Big Four auditors,
as briefly presented in the following (see Müller 2018, pp. 30–31).
McKinsey developed a risk culture diagnostic tool that helps to measure risk culture
and simultaneously supports the identification of the causes behind the failure of risk
culture. The tool follows an empirically tested approach and is based on defined core
elements of a company’s risk culture. Those core elements consist of risk transparency,
risk acknowledgement, risk responsiveness, and risk respect. It is an analytical approach
that measures and profiles risk culture. It can be used for benchmarking against other
4.4 Enhance Risk Culture
190 4 Setting up Enterprise Risk Governance
companies or to improve the own risk culture. The concrete measurement methodology
itself is not publicly available (Levy et al. 2010, p. 7).
Another tool is provided by PwC. Their Risk Culture Survey (RCS) is a web-based
diagnostic tool that assesses the effectiveness of a company’s ERM culture. Their assess-
ment approach differentiates between four different areas: Leadership and strategy
assesses the integrity and ethical values as well as the communicated mission and objec-
tives. Accountability and reinforcement measures components such as the assignment
of authorities and responsibilities as well as human resource policies and performance
measurement. People and communication assesses the commitment to competence as
well as information and communication channels. Risk management and infrastruc-
ture assesses ERM practices and tools and establishes processes and controls. Similarly
to McKinsey, the assessment methodology behind the survey is not publicly available
(Smith and Kagan 2012, pp. 1–3).
Deloitte developed another tool called Risk Culture Framework. Their framework is
based on four main pillars such as risk competence, organisation, motivation and rela-
tionship. It tries to assess the collective competence within the company and analyses the
structure and its prevailing corporate values. Deloitte also assesses the way people man-
age risks including the incentive system behind. Finally they evaluate how people inter-
act and communicate with each other (Deloitte 2012, p. 3). Finally, there is the Model
of a Sound Risk Culture developed by Ernst & Young (2015). It defines four attributes
of a sound culture: leadership, organisation, risk framework, and incentives. The goal is
to measure if the right tone from the top is communicated throughout the company, if
management establishes an environment that supports ERM, if the right risks are taken,
and if appropriate incentives are provided. These four elements are connected with so-
called behavioural outcomes. This means that tangible attributes are linked to intangible
behavioural elements. Examples of behavioural outcomes are lead and influence, analyse
and interpret, responsible and accountable, collaborative, ethical and compliant, commu-
nicative, adaptable, and advocate. The model aims at supporting companies to create a
sustainable risk culture including strong control mechanisms (pp. 4–6).
Do these risk culture frameworks support companies to assess their current risk cul-
ture maturity level? Do they support companies to identify strengths and weaknesses?
Do they recommend concrete steps to improve risk culture? Unfortunately, this is
only partially the case in reality. To sum up, all these risk culture frameworks attempt
to conceptualise risk culture by attributing very different key elements of risk culture.
However, none of these models reveal a detailed description of the components, nor the
assessment method behind (Müller 2018, p. 30). In addition, only very little research
has been undertaken about the theoretical background and the reflection of these models
(Wendler 2012, p. 1324). For example, these tools lack a clear assessment methodology
and a sound theoretical background. Often an integrated view of the relevant elements
is missing (Frick et al. 2013, p. 274). Moreover, they can not directly be used as matu-
rity models which allow a comprehensive assessment of the current stage of risk culture.
191
Generally speaking, literature review reveals that risk culture maturity models have not
yet been addressed by risk professionals and academics.
In the following, a first promising approach to comprehensively measure risk culture
by means of a maturity model is presented. It has been developed by Müller (2018) and
is based on an extant literature review and on different case studies within Swiss com-
panies. It offers companies to assess their risk culture maturity based on a percentage
grade of each component. The advantage of that approach is that it does not calculate
an average value over all components which may dilute certain specific weaknesses. It
thus stresses the assessment of every single component rather than presenting an overall
maturity level.
An excerpt of the risk culture maturity model is presented in Table 4.3. The five matu-
rity levels of each component have been elaborated based on the consideration of a worst
case scenario (expressed as strongly negative), and a best case scenario (expressed as
strongly positive). For simplicity reasons, only the strongly negative, the neutral and the
strongly positive maturity levels are fully described.
Clearly, it needs to be highlighted that many aspects of risk culture are overlapping
and do not always have clear boundaries. To provide an example, a positive knowledge
sharing experience in a subunit (business area) is in most cases related to a collaborative
environment and, thus, collaboration is rated highly. Another example, trainings offered
and promoted to employees inevitably influence the awareness throughout the company
and vice versa. Some components are strongly interlinked with each other and can have a
reinforcing impact on others. To summarise, Table 4.3 shows how multi-faceted risk cul-
ture is. Companies may consider this maturity model as a sound basis to challenge their
own risk culture keeping in mind that it is not yet fully empirically tested and maybe
incomplete.
4.5 Organise ERM Properly
The important role of how ERM is organised should be adequately taken into account.
Ultimately, all the principles and concepts of ERM must be embedded in the company.
In the following, the company goals, organisational options, roles and responsibilities are
considered. As previously mentioned, the ERM organisation can not be fully defined at
the very start of an ERM project. It evolves over time and is adapted selectively accord-
ing to the experiences with the ERM process during implementation. Of course, ERM
organisation must be aligned with the company-wide objectives of organisational man-
agement. With respect to the paradigm “structure follows strategy”, ERM organisation
includes the development of adequate risk culture at all hierarchical levels which is in
line with the corporate strategy.
An adequate ERM organisation supports the effective execution of the ERM pro-
cess, i.e. identification of all key risks at all hierarchical levels and enterprise-wide as
well as the coordination of all process steps and the incorporation of risk information in
4.5 Organise ERM Properly
192 4 Setting up Enterprise Risk Governance
Ta
b
le
4
.3
R
is
k
cu
lt
ur
e
m
at
ur
it
y
m
od
el
. (
M
ül
le
r
20
18
, p
p.
5
0–
52
)
C
om
po
ne
nt
S
tr
on
gl
y
N
eg
at
iv
e
(0
%
)
N
eu
tr
al
(
50
%
)
S
tr
on
gl
y
P
os
it
iv
e
(1
00
%
)
T
on
e
at
t
he
T
op
T
he
re
i
s
no
o
r
a
ne
ga
ti
ve
t
on
e
at
t
he
to
p
pe
rc
ep
ti
bl
e
w
it
h
re
ga
rd
t
o
E
R
M
.
E
R
M
i
s
co
ns
id
er
ed
a
s
a
re
gu
la
to
ry
re
qu
ir
em
en
t
(s
ee
r
eg
ul
at
or
y
ri
sk
m
an
ag
em
en
t
ap
pr
oa
ch
)
T
he
t
on
e
at
t
he
t
op
i
s
ne
ut
ra
l.
M
an
ag
em
en
t
se
es
t
he
v
al
ue
o
f
E
R
M
be
yo
nd
t
he
r
eg
ul
at
or
y
re
qu
ir
em
en
ts
.
H
ow
ev
er
, t
he
c
om
m
it
m
en
t
an
d
po
si
ti
ve
at
ti
tu
de
t
ow
ar
ds
E
R
M
i
s
on
ly
v
is
ib
le
oc
ca
si
on
al
ly
a
nd
i
ns
uf
fi
ci
en
tl
y
T
he
t
on
e
at
t
he
t
op
i
s
ex
ce
ll
en
t.
E
m
pl
oy
ee
s
pe
rc
ei
ve
a
s
tr
on
g
co
m
m
it
m
en
t
an
d
a
ve
ry
p
os
it
iv
e
at
ti
tu
de
t
ow
ar
ds
E
R
M
t
ha
t
is
r
eg
ul
ar
ly
v
is
ib
le
f
or
e
m
pl
oy
ee
s.
T
op
m
an
ag
em
en
t
is
p
er
so
na
ll
y
co
nv
in
ce
d
an
d
de
m
on
st
ra
te
s
th
e
va
lu
e
ad
de
d.
E
R
M
i
s
co
ns
ta
nt
ly
a
nc
ho
re
d
in
t
he
m
an
ag
em
en
t
ag
en
da
T
on
e
in
t
he
M
id
dl
e
T
he
re
i
s
no
o
r
a
ne
ga
ti
ve
t
on
e
in
t
he
m
id
dl
e
pe
rc
ep
ti
bl
e
w
it
h
re
ga
rd
t
o
ri
sk
m
an
ag
em
en
t.
E
R
M
i
s
se
en
a
s
a
re
gu
la
to
ry
r
eq
ui
re
m
en
t
T
he
t
on
e
in
t
he
m
id
dl
e
is
n
eu
tr
al
. T
he
im
po
rt
an
ce
o
f
E
R
M
i
s
pe
rc
ei
ve
d
be
yo
nd
re
gu
la
to
ry
r
eq
ui
re
m
en
ts
, b
ut
i
s
no
t
co
m
m
un
ic
at
ed
a
s
hi
gh
p
ri
or
it
y
to
pi
c.
T
he
c
om
m
it
m
en
t
an
d
po
si
ti
ve
a
tt
it
ud
e
to
w
ar
ds
E
R
M
i
s
vi
si
bl
e
oc
ca
si
on
al
ly
T
he
t
on
e
in
t
he
m
id
dl
e
is
e
xc
el
le
nt
. R
is
k
M
an
ag
em
en
t
is
a
t
op
p
ri
or
it
y
on
t
he
l
ea
de
r-
sh
ip
a
ge
nd
a.
M
id
dl
e
m
an
ag
em
en
t
co
m
m
it
s
it
se
lf
h
ig
hl
y
to
E
R
M
a
nd
a
v
er
y
po
si
ti
ve
at
ti
tu
de
i
s
sp
re
ad
a
ll
o
ve
r
th
e
or
ga
ni
sa
ti
on
.
E
m
pl
oy
ee
s
pe
rc
ei
ve
s
tr
on
g
ro
le
m
od
el
s
U
ps
id
e
P
ot
en
ti
al
A
w
ar
en
es
s
R
is
k
is
d
efi
ne
d
as
t
he
p
ot
en
ti
al
o
f
lo
ss
(
do
w
ns
id
e
ri
sk
f
oc
us
)
U
ps
id
e
po
te
nt
ia
l
is
f
re
qu
en
tl
y
ta
ke
n
in
to
ac
co
un
t
an
d
ra
is
ed
b
y
th
e
em
pl
oy
ee
s.
O
pp
or
tu
ni
ti
es
a
re
n
ot
r
ec
og
ni
se
d
in
a
ll
pa
rt
s
of
t
he
o
rg
an
is
at
io
n
eq
ua
ll
y
T
he
v
al
ue
o
f
E
R
M
, i
nc
lu
di
ng
d
ow
ns
id
e
an
d
up
si
de
r
is
k
sc
en
ar
io
s
is
h
ig
hl
y
re
co
g-
ni
se
d.
O
pp
or
tu
ni
ti
es
a
re
a
n
in
te
gr
al
p
ar
t
of
t
he
k
ey
c
om
po
ne
nt
s
on
a
ll
l
ev
el
s
of
t
he
or
ga
ni
sa
ti
on
D
ec
is
io
n
In
te
gr
at
io
n
T
he
re
i
s
no
l
in
k
be
tw
ee
n
E
R
M
a
nd
de
ci
si
on
m
ak
in
g.
B
us
in
es
s
pl
an
s
ar
e
el
ab
or
at
ed
w
it
ho
ut
a
ny
E
R
M
i
np
ut
an
d
vi
ce
v
er
sa
. S
tr
at
eg
ic
d
ec
is
io
ns
su
ff
er
r
at
io
na
l
in
pu
t
pr
ov
id
ed
b
y
E
R
M
E
R
M
i
s
pa
rt
ia
ll
y
li
nk
ed
t
o
de
ci
si
on
s
m
ad
e
by
m
an
ag
em
en
t.
B
us
in
es
s
pl
an
s
do
fr
eq
ue
nt
ly
c
on
ta
in
i
np
ut
f
ro
m
t
he
E
R
M
pr
oc
es
s
an
d
vi
ce
v
er
sa
. E
R
M
i
s
no
t
on
e
of
t
he
p
ri
m
ar
y
so
ur
ce
s
fo
r
de
ci
si
on
m
ak
–
in
g.
M
an
ag
em
en
t
pr
oc
es
se
s
ar
e
al
ig
ne
d
w
it
h
E
R
M
p
ro
ce
ss
es
T
he
re
i
s
a
st
ro
ng
l
in
k
be
tw
ee
n
th
e
E
R
M
pr
oc
es
s
an
d
de
ci
si
on
m
ak
in
g,
w
he
re
as
b
ot
h
pa
rt
s
in
fl
ue
nc
e
ea
ch
o
th
er
a
nd
t
im
el
in
es
a
re
al
ig
ne
d.
M
an
ag
em
en
t
ac
ti
ve
ly
s
ee
k
ou
t
fo
r
ri
sk
i
nf
or
m
at
io
n
in
o
rd
er
t
o
m
ak
e
de
ci
si
on
s.
D
ec
is
io
ns
a
re
b
al
an
ce
d
be
tw
ee
n
ra
ti
on
al
it
y
an
d
in
tu
it
io
n
(c
on
ti
nu
ed
)
193
Ta
b
le
4
.3
(c
on
ti
nu
ed
)
C
om
po
ne
nt
S
tr
on
gl
y
N
eg
at
iv
e
(0
%
)
N
eu
tr
al
(
50
%
)
S
tr
on
gl
y
P
os
it
iv
e
(1
00
%
)
S
tr
at
eg
ic
D
ir
ec
ti
on
T
he
re
i
s
no
s
tr
at
eg
y
to
i
m
pl
em
en
t
E
R
M
. E
R
M
, i
f
im
pl
em
en
te
d
at
a
ll
,
is
d
on
e
un
co
ns
ci
ou
sl
y.
T
he
re
i
s
no
di
re
ct
io
n
gi
ve
n
(r
is
k
po
li
cy
)
pr
ov
id
ed
fr
om
a
s
tr
at
eg
ic
p
oi
nt
o
f
vi
ew
T
he
re
a
re
s
om
e
st
ra
te
gi
ca
l
di
re
ct
io
ns
ho
w
t
o
im
pl
em
en
t
E
R
M
. H
ow
ev
er
, t
he
y
al
lo
w
f
or
d
if
fe
re
nt
i
nt
er
pr
et
at
io
ns
i
n
th
e
ri
sk
c
om
m
un
it
y
an
d
pr
ev
en
t
an
e
ff
ec
ti
ve
im
pl
em
en
ta
ti
on
o
f
E
R
M
. E
R
M
p
ra
ct
ic
es
ar
e
pa
rt
ly
a
li
gn
ed
b
et
w
ee
n
th
e
un
it
s
T
he
re
i
s
a
st
ro
ng
a
nd
c
le
ar
ly
a
rt
ic
ul
at
ed
st
ra
te
gy
a
va
il
ab
le
h
ow
E
R
M
s
ha
ll
b
e
em
be
dd
ed
i
n
th
e
co
m
pa
ny
(
ad
eq
ua
te
r
is
k
po
li
cy
a
va
il
ab
le
).
T
he
re
i
s
cl
ea
r
di
re
ct
io
n
gi
ve
n
th
at
e
na
bl
es
a
li
gn
ed
E
R
M
C
ha
ll
en
gi
ng
S
ta
tu
s
Q
uo
R
ep
or
te
d
ri
sk
s
ar
e
ne
it
he
r
cr
it
ic
al
ly
re
vi
ew
ed
, n
or
c
ha
ll
en
ge
d
fr
om
t
he
m
an
ag
em
en
t
or
t
he
E
R
M
t
ea
m
R
ep
or
te
d
ri
sk
s
ar
e
oc
ca
si
on
al
ly
, b
ut
n
ot
sy
st
em
at
ic
al
ly
, c
ri
ti
ca
ll
y
re
vi
ew
ed
a
nd
ch
al
le
ng
ed
f
ro
m
t
he
m
an
ag
em
en
t
or
t
he
E
R
M
f
un
ct
io
ns
R
ep
or
te
d
ri
sk
s
ar
e
co
ns
ta
nt
ly
a
nd
c
ri
ti
ca
ll
y
re
vi
ew
ed
. R
is
ks
a
re
c
ha
ll
en
ge
d
th
ro
ug
ho
ut
al
l
fu
nc
ti
on
s
w
hi
ch
e
na
bl
es
h
ig
h
qu
al
it
y
E
R
M
E
R
M
A
w
ar
en
es
s
M
os
t
of
t
he
e
m
pl
oy
ee
s
ar
e
no
t
fa
m
il
–
ia
r
w
it
h
E
R
M
a
nd
d
o
co
ns
eq
ue
nt
ly
ap
pl
y
it
A
bo
ut
h
al
f
of
t
he
e
m
pl
oy
ee
s
ar
e
fa
m
il
–
ia
r
an
d
kn
ow
a
bo
ut
E
R
M
p
ra
ct
ic
es
.
A
pp
li
ca
ti
on
d
ep
en
ds
o
n
th
e
ar
ea
o
r
bu
si
–
ne
ss
u
ni
t
an
d
is
l
im
it
ed
. V
er
y
li
tt
le
E
R
M
ca
m
pa
ig
ns
a
re
i
n
pl
ac
e
E
m
pl
oy
ee
s
at
a
ll
l
ev
el
s
kn
ow
a
bo
ut
E
R
M
pr
ac
ti
ce
s
an
d
ar
e
hi
gh
ly
k
no
w
le
dg
ea
bl
e.
R
eg
ul
ar
E
R
M
c
am
pa
ig
ns
a
re
l
au
nc
he
d
to
en
su
re
s
us
ta
in
ab
le
r
is
k
aw
ar
en
es
s.
M
od
er
n
E
R
M
p
ra
ct
ic
es
a
re
a
pp
li
ed
i
n
al
l
pa
rt
s
of
th
e
co
m
pa
ny
M
ot
iv
at
io
n
E
m
pl
oy
ee
s
do
n
ot
u
nd
er
st
an
d
th
e
va
lu
e
of
E
R
M
a
nd
s
ho
w
n
o
m
ot
iv
a-
ti
on
t
o
do
s
o.
E
R
M
i
s
se
en
a
s
a
ne
ce
ss
ar
y
ev
il
A
bo
ut
h
al
f
of
t
he
e
m
pl
oy
ee
s
un
de
r-
st
an
d
th
e
tr
ue
v
al
ue
o
f
E
R
M
a
nd
s
pr
ea
d
m
ot
iv
at
io
n
ac
ro
ss
t
he
r
is
k
co
m
m
un
it
y.
I
t
is
q
ui
te
f
re
qu
en
tl
y
in
te
gr
al
p
ar
t
of
t
he
ir
m
in
ds
et
E
m
pl
oy
ee
s
th
ro
ug
ho
ut
t
he
c
om
pa
ny
s
ee
R
M
a
s
a
va
lu
e
ad
di
ng
a
ct
iv
it
y.
T
he
y
ar
e
hi
gh
ly
m
ot
iv
at
ed
t
o
ca
rr
y
ou
t
E
R
M
t
as
ks
an
d
ha
ve
f
ul
ly
e
m
be
dd
ed
E
R
M
i
n
th
ei
r
m
in
ds
et
E
xe
cu
ti
on
E
R
M
i
s
no
t
ac
ti
ve
ly
m
an
ag
ed
i
n
la
rg
e
pa
rt
s
of
t
he
c
om
pa
ny
E
R
M
i
s
ad
ap
te
d
fr
eq
ue
nt
ly
i
n
th
e
co
m
pa
ny
. I
t
is
s
om
et
im
es
r
ea
ct
iv
el
y
an
d
so
m
et
im
es
p
ro
ac
ti
ve
ly
m
an
ag
ed
.
S
om
et
im
es
r
is
k
de
li
ve
ra
bl
es
l
ac
k
ce
rt
ai
n
qu
al
it
y
is
su
es
a
nd
n
ee
d
to
b
e
re
w
or
ke
d
E
R
M
i
s
w
id
el
y
ad
ap
te
d
in
a
ll
p
ar
ts
o
f
th
e
co
m
pa
ny
a
nd
r
is
ks
a
re
a
lw
ay
s
pr
oa
ct
iv
el
y
m
an
ag
ed
. E
R
M
i
s
se
en
a
s
in
te
gr
al
p
ar
t
of
da
il
y
w
or
k.
T
he
q
ua
li
ty
o
f
ri
sk
d
el
iv
er
ab
le
s
an
d
ri
sk
o
ut
co
m
es
i
s
st
at
e-
of
-t
he
-a
rt
(c
on
ti
nu
ed
)
4.5 Organise ERM Properly
194 4 Setting up Enterprise Risk Governance
Ta
b
le
4
.3
(c
on
ti
nu
ed
)
C
om
po
ne
nt
S
tr
on
gl
y
N
eg
at
iv
e
(0
%
)
N
eu
tr
al
(
50
%
)
S
tr
on
gl
y
P
os
it
iv
e
(1
00
%
)
T
ra
ns
pa
re
nc
y
&
T
ru
st
E
m
pl
oy
ee
s
fe
ar
t
o
di
sc
lo
se
r
is
k
in
fo
rm
at
io
n
an
d
co
ns
eq
ue
nt
ly
r
ef
ra
in
fr
om
i
t.
T
he
re
i
s
ne
it
he
r
tr
an
sp
ar
–
en
cy
, n
or
o
pe
n
di
sc
us
si
on
s
ab
ou
t
E
R
M
. M
is
ta
ke
s
le
ad
t
o
fi
ng
er
p
oi
nt
–
in
g.
T
he
re
a
re
m
an
y
si
gn
s
of
a
h
ig
hl
y
di
st
ru
st
fu
l
en
vi
ro
nm
en
t
T
he
o
pe
nn
es
s
an
d
tr
an
sp
ar
en
cy
o
f
ri
sk
in
fo
rm
at
io
n
is
h
ig
hl
y
de
pe
nd
en
t
on
t
he
en
vi
ro
nm
en
t.
W
he
re
as
a
m
aj
or
it
y
of
em
pl
oy
ee
s
is
w
il
li
ng
t
o
sh
ar
e
in
fo
rm
a-
ti
on
, o
th
er
s
ar
e
re
lu
ct
an
t.
M
is
ta
ke
s
ar
e
ra
re
ly
h
an
dl
ed
w
it
h
fi
ng
er
p
oi
nt
in
g.
T
he
re
a
re
s
ig
ns
o
f
a
tr
us
tf
ul
e
nv
ir
on
m
en
t
A
h
ig
hl
y
en
co
ur
ag
in
g
en
vi
ro
nm
en
t
ex
is
ts
th
at
a
ll
ow
s
to
o
pe
nl
y
an
d
tr
an
sp
ar
en
tl
y
di
sc
us
si
ng
r
is
ks
. E
m
pl
oy
ee
s
ar
e
hi
gh
ly
w
il
li
ng
t
o
sh
ar
e
ri
sk
i
nf
or
m
at
io
n
in
a
t
im
el
y
m
an
ne
r.
M
is
ta
ke
s
ar
e
fu
ll
y
ac
ce
pt
ed
a
nd
pe
rc
ei
ve
d
as
a
n
op
po
rt
un
it
y
to
l
ea
rn
. T
he
re
ar
e
si
gn
s
of
a
v
er
y
tr
us
tf
ul
e
nv
ir
on
m
en
t
C
ol
la
bo
ra
ti
on
a
nd
In
te
ra
ct
io
n
T
he
re
i
s
no
c
ol
la
bo
ra
ti
on
i
n
th
e
ri
sk
co
m
m
un
it
y.
T
he
re
i
s
a
cl
ea
r
ex
pr
es
–
si
on
o
f
un
w
il
li
ng
ne
ss
t
o
in
te
ra
ct
an
d
co
m
m
un
ic
at
e
be
tw
ee
n
di
ff
er
en
t
fu
nc
ti
on
s
T
he
re
i
s
so
m
e
co
ll
ab
or
at
io
n
in
t
he
r
is
k
co
m
m
un
it
y,
b
ut
n
ot
o
n
a
re
gu
la
r
ba
si
s.
T
he
d
if
fe
re
nt
f
un
ct
io
ns
i
nt
er
ac
t
fr
e-
qu
en
tl
y
w
it
h
ea
ch
o
th
er
, a
nd
c
om
m
un
i-
ca
te
a
cc
or
di
ng
ly
T
he
re
i
s
ex
ce
ll
en
t
co
ll
ab
or
at
io
n
be
tw
ee
n
th
e
te
am
s.
T
hi
s
is
p
er
ce
iv
ed
i
ns
pi
ri
ng
a
nd
w
el
l-
fu
nc
ti
on
in
g.
T
he
re
i
s
ac
ti
ve
a
nd
c
on
–
st
ru
ct
iv
e
co
m
m
un
ic
at
io
n
K
no
w
le
dg
e
S
ha
ri
ng
E
m
pl
oy
ee
s
do
n
ot
s
ha
re
k
no
w
le
dg
e
or
b
es
t
pr
ac
ti
ce
s,
n
or
d
o
th
ey
e
ng
ag
e
in
w
or
ks
ho
ps
o
f
th
e
ri
sk
c
om
m
un
it
y
E
m
pl
oy
ee
s
sh
ow
i
nt
er
es
t
in
k
no
w
le
dg
e
an
d
be
st
p
ra
ct
ic
e
sh
ar
in
g.
H
ow
ev
er
, t
he
y
se
e
a
st
ro
ng
n
ee
d
to
i
m
pr
ov
e
kn
ow
le
dg
e
sh
ar
in
g.
E
m
pl
oy
ee
s
en
ga
ge
f
ro
m
t
im
e
to
ti
m
e
in
E
R
M
w
or
ks
ho
ps
a
nd
k
no
w
le
dg
e
ex
ch
an
ge
E
m
pl
oy
ee
s
do
s
tr
on
gl
y
en
ga
ge
i
n
kn
ow
l-
ed
ge
a
nd
b
es
t
pr
ac
ti
ce
s
ha
ri
ng
. T
he
y
ac
ti
ve
ly
t
ak
e
pa
rt
i
n
E
R
M
w
or
ks
ho
ps
a
nd
ar
e
hi
gh
ly
i
nv
ol
ve
d
ne
tw
or
ki
ng
a
ct
iv
it
ie
s.
T
he
re
i
s
a
hi
gh
v
ar
ie
ty
o
f
pl
at
fo
rm
a
va
il
–
ab
le
t
o
su
pp
or
t
kn
ow
le
dg
e
ex
ch
an
ge
F
ee
db
ac
k
T
he
re
i
s
no
f
ee
db
ac
k
cu
lt
ur
e
in
p
la
ce
an
d
em
pl
oy
ee
s
ar
e
no
t
in
te
re
st
ed
i
n
co
ll
ec
ti
ng
a
ny
f
ee
db
ac
k
fr
om
t
he
ir
en
vi
ro
nm
en
t
T
he
re
i
s
a
fe
ed
ba
ck
c
ul
tu
re
i
n
pl
ac
e.
F
ee
db
ac
k
is
c
ol
le
ct
ed
r
eg
ul
ar
ly
i
n
or
de
r
to
i
m
pr
ov
e
pr
oc
es
se
s.
I
t
ha
pp
en
s
ei
th
er
ac
ti
ve
ly
o
r
un
co
ns
ci
ou
sl
y
T
he
f
ee
db
ac
k
cu
lt
ur
e
of
t
he
o
rg
an
is
at
io
ns
ve
ry
s
tr
on
g.
F
ee
db
ac
k
is
o
ft
en
u
se
d
an
d
ac
ti
ve
ly
c
ol
le
ct
ed
i
n
or
de
r
to
c
on
ti
nu
ou
sl
y
im
pr
ov
e
pr
oc
es
se
s.
T
he
re
a
re
v
ar
io
us
fe
ed
ba
ck
m
et
ho
ds
i
n
pl
ac
e
th
at
a
ll
ow
f
or
fe
ed
ba
ck
i
n
di
ff
er
en
t
di
re
ct
io
ns
(c
on
ti
nu
ed
)
195
Ta
b
le
4
.3
(c
on
ti
nu
ed
)
C
om
po
ne
nt
S
tr
on
gl
y
N
eg
at
iv
e
(0
%
)
N
eu
tr
al
(
50
%
)
S
tr
on
gl
y
P
os
it
iv
e
(1
00
%
)
P
ro
ce
ss
D
efi
ni
ti
on
T
he
re
a
re
n
o
po
li
ci
es
a
nd
g
ui
de
li
ne
s
av
ai
la
bl
e
an
d
no
o
rg
an
is
at
io
na
l
se
t-
up
i
s
de
fi
ne
d
W
ri
tt
en
, i
nd
iv
id
ua
l
or
g
lo
ba
l
po
li
ci
es
,
gu
id
el
in
es
, a
nd
/o
r
or
ga
ni
sa
ti
on
al
s
tr
uc
–
tu
re
s
av
ai
la
bl
e
in
a
m
aj
or
it
y
of
u
ni
ts
/
su
bu
ni
ts
C
om
pr
eh
en
si
ve
d
oc
um
en
ta
ti
on
a
va
il
ab
le
(i
nc
lu
di
ng
p
ol
ic
ie
s,
g
ui
de
li
ne
s,
o
rg
an
is
a-
ti
on
al
s
et
-u
p)
. M
ec
ha
ni
sm
s
ar
e
w
el
l
de
fi
ne
d
an
d
co
ns
is
te
nt
t
hr
ou
gh
ou
t
al
l
le
ve
ls
o
f
th
e
or
ga
ni
sa
ti
on
T
oo
l
S
up
po
rt
N
o
E
R
M
t
oo
ls
a
re
a
va
il
ab
le
T
he
re
a
re
s
om
e
to
ol
s
av
ai
la
bl
e
w
hi
ch
a
re
pa
rt
ly
s
ta
nd
ar
di
se
d.
E
m
pl
oy
ee
s
pe
rc
ei
ve
th
e
to
ol
s
as
r
at
he
r
co
m
pl
ex
a
nd
o
nl
y
pa
rt
ly
h
el
pf
ul
T
he
re
a
re
d
if
fe
re
nt
t
oo
ls
f
or
d
if
fe
re
nt
pu
rp
os
es
a
va
il
ab
le
w
hi
ch
a
re
s
ta
nd
ar
di
se
d
to
a
n
op
ti
m
al
d
eg
re
e.
T
he
y
ar
e
pe
rc
ei
ve
d
as
h
ig
hl
y
us
er
-f
ri
en
dl
y
an
d
he
lp
fu
l.
T
he
se
to
ol
s
pr
ov
id
e
ad
h
oc
i
nf
or
m
at
io
n
w
hi
ch
c
an
be
u
se
d
as
a
b
as
is
f
or
d
ec
is
io
n-
m
ak
in
g
R
es
po
ns
ib
il
it
y
&
A
cc
ou
nt
ab
il
it
y
N
ei
th
er
a
re
r
ol
es
a
nd
r
es
po
ns
ib
il
i-
ti
es
d
efi
ne
d
an
d
un
de
rs
to
od
, n
or
d
o
em
pl
oy
ee
s
fe
el
a
cc
ou
nt
ab
le
i
n
th
ei
r
ro
le
A
bo
ut
h
al
f
of
t
he
e
m
pl
oy
ee
s
un
de
r-
st
an
d
th
ei
r
ro
le
a
nd
r
es
po
ns
ib
il
it
ie
s.
T
he
y
m
os
tl
y
fe
el
a
cc
ou
nt
ab
le
f
or
t
he
ir
as
si
gn
ed
t
as
ks
R
ol
es
&
r
es
po
ns
ib
il
it
ie
s
ar
e
fu
ll
y
un
de
r-
st
oo
d
ac
ro
ss
a
ll
f
un
ct
io
ns
a
nd
i
n
ev
er
y
un
it
,
E
m
pl
oy
ee
s
fe
el
h
ig
hl
y
ac
co
un
ta
bl
e
fo
r
th
ei
r
ta
sk
s
w
hi
ch
t
he
y
in
he
re
nt
ly
c
ar
ry
o
ut
K
ey
R
ol
es
K
ey
r
ol
es
a
re
c
om
pl
et
el
y
m
is
si
ng
w
it
hi
n
th
e
E
R
M
o
rg
an
is
at
io
n.
E
R
M
is
n
ot
r
ep
re
se
nt
ed
a
t
to
p
m
an
ag
em
en
t
le
ve
l
K
ey
r
ol
es
a
cr
os
s
th
e
co
m
pa
ny
a
re
de
fi
ne
d
an
d
in
p
la
ce
, b
ut
m
os
t
of
t
he
E
R
M
f
un
ct
io
ns
a
re
d
on
e
as
s
id
el
in
e
jo
bs
.
E
R
M
i
s
ad
eq
ua
te
ly
r
ep
re
se
nt
ed
o
n
bo
ar
d
le
ve
l
K
ey
r
ol
es
a
cr
os
s
th
e
w
ho
le
o
rg
an
is
at
io
n
ar
e
de
fi
ne
d.
E
R
M
c
on
si
st
s
of
d
ed
ic
at
ed
r
is
k
m
an
ag
er
s
an
d
E
R
M
s
tr
on
gl
y
re
pr
es
en
te
d
at
th
e
bo
ar
d
le
ve
l
(c
on
ti
nu
ed
)
4.5 Organise ERM Properly
196 4 Setting up Enterprise Risk Governance
Ta
b
le
4
.3
(c
on
ti
nu
ed
)
C
om
po
ne
nt
S
tr
on
gl
y
N
eg
at
iv
e
(0
%
)
N
eu
tr
al
(
50
%
)
S
tr
on
gl
y
P
os
it
iv
e
(1
00
%
)
In
ce
nt
iv
e
S
ys
te
m
E
R
M
i
s
co
m
pl
et
el
y
de
co
up
le
d
fr
om
th
e
in
ce
nt
iv
e
sy
st
em
E
R
M
i
s
pa
rt
ia
ll
y
in
te
gr
at
ed
i
n
in
ce
n-
ti
ve
s
ys
te
m
s.
E
R
M
f
un
ct
io
ns
h
av
e
E
R
M
go
al
s
de
fi
ne
d
as
p
ar
t
of
t
he
ir
y
ea
rl
y
pe
rf
or
m
an
ce
r
ev
ie
w
. S
om
e
of
t
he
m
a
re
de
fi
ne
d
on
a
r
eg
ul
ar
b
as
is
, o
th
er
s
on
ly
i
n
sp
ec
ia
l
oc
ca
si
on
s
E
R
M
i
s
a
fu
ll
y
in
te
gr
at
ed
p
ar
t
of
t
he
i
nc
en
–
ti
ve
s
ys
te
m
o
f
al
l
E
R
M
f
un
ct
io
ns
. E
R
M
go
al
s
ar
e
re
cu
rr
in
g
at
e
ve
ry
p
er
fo
rm
an
ce
re
vi
ew
. P
eo
pl
e
do
n
ot
o
nl
y
ge
t
re
w
ar
de
d
fo
r
de
si
re
d
be
ha
vi
ou
r,
b
ut
a
re
a
ls
o
sa
nc
ti
on
ed
fo
r
ba
d
be
ha
vi
ou
r
T
ra
in
in
g
&
L
ea
rn
in
g
T
he
re
a
re
n
o
E
R
M
t
ra
in
in
gs
a
va
il
–
ab
le
. E
m
pl
oy
ee
s
fe
el
a
bs
ol
ut
el
y
in
se
cu
re
a
nd
s
ee
a
s
tr
on
g
ne
ed
o
f
E
R
M
t
ra
in
in
gs
T
he
re
a
re
d
if
fe
re
nt
E
R
M
t
ra
in
in
gs
a
va
il
–
ab
le
t
ha
t
ad
dr
es
s
di
ff
er
en
t
st
ak
eh
ol
de
r’
s
ne
ed
s.
T
ra
in
in
gs
a
re
p
er
ce
iv
ed
h
el
pf
ul
,
ev
en
i
f
th
ey
a
re
n
ot
e
nt
ir
el
y
up
-t
o-
da
te
a
ny
m
or
e.
A
cc
es
si
bi
li
ty
i
s
li
m
it
ed
.
E
m
pl
oy
ee
s
se
e
a
ne
ed
f
or
E
R
M
t
ra
in
in
gs
to
i
nc
re
as
e
th
ei
r
kn
ow
le
dg
e
T
he
re
i
s
a
hi
gh
v
ar
ie
ty
o
f
di
ff
er
en
t
E
R
M
tr
ai
ni
ng
s
th
at
a
dd
re
ss
t
he
n
ee
ds
o
f
al
l
di
f-
fe
re
nt
k
in
ds
o
f
st
ak
eh
ol
de
rs
. T
he
y
ar
e
pe
r-
ce
iv
ed
a
s
ex
tr
em
el
y
he
lp
fu
l.
T
ra
in
in
gs
a
re
co
ns
ta
nt
ly
u
pd
at
ed
i
n
te
rm
s
of
t
ec
hn
ol
og
y
or
c
on
te
nt
. T
ra
in
in
gs
c
an
b
e
ea
si
ly
a
cc
es
se
d
th
ro
ug
ho
ut
t
he
c
om
pa
ny
. E
m
pl
oy
ee
s
co
n-
ti
nu
ou
sl
y
se
ek
f
or
s
el
f-
de
ve
lo
pm
en
t
197
decision-making processes in a timely manner (see similar Diederichs 2013, pp. 183–
184). ERM organisation thus defines the hierarchical structure, reporting standards and
the allocation of responsibilities and roles of ERM to individuals, groups or commit-
tees (Segal 2011, p. 297). Based on these objectives, various questions concerning ERM
organisation need to be clarified. Are the tasks of the ERM to be performed centrally or
decentrally? Which functions and competences are to be assigned to ERM? Should ERM
be integrated or separated in order to fulfil its task as effectively and efficiently as pos-
sible? And at which hierarchical level should the ERM be established? The following
sections address these questions.
4.5.1 Does a Best-Practice ERM Organisation Exist?
Diederichs (2013) has intensively dealt with the question of how ERM can be organ-
ised within the company. In the following, some of his important considerations will be
addressed and set in the context of this textbook. As we learned in this textbook, ERM
should be integrated into decision-making processes. Thus, risks must be assessed at the
time decisions are taken. Managers at different hierarchical levels within the company
can basically better assess risk exposures associated with their area of responsibility than
a centralised ERM in the company could ever do. Taking this into account, it is recom-
mended to consider every decision-maker (usually many people in a company) as a risk
manager. Allocation of risk management tasks where decisions are taken is an argument
for a rather decentralised ERM organisation. Management can usually react faster to new
risks or weaknesses in risk mitigation in a decentralised ERM structure. Nevertheless,
also a fully decentralised ERM organisation has its disadvantages.
For example, decision-makers at lower hierarchical levels usually only recognise
(or are interested in) risk exposures in their area of responsibility which might be very
narrow. Enterprise-wide risks and risk interdependencies within different departments,
business units or divisions can hardly be identified by “local” managers. This inevitably
prevents an enterprise-wide view on risks and rewards and overall ERM coordination is
very limited. In addition, pure decentralised ERM can lead to inefficient overlaps and
serious blind spots. A central ERM function is of course less familiar with the individ-
ual strategies, processes and structures across the company as people close to these risk
areas. This can lead to that risks are not identified at all or too late. However, a central
ERM function is ideal to coordinate the overall ERM process and can support business
by providing the ERM techniques and mitigation options. Thus, an ideal ERM organisa-
tion must consist of a mix between decentralised and centralised structures (Diederichs
2013, pp. 136–137).
Another question arises whether ERM should be integrated into business or sepa-
rated from business as a dedicated line function. Thus, ERM can be organised within
or outside the existing structures. The separation of ERM from the primary organisa-
tional structure reinforces the high relevance of ERM and assures its implementation.
4.5 Organise ERM Properly
198 4 Setting up Enterprise Risk Governance
Moreover, the establishment of a specific ERM function can provide more specialised
ERM know-how. Another major advantage is that ERM can monitor high-risk decisions
independently from business. However, this isolation of ERM is also associated with the
challenge of information asymmetries between business and ERM. If ERM is geared
more towards risk mitigation instead of supporting decision-making, conflicts and addi-
tional costs are to be expected due to the different incentives between ERM (risk mitiga-
tion) and business (value creation) (see similar Wehrhahn 2013, pp. 42–43).
Since we stress the importance of integrating ERM into decision-making and busi-
ness planning, pure separation of ERM from business is not realistic. Thus it seems more
adequate to have ERM tasks performed by existing organisational structures to exploit
synergies between business and risk decisions. Decision-makers usually have more rele-
vant risk information available as a separated ERM function. ERM can support decision-
makers with more rational risk information as ERM is about balancing intuition with
rationality. In order to foster a positive risk culture, it is important to assign risk responsi-
bilities where decisions are taken (see similar Wehrhahn 2013, pp. 42–43).
Again, we can conclude that a balanced mix between ERM separation and integration
of ERM tasks into business is ideal. One question remains: At what hierarchical level
should the specific ERM function (i.e. the risk manager) be established? The answer in
that case is quite clear. As ERM is by definition a strategic management task, it needs
to be established at management level. Otherwise, its impact on strategic decisions and
business planning might be very limited or indeed negligible. However, in practice, very
often the risk manager is not member of the management team. This inevitably prevents
ERM of being effective and value-creating. Additionally, there is need of “local” risk
managers at business unit level or divisional level as strategic goals are executed and
implemented in operational units.
We should clarify at this point that the ERM organisation depends not only on the
ERM process, roles, competencies and responsibilities themselves, but primarily on the
existing organisational structure. It is important to integrate ERM into existing structures
rather than create new ones. Unfortunately, there is no such thing as generally valid ERM
integration model, as effective ERM organisation is dependent on the corresponding
business model and its associated business processes.
4.5.2 ERM Organisation Options
The options of which a company can choose from to organise ERM are primarily deter-
mined by the above fundamental considerations and of course dependent of the size and
complexity of the company, its operations, risk exposures and existing management sys-
tems (Merna and Al-Thani 2005). Figure 4.1 depicts some basic organisation options for
ERM which are briefly explained in the following.
Small companies often have a particularly clear or simple structure and are managed
transparently. In this situation, a simple ERM process integrated into the management
199
structure can be adequate. As small companies are characterised by very flat hierarchies,
ERM responsibility is assigned to management because it already deals with corporate
management. No separate ERM function is available and no additional ERM structures
need to be created. In such companies, ERM may be seen as fully integrated into corpo-
rate management and as such, into decision-making processes. In essence, smaller com-
panies suffer less than larger ones from the problem that ERM is often separated and
isolated from business. In contrast, in larger companies, ERM is organised more com-
plex. These companies usually have also ERM structures that are independent from busi-
ness (Exner-Merkelt et al. 2012). Although ultimate responsibility of ERM resides with
Board and management, it can be delegated to dedicated risk managers.
As already discussed, ERM purely organised as a staff unit is not ideal. Staff units
usually directly report to management. Although this approach is simple and relieves
the pressure from management and enables a higher degree of ERM specialisation and
coordination, this often leads to a very low acceptance of ERM. Usually, communication
is complicated and information asymmetries may arise due to the split of risk manage-
ment and decision-makers. The heavy dependency of the risk manager on management,
the trend towards formalization and bureaucratization of communication by staff units,
as well as the complexity of such staff hierarchies are further weaknesses of this ERM
organisation approach (Hunziker and Meissner 2017, pp. 34–35).
Another option is to establish ERM as a pure line function. ERM directly reports to
a business unit or division. Very often, ERM is often the responsibility of the finance
department because of the wrong assumption that most of the key risks are financial
risks or risks are wrongly categorised as financial risks (see Sect. 3.3.1). ERM as a line
4.5 Organise ERM Properly
Fig. 4.1 ERM organisation options. (Hunziker and Meissner 2017, p. 33)
200 4 Setting up Enterprise Risk Governance
function provide clarity and unambiguity regarding tasks, responsibilities and compe-
tences. ERM understood this way still represents a silo-risk management approach from
which we have been trying to get away for years. Silo risk management is diametrically
opposed to the modern ERM approach which takes strong enterprise-wide view on risks.
Thus, modern ERM cannot be organised purely as a line function approach (Hunziker
and Meissner 2017, p. 35). ERM in Swiss companies is primarily understood as the task
of line management. Companies are increasingly applying risk guidelines that define the
members of senior management as “risk owners” for certain risks. In larger companies
that have implemented large ERM systems similar to those established by financial insti-
tutions, risks are typically reported upwards from the regional or site level (bottom-up
approach) and then consolidated at group level, where they are sometimes filtered and/or
complemented by additional risks (top-down approach) (OECD 2014, p. 78).
The third approach suggests an ERM matrix organisation which relieves the pres-
sure from management, promotes direct communication channels, enables adequate
ERM coordination and makes ERM specialization possible. In line with modern ERM,
it triggers productive conflicts and challenges that make cross-departmental (enterprise-
wide) thinking and teamwork possible. However, ERM as a matrix organisation com-
prises structural risks that may cause organisational failure due to possible regulatory
gaps and the challenges of extensive ERM coordination. Conflicts and contradictions are
part of daily business and the competencies of individual bodies and roles often have to
be revised and are ultimately never coherent. As a result, the matrix organisation is the
most information-intensive and “slowest” ERM structure (Hunziker and Meissner 2017,
pp. 35–36).
Last but not least, ERM can be organised by the means of an ERM committee at man-
agement level that enables an enterprise-wide coordination of all major ERM decisions
and actions. The committee is part of the secondary organisational structure, is estab-
lished across hierarchies and is characterised by the fact that it combines the advantages
of centralised and decentralised organisational aspects (Hunziker and Meissner 2017,
p. 36). An ERM committee consists of people who have different experiences and know-
how and who can provide an enterprise-wide view on risks, such as head of business
units, head of legal and compliance, chief financial officer, risk manager, head of strate-
gic planning.
It is assumed that a central ERM committee can better identify risk interdependen-
cies and enables coordinated decisions on risk mitigation measures. Due to its coordi-
nation abilities and broad support, decisions of an ERM committee are generally better
accepted (Segal 2011, pp. 324–325). Usually, ERM committees support business units
in ERM process steps, prepare decisions by providing alternative risk-reward scenarios
to the management, develop and coordinate risk mitigation measures and monitor ERM
quality. Moreover, ERM committees prepare risk appetite statements. The risk manager
usually chairs the committee meetings. Clearly, ultimate decisions on risk appetite and
risk policy in general reside with the Board. However, ERM committees can make rec-
ommendations on these topics.
201
Many of the larger Swiss companies have set up one or more ERM committees at
management level. These committees can either focus on specific risks such as health,
safety and the environment or discuss a broader range of risks in the same committee.
Some companies have formed interdisciplinary teams to manage risks, and in the largest
companies, some of the ERM committees may have different subcommittees that reflect
the global reach of their activities (OECD 2014, pp. 79–80).
An ERM committee usually consists of subject matter experts from different divisions or business
units. This means that key risk scenarios and their impact resulting from a risk occurring should
be much more well-founded and complete than risk assessments of individual, possibly unre-
lated employees or managers. It can often be observed in practice that employees overestimate
the impacts of a risk on their own area of responsibility, while the consequences for other busi-
ness areas are underestimated or not perceived at all (Montagne et al. 2015, pp. 26–27). An ERM
committee thus provides a more enterprise-wide view on key risks taking into account different
perspectives.
A well composed ERM committee is an ideal organisation form in larger companies to
give ERM its necessary weight and combines the advantages of centralised and decen-
tralised ERM structures. It provides the best possible support for modern ERM require-
ments and enables risks to be assessed company-wide at different hierarchical level. It
serves as an interface between management (decision-makers) and the risk management
function (risk manager, CRO) and enables decentralised implementation of decisions on
risk taking and risk mitigation made in the ERM committee. As an ERM committee con-
sists of members of the primary organisation, it does not additionally burden the organi-
sation with additional functions and structures.
4.5.3 Some Thoughts on Roles and Responsibilities
Roles and responsibility of ERM can differ across companies. One aspect holds true for
all companies: Ultimate responsibility for ERM lies with the board of directors (Hopkin
2017, p. 264). According to Swiss law, for example, ERM is one of the “non-transfer-
able and irrevocable tasks” of the board (CO, Art. 716a): “[…] in the end, the Board
of Directors alone decides and bears the responsibility” in its function as the highest
authority. The board of directors is tasked with appointing an executive board to manage
the business, but reserves the right to make the most important decisions, such as strate-
gic decisions, the formulation of important corporate goals and the allocation of major
resources. These decisions are based, among other things, on the Board’s perception of
integrity and ethical values. With regard to ERM, the board of directors have to make
sure that
• ERM is effectively implemented by management
• it defined risk appetite statements appropriately
4.5 Organise ERM Properly
202 4 Setting up Enterprise Risk Governance
• it reviews the business portfolio with regard to risk and reward taking into considera-
tion the risk appetite statements
• it fully understands the key risks and that these key risks are managed appropriately.
The CEO has ultimate responsibility for ERM implementation within the company. He
or she is responsible for ensuring that all ERM components are in place. The CEO will
usually form an ERM organisation suitable for the company. This includes, for example,
the following functions:
• The ERM committee coordinates enterprise-wide all major ERM decisions and
actions, prepares risk policy documents, supports the Board with risk-reward informa-
tion, suggests a risk policy and risk appetite statements.
• The line management sets risk priorities for its area of responsibility. It gathers and
updates the corresponding key risks together with the risk manager and monitors
individual risks. It prepares and sends risk reports to the risk manager (Hopkin 2017,
p. 264).
• The risk manager plays the coordinator role in a company but does not manage the
risks itself, which is often misunderstood in practice. A risk manager provides a tool
set and supports the operative units in the management of their risks. A risk manager
observes risks and provides the risk owners with proposals of how to deal with them
(Romeike 2018, p. 47; Hunziker and Meissner 2017, pp. 37–39).
• The risk owner is responsible for the risks in his or her area of responsibility. Risk
owners identify, manage and monitor risks in accordance with the risk mitigation
decisions of the ERM committee. Important information provided by the risk owner is
included in risk reporting (Hunziker and Meissner 2017, pp. 37–39).
• The risk manager (CRO) is responsible for the coordination of the overall ERM and
defines the different ERM processes. The risk manager is part of the ERM committee
and provides the necessary risk management techniques. He or she supports risk own-
ers in identifying and assessing risks.
At this point, the roles and responsibilities of a risk manager (CRO) and a risk owner are
examined in more detail, as they are both very crucial for effective ERM. As mentioned,
the risk manager represents a central risk function. While maintaining and coordinating
the ERM process in the company, his or her tasks range from the conception, implemen-
tation to the monitoring and adjustment of all ERM processes. Necessary resources and
competencies are crucial to successfully perform these tasks (see similar Segal 2011,
pp. 319–320). Checks and balances, as promoted by the Sarbanes-Oxley Act, are par-
ticularly important in larger companies. A risk manager reporting directly to the chair-
man of the board or the head of an ERM committee independent of the reporting line
to the CEO should be able to perform his or her duties in a similar manner as internal
audit. The duties of the risk manager focus on implementing and maintaining effective
ERM processes. Risk management (as adopting risk mitigation measures) on the other
203
hand, should be carried out by the line management. If this is not the case, the very
fundamental governance principle of separation of functions would be violated (OECD
2014, p. 80).
Important skills a risk manager needs to fulfil
Apart from strong analytical and conceptual skills, an adequate understanding of business and eco-
nomic context and knowledge in the areas of ERM techniques, a risk manager needs the following,
even more important skills:
• Knowledge about cognitive and motivational biases and how these biases impact specific ERM
process steps. Specifically, this requires profound knowledge on debiasing strategies.
• A risk manager must have leadership experience, in particular he or she must encourage
employees to share and pursue a value-creating ERM approach. The risk manager must also
be capable to sell an ERM programme to management and to the board. This also includes the
coordination of different stakeholders and interest groups across the company.
• As developing key risk scenarios are one of the most important steps in an ERM programme, a
risk manager needs to be “creative” in the sense of creating different optimistic and pessimistic
risk scenarios.
• As a risk manager needs to communicate appropriately to different stakeholders at all hierarchi-
cal levels (e.g. management, business units, board of directors, external parties) solid communi-
cation skills are key for a successful ERM (Segal 2011, pp. 320–321).
• In all, soft skills like being able to bridge the gap between the rather technical ERM language
and business language, communicating equally effective with different professional groups and
to be perceived as a service provider (rather than as an uncomfortable inquirer) are very crucial
and far more important than technical ERM skills.
Key Aspects to Remember
Know the legal and corporate governance requirements regarding ERM
The requirements for risk management vary from country to country. In Germany
and Switzerland, risk management can be regarded as mandatory, especially
because prudent corporate management also has to deal with risks. As the legal
basis remains relatively superficial, additional requirements have been included in
corporate governance codes to guide companies in the design of the ERM.
Know why the establishment of a risk culture is highly relevant
Neither statutory nor internal company regulations can prevent risks from mate-
rializing or excessive risks from being taken. Accordingly, it is important that the
company has a risk culture that is aligned with its mission and strategy. The devel-
opment of such a culture is a long-term project and requires continuous training
and communication. Effective ERM implementations are characterised by a uni-
form risk culture within the company.
4.5 Organise ERM Properly
204 4 Setting up Enterprise Risk Governance
Formulate a risk policy which is based on the principles of modern ERM
The risk policy describes all relevant aspects of the ERM in the company. This
includes the definition of objectives, responsibilities, the scope of the ERM, the
most important opportunities and risks of a company, etc. The very different per-
spectives and experiences of the board members often make it difficult to find a
consensus regarding risk policy. In addition, this consensus should largely reflect
a modern, value-creating ERM approach and not lead to a regulatory risk manage-
ment approach.
Organise ERM practices effectively and efficiently in the organisation
En effective ERM organisation depends not only on the ERM process, roles, com-
petencies and responsibilities themselves, but primarily on the existing organi-
sational structure. It is important to integrate ERM into existing structures rather
than create new ones. Unfortunately, there is no such thing as generally best ERM
organisation, as it is dependent on the corresponding business model and its associ-
ated business processes.
Consider which standard for the ERM implementation in your organisation is
most effective
For the implementation of ERM, the standards of COSO and ISO have estab-
lished themselves in business practice. Which of these standards is to be preferred
for one’s own company must be decided situation-specifically. In principle, ISO
is more suitable in the SME environment, but can also make sense for large com-
panies with few business areas. Both guidelines stress the alignment with strategy
and business objectives and complement each other. They can be used thoughtfully
as starting points for ERM implementation.
Critical Thinking Questions
1. Corporate governance and ERM have several points of contact. Which aspects
should companies pay particular attention to when designing their ERM?
2. What principles must be observed when formulating a risk policy and what neg-
ative consequences can an inadequately thought-out risk policy have?
3. What measures can a company take to gradually create a risk culture that pro-
motes decision-making?
205
4. Which company-specific characteristics should be particularly taken into
account when selecting an adequate ERM organisation?
5. How can the limitations of ERM frameworks be meaningfully overcome and
what conclusions can organisations draw from them?
References
ABB (2015). Risikopolitik. Januar 2015. http://new.abb.com/ch/ueber-uns/nachhaltigkeit/unterneh-
menspolitik/risikopolitik. Accessed 1 September 2015.
Adamson, C. (2013). The importance of culture in driving behaviours of firms and how the FCA
will assess this. Financial Conduct Authority Speech at the CFA Society, April 2013. https://
www.fca.org.uk/news/speeches/importance-culture-driving-behaviours-firms-and-how-fca-will-
assess. Accessed 25 Januar 2019.
AktG—Aktiengesetz vom 6. September 1965 (BGBl. I S. 1089), das zuletzt durch Artikel 9 des
Gesetzes vom 17. Juli 2017 (BGBl. I S. 2446) geändert worden ist.
Andersen, T. J., & Winther Schrøder, P. (2010). Strategic risk management practice. How to deal
effectively with major corporate exposures. Cambridge: Cambridge University Press.
Blanco, C., Hinrichs, J., & Mark, R. (2014). Creating a risk culture framework. Energy Risk, Jul/
Aug, 29–32.
CO—Bundesgesetz betreffend die Ergänzung des Schweizerischen Zivilgesetzbuches (Fünfter
Teil: Obligationenrecht) vom 30. März 1911 (Stand am 1. April 2017).
Committee of Sponsoring Organizations of the Treadway Commission (COSO) (2019). Welcome
to COSO. https://www.coso.org/Pages/default.aspx. Accessed 18 December 2018.
Committee of Sponsoring Organizations of the Treadway Commission (COSO) (2017). Enterprise
Risk Management—Integrating with Strategy and Performance. Jersey City, NJ: AICPA.
Crossan, M. M., Mazutis, D., Seijts, G. H., & Gandz, J. (2013). Developing leadership character in
business programs. Academy of Management Learning & Education, 12 (2), 265–284.
Davidson, O., Mackenzie, P., Wilkinson, M., & Asselin-Miller, R. (2012). The Need to Build a
Strong Risk Culture is Growing Culture. Effective Diagnostics Support a Positive. https://www.
towerswatson.com/en-GB/Insights/Newsletters/Global/emphasis/2012/The-Need-to-Build-a-
Strong-Risk-Culture-Is-Growing. Accessed 18 December 2018.
DCGK (2017). German Corporate Governance Code. https://www.dcgk.de//files/dcgk/usercontent/
en/download/code/170214_Code.pdf. Accessed 28 November 2018.
DeLoach, J. (2015). The Importance of Risk Culture. http://www.corporatecomplianceinsights.
com/the-importance-of-risk-culture/. Accessed 18 December 2018.
Deloitte (2012). Cultivating a Risk Intelligent Culture. Understand, measure, strengthen, and
report. Luxembourg. https://www2.deloitte.com/content/dam/Deloitte/lu/Documents/risk/lu_
en_wp_riskintelligentculture_01082012.pdf. Accessed 18 December 2018.
Diederichs, M. (2013). Risikomanagement und Risikocontrolling (3rd Ed.). München: Vahlen.
Ernst & Young (2015). Risk culture. How can you create a sound risk culture? http://www.ey.com/
Publication/vwLUAssets/Risk_culture_-_How_can_you_create_a_sound_risk_culture/$FILE/
EY-risk-culture-model-brochure.pdf. 5 February 2018.
Exner-Merkelt, K., Denk, R., & Ruthner, R. (2012). Corporate Risk Management: Unternehmensweites
Risikomanagement als Führungsaufgabe. Linde Verlag GmbH.
References
206 4 Setting up Enterprise Risk Governance
Fox, C. (2018). Understanding the New ISO and COSO Updates. http://www.rmmagazine.
com/2018/06/01/understanding-the-new-iso-and-coso-updates/. Accessed 28 November 2018.
Fraser, J. R. S., & Simkins, B. J. (2016). The challenges of and solutions for implementing
enterprise risk management. Business Horizons, 59 (6), 689–698. https://doi.org/10.1016/j.
bushor.2016.06.007
Frick, N., Küttner, T. F., & Schuber, P. (2013). Assessment Methodology for a Maturity Model
for Interorganisational Systems—The Search for an Assessment Procedure. 46th Hawaii
International Conference on System Sciences.
Gleißner, W. (2008). Grundlagen des Risikomanagements im Unternehmen. München: Vahlen.
GmbHG—Gesetz betreffend die Gesellschaften mit beschränkter Haftung in der im
Bundesgesetzblatt Teil III, Gliederungsnummer 4123–1, veröffentlichten bereinigten Fassung,
das zuletzt durch Artikel 10 des Gesetzes vom 17. Juli 2017 (BGBl. I S. 2446) geändert worden
ist.
Guiso, L., Sapienza, P., & Zingales, L. (2015). The value of corporate culture. Journal of Financial
Economics, 117 (1), 60–76. https://doi.org/10.1016/j.jfineco.2014.05.010
Hartmann, W., & Romeike, F. (2015) Business Judgement Rule—Maßstab für die Prüfung von
Pflichtverletzungen. Zeitschrift für das gesamte Kreditwesen, 68 (5), 227–230.
Heidbrink, M., Jenewein, W., & Tannert, W. (2014). Unternehmenskultur als Differenzierungsfaktor.
Wie Unternehmen ihre Mitarbeiter zu Fans machen. Zeitschrift Führung + Organisation, 83 (1),
10–15.
Hopkin, P. (2017). Fundamentals of risk management. Understanding, evaluating and implement-
ing effective risk management (4th Ed.). London: Kogan Page.
Hunziker, S., & Meissner, J. O. (2017). Risikomanagement in 10 Schritten. Wiesbaden: Springer
Gabler.
Hunziker, S., Balmer, P., & Schellenberg C. (2016). Enterprise Risk Management Studie zum
Risikomanagement in Schweizer Unternehmen. Zug: SwissERM und IFZ—Hochschule
Luzern.
Hunziker, S., Fallegger, M., & Balmer, P. (2017). Risikokultur in KMU fördern. MQ Management
und Qualität, 46 (5), 22–23.
Huwyler, H. (2016). Comparing the ISO 31000 and the proposed COSO ERM. https://www.
linkedin.com/pulse/comparing-iso-31000-proposed-coso-erm-hernan-huwyler-mba-cpa.
Accessed 24 January 2019.
IRGC (2018). What is Risk Governance? https://irgc.org/risk-governance/what-is-risk-govern-
ance/. Accessed 17 December 2018.
Institute of Risk Management (IRM) (2018). Risk management standards. https://www.theirm.org/
knowledge-and-resources/risk-management-standards/. Accessed 11 December 2018.
Institute of Risk Management (IRM) (2012). Risk Culture. Resources for Practitioners. https://
www.iia.org.uk/media/329076/irm_risk_culture_-_resources_for_practitioners.pdf. Accessed
12 December 2018.
ISO (2018a). ISO 31000:2018—Risk management Guidelines. ISO, Geneva, Switzerland.
ISO (2018b). Risk management Guidelines. Online Browsing Platform (OBP). https://www.iso.
org/obp/ui#iso:std:iso:31000:ed-2:v1:en. Accessed 24 January 2019.
KonTraG—Gesetz zur Kontrolle und Transparenz im Unternehmensbereich v. 5.2.1998
(Bundestagsdrucksache 13/10038), Bundesgesetzblatt Nr. 24/1998.
Lam, J. (2017). Implementing Enterprise Risk Management. From Methods to Applications. New
Jersey: John Wiley & Sons.
Levy, C., Lamarre, E., & Twining, J. (2010). Taking control of organisational risk culture.
McKinsey Working Papers on Risk.
Merna, T., Al-Thani, F. F. (2005). Corporate Risk Management: An Organisational Perspective.
John Wiley & Sons.
207
Montagne, E., Thomik, M., Derungs, M., & Lang, M. (2015). Intelligente Gruppenentscheidungen
im Risikomanagement. Risiko Manager, 20, 25–30.
Müller, M. (2018). Risk Culture at Roche » Development of a Risk Culture Measurement
Framework. Master Thesis, Lucerne University of Applied Sciences and Arts.
OECD (2014). Risk Management and Corporate Governance. Corporate Governance, OECD
Publishing. http://dx.doi.org/10.1787/9789264208636-en
Pan, Y., Siegel, S., & Wang, T. Y. (2017). Corporate Risk Culture. Journal of Financial and
Quantitative Analysis, 52 (6), 2327–2367. https://doi.org/10.1017/s0022109017000771
Ring, P. J., Bryce, C., McKinney, R., & Webb, R. (2015). Taking notice of risk culture—the regula-
tor’s approach. Journal of Risk Research, 19 (3), 364–387. https://doi.org/10.1080/13669877.2
014.983944
Risk Spotlight (2015). Similarities and differences between COSO ERM & ISO 31000. http://
riskspotlight.com/coso-iso31000. Accessed 28 November 2018.
Romeike, F. (2018). Risikomanagement. Wiesbaden: Springer Gabler.
Romeike, F., & Hager, F. (2013). Erfolgsfaktor Risikomanagement 3.0: Lessons learned,
Methoden, Checklisten und Implementierung (3rd Ed.). Wiesbaden: Springer.
Rüegg-Stürm, J., & Grand, S. (2017). Das St. Galler Management-Modell. Wissenschaftliche
Grundlagen und Praxisbeispiele. Bern: Haupt Verlag.
SCBPCG (2016). Swiss code of best practice for corporate governance. Economiesuisse, Verband
der Schweizer Unternehmen. https://www.economiesuisse.ch/sites/default/files/publications/
economiesuisse_swisscode_e_web.pdf. Accessed 28 November 2018.
Schein, E. H. (2010). Organizational Culture and Leadership. San Francisco: Jossey-Bass.
Segal, S. (2011). Corporate Value of Enterprise Risk Management: The Next Step in Business
Management. New Jersey: John Wiley & Sons, Inc.
Sheedy, E. A., & Griffin, B. (2018). Risk Governance, Structures, Culture, and Behavior: A View
from the Inside. Corporate Governance: An International Review, 26 (1), 4–22.
Smith, M., & Kagan, D. (2012). The Risk Culture Survey (RCS) from PricewaterhouseCoopers
(PWC). https://www.pwc.com/us/en/risk-culture/assets/pwc-rcs-2012-brochure.pdf. Accessed 5
February 2018.
Swiss Federal Finance Administration (2004). Risiko- und Versicherungspolitik. https://www.efv.
admin.ch/efv/de/home/themen/finanzpolitik_grundlagen/risiko_versicherungspolitik.html.
Accessed 24 January 2019.
Taylor, C. (2007). Is Managing Risk Culture a Part of ERM? The RMA Journal, 89 (5), 12–13.
Tomhave, B. (2015). The Strengths & Limitations of Risk Management Standards. https://www.
slideshare.net/tomhave/tog-baltimorejuly2015. Accessed 22 January 2019.
Tranchard, S. (2018). The new ISO 31000 keeps risk management simple. https://www.iso.org/
news/ref2263.html. Accessed 28 November 2018.
Vazquez, R. (2014). Five steps to a risk-savvy culture. Risk Management, 61 (9), 10–11.
von Werder, A. (2015). Führungsorganisation—Grundlagen der Corporate Governance, Spitzen-
und Leitungsorganisation (3rd Ed.) Wiesbaden: Springer Gabler.
Wehrhahn, D.-D. (2013). Risk Management. Hamburg: Bachelor & Master Publishing.
Wendler, R. (2012). The maturity of maturity model research: A systematic mapping study.
Journal Information and Software Technology, 54 (12), 1317–1339.
Wien, A., & Franzke, N. (2014). Unternehmenskultur. Zielorientierte Unternehmensethik als entsc-
heidender Erfolgsfaktor. Wiesbaden: Springer Gabler.
Wimmer, R., Meissner, J. O., & Wolf, P. (2014). Praktische Organisationswissenschaft: Lehrbuch
für Studium und Beruf. Heidelberg: Carl-Auer Systeme.
Winter, P. (2008). Risikomanagementstandards. Positionierung der ONR 4900x:2008 im welt-
weiten Vergleich. Netzwerk Risikomanagement Jahrestagung.
References
209© Springer Fachmedien Wiesbaden GmbH, part of Springer Nature 2019
S. Hunziker, Enterprise Risk Management,
https://doi.org/10.1007/978-3-658-25357-8_5
Learning Objectives
When you have finished studying this chapter, you should be able to:
• identify the drivers of digitization and analyse the impact for ERM
• name key digital technologies and assess their opportunities and risks
• know possible data analytics methodologies and their application in ERM
• create an individual set of requirements for an ERM tool for your organisation
• recognise future skills and competences for risk management professionals
Looking at Trends in ERM 5
Contents
5.1 Emerging Digital Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
5.1.1 Impact of Disruptive Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
5.1.2 Digital Risk Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
5.2 Digitization of ERM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
5.3 Using Multiple Sources of Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
5.4 Increasing Demand for Analytic Skill Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
5.5 Increasingly Sophisticated Software Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
5.6 Networked Economy and Collective ERM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
5.7 Improving ERM Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
210 5 Looking at Trends in ERM
5.1 Emerging Digital Risks
The current business environment is very exciting in many ways. Numerous organisa-
tions are increasingly affected by the opportunities and risks of digitization; responsible
managers are more challenged than ever. An active approach to these challenges posed
by the environment appears to be essential in order not to be confronted with serious
consequences in the future. For neither from an economic, political-social, regulatory nor
technological point of view, a decline in complexity and speed can be expected. The dig-
ital revolution is not stopping at the ERM function either.
Digitization offers great opportunities in various areas of business activity, and this
is now beyond question in many respects. An adequate approach to the associated risks,
however, appears to be crucial, as opportunities are always risky. In order to assume this
responsibility, there must be awareness and knowledge of the risks of digitization. It
is important to consider what impacts new disruptive technologies such as distributed
ledger technology (blockchain) or Artificial Intelligence (AI) can have on one’s own field
of business. Managers must ask themselves whether there is a possibility that other mar-
ket participants could use these technologies in such a way that their own company could
be driven out of the market (Hunziker et al. 2018, pp. 55–58).
5.1.1 Impact of Disruptive Technologies
While risk managers are not expected to know every detail and all technical backgrounds
about disruptive technologies such as AI, Blockchain and the Internet of Things (IoT),
they need to understand the full scope of opportunities and challenges these innovations
present for the companies and markets they serve. Risk professionals are advised to pro-
actively educate themselves about disruptive technologies, including what is already in
use at their organisations, what technologies may be on the horizon, and the respective
risks and rewards of using such technologies.
In the following, some of the most important technologies that could be relevant for
risk managers are introduced. Some opportunities, challenges and risks of these technol-
ogies are briefly described. However, the statements are not exhaustive, but they depict
some very important aspects from a business perspective (adapted from Ernst & Young
2017).
Firstly, robotic process automation (RPA) is the application of software that mimics
human action and connects multiple systems through automation. The existing IT land-
scape is normally not changed. RPA enables organisations to automate existing high-vol-
ume and complex process steps as if business users were doing the work. It collects and
interprets data across systems, triggers reactions and communicates with other systems
in- or outside the organisation (e.g. fully automated client profile updates or straight-
through processing of customer orders) (see Table 5.1).
211
Secondly, internet of things (IoT) is a system of interconnected computer devices,
mechanical and digital machines, objects, animals or persons that are provided with
unique identifiers and are capable of transmitting data over a network without requiring
human-to-human or human-to-computer interaction (e.g. detection of rubbish levels in
containers to optimise the trash collection routes or monitoring of parking spaces avail-
ability in the city) (see Table 5.2).
Thirdly, cloud computing involves storing and delivering applications and data over
the Internet, not on local servers and PCs. There are three different service models, some
of which overlap: Infrastructure, platform and software are three superimposed layers.
Infrastructure as a Service (IaaS): The cloud as a virtual data centre. As a rule, these are
computers, networks and storage that can be used via IaaS. Platform as a Service (PaaS):
The cloud as a development environment. With PaaS, users develop their own software
applications or test them in an environment provided by the cloud provider. Software as a
Service (SaaS): The cloud as a programme starter. The most common form of cloud ser-
vice offers concrete applications at a fixed monthly price per user or license (see Table 5.3).
Fourthly, blockchain is a type of database known as a distributed ledger that works
on a consensus basis. Whenever a user sends a new data block to the blockchain, the
majority of other users must confirm that it is valid. The database does not have a central
administrator. Each user keeps a copy of the distributed ledger on their own computer
and the data is replicated and synchronised in real time across all copies of the ledger
Table 5.4.
Table 5.1 Opportunities and risks of robotic process automation. (adapted from Ernst & Young 2017)
Benefits and opportunities Key challenges and risks
• Non-invasive technology, helps to close
the “gaps” between existing (information)
systems
• Reliability (e.g. no sick days)
• Audit trail (fully maintained logs)
• Productivity (release of personnel resources)
• Accuracy (correct result, decision or calcu-
lation the first time)
• Lack of robotics governance can lead to ineffec-
tive and inefficient process automation
• Access management for robotics is ineffectively
managed
• Automation requirements that are not ade-
quately or accurately identified and documented
• Implementation is not properly designed and
tested
Table 5.2 Opportunities and risks of internet of things. (adapted from Ernst & Young 2017)
Benefits and opportunities Key challenges and risks
• Comfort in everyday life, efficiency and an
overall improved consumer experience
• Real-time execution of transactions
• Supply chain optimization, quality control,
asset management, remote control and predic-
tive maintenance
• Since the sensors begin to communicate with
each other without human intervention, cyber
security should be a major concern
• Partly unclear business benefits and lack of
expertise
• Connectivity issues, including technologies,
authorization, and authentication
5.1 Emerging Digital Risks
212 5 Looking at Trends in ERM
Fifthly, artificial intelligence (AI) is a field of computer science that deals with the
simulation of intelligent behaviour in computers via cognitive abilities that enable a
machine to mimic intelligent human behaviour. They are characterised by the fact that
they interact in a way that seems “natural” to humans and learn from these interactions.
Other terms and technologies used synonymously are smart machines and cognitive
computing.
Even today, so-called “weak” AI applications can perform certain tasks such as
recognizing texts. In the future, “strong” AI applications will even be able to control
autonomous vehicles, make more accurate weather forecasts, diagnose illnesses, con-
duct financial transactions or operate and monitor industrial machines. AI often occurs
in conjunction with other new technologies, such as IoT, data analytics or Blockchain
(RiskNET 2018) (see Table 5.5).
Sixthly, big data refers to a set of technologies and architectures used to extract values
from large amounts of diverse data generated at very high speeds. This value or insight is
then used to drive business decisions that can impact a company’s bottom line. The type
of data used is not simply captured and managed by relational databases and is therefore
not analysed by traditional analytics or business intelligence solutions (see Table 5.6).
Table 5.3 Opportunities and risks of cloud computing. (adapted from Ernst & Young 2017)
Benefits and opportunities Key challenges and risks
• Increasing the effectiveness of IT
initiatives
• Reduce the cost of internal operations
• Avoid high initial investments
• Increase operational flexibility
• Generate a competitive advantage
• Organisations systems and those of the provider can
communicate with each other (security concern)
• Reduced visibility and accountability for security
controls and processes implemented by vendors
• Cloud users rely on their vendors’ business continuity
programmes and disaster recovery capabilities
• Vendors fail to meet performance requirements
Table 5.4 Opportunities and risks of blockchain. (adapted from Ernst & Young 2017)
Benefits and opportunities Key challenges and risks
• Blockchain transactions can reduce transac-
tion times from days to minutes
• Blockchain data is complete, consistent,
timely and accurate
• Changes to public blockchains are publicly
visible to all parties and create transparency,
and all transactions are immutable
• Helps reduce counterparty risk and eliminates
the presence of third parties or intermediaries
• As a young, still developing technology, there
are certain aspects of the technology that may
require further development
• Policy makers and regulators want to ensure
that potential risks are adequately addressed
• Most block chains have not taken advantage
of production-level testing or the pressure of a
live environment
• New IT systems pose new cyber security
risks, particularly a distributed IT architec-
ture that spans multiple business functions or
organisations
213
No technology in the narrower sense but closely related to the above mentioned
technologies are cyber risks. These have gained increased attention recently because
more and more systems are connected, communicate with each other and can be oper-
ated independently of the location. This means that a potential intruder can cause great
impact. Some important cyber risk aspects are explained in the following.
Background Information
On the risk horizon, cyber risks and associated risk assessment and mitigation methods that go far
beyond traditional risk management are becoming increasingly important. Experts from the fields
of information technology and cyber risk point out that organised crime in Darknet is much better
connected than expected to orchestrate agile, sophisticated and complex cyberattacks. In compari-
son, organisations are very inefficient with their defensive measures. Due to hierarchical corporate
structures and the limited cooperation mechanisms within the industry, the costs for highly auto-
mated cyberattacks are low and the criminal profits very high.
In this context, it is particularly important that cyber risks are analysed in a sophisticated man-
ner. For example, many highly complex systems such as geolocation satellites, ground stations,
vehicle electronics, data networks and software components will communicate with each other at
a highly automated traffic control centre for the control of autonomous automobiles. A cyberattack
Table 5.5 Opportunities and risks of artificial intelligence. (adapted from Ernst & Young 2017)
Benefits and opportunities Key challenges and risks
• Reduces human error and increases precision
and accuracy in performing tasks
• Improves risk management by identifying
patterns in large data sets that indicate fraud
or other concerns
• Intelligent machines can be used to perform
certain dangerous tasks
• They can adjust their parameters, such as
speed and time, and are encouraged to act
quickly, regardless of factors that affect people
• Scenarios in which AI systems react unex-
pectedly to human instructions
• Programming and coding errors in the AI soft-
ware (algorithmic/programmatic bias)
• Lack of training and inexperience in dealing
with AI
• Cyberattacks on AI systems or AI algorithms
• Legal risks and liabilities (especially data
governance)
Table 5.6 Opportunities and risks of big data. (adapted from Ernst & Young 2017)
Benefits and opportunities Key challenges and risks
• Big Data enable organisations to build a robust
data set that covers all aspects of the customer
from all angles
• Enables complex analysis and correlation
between different types of data sets to provide
a real-time view of operations, customer satis-
faction, transactions, and behaviour
• Large amounts of data have the ability to
reduce risk, detect fraud and monitor cyber
security in real time
• Analytics data is generated, but not aggre-
gated in a way that is valuable to management
• Business and Internal Audit management has
difficulty identifying trends in data
• Without a hypothesis, correlations are
searched that do not have any causality
• Organisations lack the resources (software,
know-how) to use advanced analytics
5.1 Emerging Digital Risks
214 5 Looking at Trends in ERM
on only one of the system components can have a major impact on the resilience of the overall
system and, consequently, on the lives of users of connected cars. This can be transferred already
today to air traffic management systems or smart grids (Romeike 2018, pp. 221–222).
5.1.2 Digital Risk Framework
The digital risk framework depicted in Fig. 5.1 has been developed by the Lucerne
University of Applied Sciences and Arts in cooperation with SwissERM. It is based on
scientific and practice-oriented literature, in-house research and discussions with experts
and many risk management professionals. The aim of the framework is to provide com-
panies a tool for risk identification in the area of digital transformation. In the following,
the digital risk framework is briefly explained.
Core Elements of the Digital Risk Framework
As we know, a risk may have negative or positive impacts on business objectives and can
influence strategy development and execution. The digital risk framework is based on
the well-accepted premise that digital transformation generally includes upside potentials
(opportunities) when appropriately embedded in the company’s strategies. Thus, accept-
ing this premise, the focus of the digital framework lies on the specific risks associated
with digital transformation. They are explicitly presented in column form according to
different risk categories (see Fig. 5.1). The following two examples illustrate the basic
idea behind the framework:
Changing customer needs
Increasing automa�on
Simplified access to data
Increasing data volume
and sources
Stronger connec�vity
Technological innova�ons
Integra�on of Strategy and Performance
Risk Categories
Financial Opera�onal Compliance Customer
Enterprise Risk Management/Governance
Fig. 5.1 Digital risk framework. (Hunziker et al. 2018, p. 5)
215
• The transfer of applications to the cloud enables organisations to use data that is
always up-to-date, regardless of time or place. In this way, however, the company may
also run the risk of being dependent on an external IT service provider.
• The use of data and knowledge about the customer and the services he or she uses
opens up the potential of cross-selling for companies. Under certain circumstances,
however, there is a risk that the data may fall into the wrong hands (risk source) and
be used to the disadvantage of the customer. This can lead to a loss of reputation and
possibly legal consequences for the company (impact).
In line with the suggestions of COSO (2017), the digital risk framework links the risks
associated with digital transformation to the company’s strategy. Moreover, the founda-
tion of the framework comprises the ERM process and a well-established governance
structure. ERM of course focuses on the identification, assessment and reporting of (dig-
ital) risks. Good governance covers topics such as risk culture, the establishment of a
common understanding of values and organisational aspects.
Drivers of Digitization
Digitization is characterised by technological innovations, changing customer needs,
increasing automation, stronger connectivity, simplified access to data, and increasing
data volumes and sources. These drivers are causing changes in the business environ-
ment. As a result, organisations must adapt to new circumstances, digitally transform
their business model and value chain to compete with existing and new competitors.
As part of this realignment, new technologies can significantly support businesses. This
change process can have a positive impact on a company in terms of new opportunities
(rewards) as well as a negative impact in terms of (downside) risks.
It is a challenge to look at individual drivers of digitization in isolation because they
influence each other. For example, technological innovation creates the prerequisites for
increasing automation, stronger connectivity of people, systems and objects, or increas-
ing data volumes and sources. On the other hand, changing customer needs, for example,
are driving the need for more computing speed and larger memory capacities, i.e. techno-
logical innovation. In addition, stronger connectivity allows the increasing automation of
business processes. The following listing illustrates examples to introduce some impor-
tant drivers which accelerate digital transformation (Hüther 2016, pp. 4–8; OECD 2015).
• Technological innovation. This is the progress that enables the establishment of digi-
tal offers and processes. The internet, broadband networks, mobile applications, IT
services and hardware form the basis of the digital economy and are considered as a
growth and innovation engine. As already mentioned above, technological innovation
in turn has a strong impact on other influencing factors.
• Changing customer needs. The customer need is the basic requirement for a (poten-
tial) relationship between the company and the customer. Accordingly, companies
align their services and products with customer needs by providing corresponding
5.1 Emerging Digital Risks
216 5 Looking at Trends in ERM
services and products. These customer needs are influenced by a variety of factors
such as availability or individualization and the resulting need for innovative offer-
ings. For example, orders are increasingly to be placed and delivered quickly via
online channels, independent of time and place. Wherever possible, offers should
be specifically tailored to personal needs. In addition, there is an increasing need for
transparent information.
• Increasing automation. Automation refers to the use of machines or technologies to
carry out a process increasingly without human intervention (robotics). The learning
ability of the systems (AI) plays an increasingly important role here, as they learn
from the past and carry out processes independently. Examples can be found in the
automatic exchange of data or the control, regulation and monitoring of processes.
• Stronger connectivity. Technological developments simplify the connection and com-
munication between systems. The combination of the resulting links can be called
connectivity. In the production process, for example, infrastructure, plants and
machines can be connected with each other and exchange data in real time. Similarly,
digital networks between manufacturer and customer enable the control and optimiza-
tion of services and products.
• Simplified access to data. The ability to access information has become much easier
via internet and related technologies. Today, a large amount of data is available elec-
tronically in various forms. Databases, statistics, books, journals, newspapers, learn-
ing content, etc. can be accessed online. This also includes more and more company
information that can be collected via various channels.
• Increasing data volume and sources. The simple recording of data (text, photo, film,
etc.) promotes the input of data from different sources and thus the amount of data
available. For example, trips can be recorded via apps/board computers and the cor-
responding states (traffic, road condition, route selection, time expenditure) can be
assessed based on these data. Many other examples can be found in the social media
(Instagram, Twitter, Facebook, LinkedIn, Foursquare, etc.).
Risk Categories
The four risk categories financial risk, operational risk, compliance risk and customer
risk form the supporting pillars of the digital risk framework—and thus the link between
the foundation (ERM process and governance) and the “strategic roof” of the framework.
In this context, however, it is important that the risk categories are not assessed indepen-
dently from strategic objectives and that risk interdependencies are taken into account as
part of the holistic risk assessment. The four risk categories financial, operational, com-
pliance and customer risk are drawn from the COSO ERM framework (2017, p. 85).
• Financial risks include, for example, unexpected changes in financial markets, prices
and tariffs, liquidity supply/demand or currency fluctuations.
• Operational risks are unexpected changes in connection with ongoing operations such
as personnel, technology, processes or catastrophes.
217
• Compliance risks comprise unexpected changes that arise, for example, from legal
sanctions and reputational damage or from the violation of legal requirements.
• Customer risk include unexpected changes in customer needs, e.g. as a result of new
technologies or social trends.
The analysis of digitization drivers and their influence on the digital transformation of
companies and thus the risk landscape is complex and multi-layered, as the following
risk catalogue illustrates.
Risk Catalogue
The risks of digital transformation are defined along the four risk categories introduced
in the digital risk framework. In addition to extant literature, empirical studies and
diverse subject matter experts have been used to derive the following risk list presented
in Table 5.7.
5.1 Emerging Digital Risks
Table 5.7 Risk catalogue of digital transformation risks. (Hunziker et al. 2018, p. 5)
Financial Risk Operational Risk
• Loss of value of (crypto) currencies through
automated trading
• Errors in automated payments
• Data loss/manipulation in the financial sector
• Incorrect creditworthiness analyses of new
business models
• Low liquidity due to high IT investments
• Slow monetization of digital strategies/offers
• Outdated financial indicators for managing
the business model
• Low profitability of the digitised business
model
• Dependence on external (IT) service providers
• Misinvestments in technologies and
applications
• Loss of control due to automated business
transactions
• Failure of the (IT) operational infrastructure
• Authorization and access problems due to new
authentication methods
• Lack of digital competence among employees
• Internal resistance to digital innovation
• Insufficient data management and generally
incomplete information
Compliance Risk Customer Risk
• Theft of intellectual property/sensitive data
• Violation of privacy laws and policies
• Disregard of special cases through automated
processes
• Non-conformity with new regulations and
requirements
• Increased risk of fraud through digital
networking
• Theft/extortion of funds through cybercrime
• Unclear liability claims due to shared
ownership
• Data manipulation by internal and external
causes
• Loss or unintentional disclosure of customer
information
• Low willingness to pay due to high price
transparency
• Competition from innovative organisations
• Reputation loss on social media channels
• Lack of digital interfaces to (potential)
customers
• Loss of customers due to discontinuation of
business segments
• Low customer loyalty due to increasing com-
parability of offers
• Unfulfillability of fast process and order
processing
218 5 Looking at Trends in ERM
It should be noted that this list does not replace every company’s own risk assessment,
but may be used complementary.
5.2 Digitization of ERM
ERM methods and techniques relevant to most companies today were developed before
the turn of the century. In fact, ERM is often not yet ready to deal adequately with risks
in today’s digital world. More importantly, if ERM is implemented a stand-alone process
(regulatory risk management approach), it cannot support companies to face the dynamic
realities of the 21st century (see similar DeLoach 2017). Digital risk management is a
term that encompasses all digital approaches to increase effectiveness and efficiency in
order to take full advantage of the advances in digital, cloud, mobile and visualization
technologies—specifically process automation, decision automation and digitalised mon-
itoring and early warning (Ganguly et al. 2017).
The digital ERM approach leverages workflow automation, optical character recogni-
tion, advanced analysis (including machine learning and AI) and new data sources, as
well as the use of robotics and interfaces. Digital risk management essentially means a
concerted adaptation of processes, data, analysis and IT, as well as the entire corporate
structure including talent and culture (Ganguly et al. 2017). Deeper and more insightful
risk information helps organisations with strategy development, performance manage-
ment and decision-making processes (DeLoach 2017).
Providing a new technology platform is certainly not enough to address the digital
ERM challenges. It requires that such platforms are equipped with configurations and
data so that companies can use it immediately with adequate effort. Basically, three
dimensions of change can be identified: processes, data, and organisation (McKinsey
2017):
• To realise full advantage of process and decision automation, companies must ensure
that systems, processes and behaviours are adapted to their purpose. In many com-
panies, silos still exist, which is why an isolated risk assessment is often carried out.
As a result, current processes have evolved organically, without a clearly defined
final state, so that process flows are not always rational and efficient. Operational
structures must be redesigned before automation and decision support can be acti-
vated. Figure 5.2 shows which sub-processes of ERM are to what extent affected by
digitization.
• Data, analytics and IT architecture are the most important prerequisites for digi-
tal ERM. Highly fragmented IT and data architectures cannot provide an efficient
or effective framework for digital risk management. Therefore, a clear institutional
commitment is needed to define a data vision, update risk data, establish robust data
management, improve data quality and metadata, and build the right data architecture.
219
Fortunately, today’s processes and analytical techniques can support these goals with
advanced technology in several key areas, including large data platforms, the cloud,
machine learning, AI, and natural language processing.
• The business and operating model require new capabilities to drive rapid digitiza-
tion. Although risk innovation takes place in a very specific, highly sensitive area, risk
practitioners need to create a solid culture of innovation. This means deploying the
right talent and fostering an innovative “test and learn” mentality. Governance pro-
cesses must enable rapid responses to a rapidly changing technological and regulatory
environment. The risk-adequate management of this innovation culture represents a
central challenge for the digitised ERM function.
AI in the Risk Management Process
While the AI is still under development, it can already be used to reduce risk in some key areas.
For example, machine learning can support more informed predictions about the probability of a
person or company defaulting on a loan or payment, and it can be used to build variable income
forecasting models.
For many years, machine learning has successfully detected credit card fraud. Banks use sys-
tems trained on historical payment data to monitor payments for possible fraudulent activity and
block suspicious transactions. Financial institutions also use automated systems to monitor their
merchants by linking trade information with other behavioural information such as email traffic,
calendar entries, office check-in and check-out times, and even phone calls.
AI-based analysis platforms can manage supplier risk by integrating a wide variety of informa-
tion about suppliers, from their geographic and geopolitical environment to their financial risks,
sustainability and corporate social responsibility scores. Finally, AI systems can be trained to
detect, monitor, and defend against cyberattacks. They identify software with certain distinguish-
ing features—for example, the tendency to consume a lot of computing power or to transfer a lot
of data—and then close the attack (Boillet 2018).
Most companies are planning to digitise their ERM relatively slowly and follow modular
approaches for specific areas. A few have already undergone major change and made sig-
nificant and sustained progress in terms of efficiency and effectiveness. A clear strategy
needs to be developed that does not neglect corporate structures and corporate culture.
Hardly affected / moderately affected / lightly affected
ERM Identification
and
classification
of risks
Analysis and
evaluation of
risks
Aggregation
of individual
risks to overall
risk exposures
Derivation of
risk mitigation
measures
Preparation of
a risk reports
Fig. 5.2 Impact of digitization on ERM process steps. (Kirchberg and Müller 2016, p. 91)
5.2 Digitization of ERM
220 5 Looking at Trends in ERM
5.3 Using Multiple Sources of Data
For organisations and their risk managers, the modern definitions of the digital and inter-
connected world are big data, data analysis, predictive analytics and prescriptive analyt-
ics (Romeike 2017, p. 60). Companies such as Google and Amazon, which have large
amounts of data at their disposal, measure the world, create personality profiles and
search huge amounts of data for patterns and contexts at lightning speed to enable real-
time predictions. The new methods of data analysis promise more targeted analyses and
evaluations. Companies are also hoping for accurate forecasts of future developments,
e.g. to minimise risks and better assess the opportunities for future action.
More and more people are using the internet and they are constantly producing data
via their mobile phones, fitness bands, intelligent watches, networked navigation devices
and cars. Companies with extensive data analysis allegedly know many secret desires
better than people do. Data and algorithms can be used to anticipate potential events
before they are even planned (e.g. next purchase). Behind all technologies are analytical
methods from the world of quantitative ERM. For organisations and authorities, answers
to questions about “where and why” are becoming increasingly important (Romeike
2018, p. 4).
An interconnected world with more data can lead to growth potential, but also entails
more systemic risks. Because systems are interdependent, any event in this chain can
spread rapidly. Automatisms and synergies reinforce the effects. Big data is a term that
describes a large collection of different information sources, most of which are unstruc-
tured and sometimes generated as a by-product of other activities. The relevance to the
use of big data is increasing not only in business but also in risk management, which
benefits from the advantages of such analyses. For example, the data associated with
card payment history, or the news and rumours in the press or even in social media, can
all be used to gain knowledge about ERM. More useable data enables ERM profession-
als to better understand risk, continuously monitor and more effectively reduce busi-
ness risks. For internal risks (e.g. bad debt losses or contractual penalties due to delivery
delays), key figures (e.g. payment delays or safety stock fluctuations) are suitable, which
can be aggregated with appropriate applications, continuously updated and displayed on
risk dashboards. Deviations from defined target values trigger automated notifications
and indicate acute need for action (see similar Brooke 2018).
In the following, selected application possibilities of big data in risk and compliance
management are shown.
• Fraud detection: big data is used to feed machine learning algorithms that special-
ise in pattern detection. In case of possible fraud, this will be useful as changing the
business as usual could signal malicious activity. The data included in the analysis
can be changed at will, such as the geolocation, the type of device used to connect
to the account, or the amount transferred. The identity of the parts involved in the
221
transactions is also a possible warning sign. The main advantage is that this type of
fraud detection can trigger a warning through real-time processing and stop the opera-
tion until further authorization, thus minimizing the risks (Brooke 2018).
• Enhanced scenario analysis: before the emergence of big or smart data, scenario anal-
ysis and simulations were difficult to create and had inaccurate results. The ability to
use large amounts of information increases the accuracy of the analyses and speeds
up the decision-making process. The challenge at the moment is to find the perfect
balance between the number and volume of simulations and speed limits. A well-
known aid for this task is the already in this textbook introduced Monte Carlo simula-
tion, which is supported by parallel computing over distributed systems. The result
indicates the value-at-risk for a portfolio or the expected value, e.g. of sales, within a
given time period (Brooke 2018).
• Develop new business models: the risk of new business models has so far been cal-
culated both through audits and due diligence or through the evaluation of financial
ratios. But these proxies do not tell the whole story, especially for new entrants. Thus,
hardly any start-up company with an idea worth millions of dollars would qualify for
financing. Here, too, Big or Smart Data is faced with the task of redefining risk meas-
ures and creating new valuation approaches. Some organisations today use more than
thousand data points per application to measure creditworthiness, and they take much
more than just credit history or income into account (Brooke 2018).
• Use the blockchain to validate applicants in advance: ERM is not carried out accord-
ing to decades-old standards, but can be adapted to the situation. The introduction of
blockchain technology, based on big data, can provide a way to track a person’s his-
tory to their point of entry into the network. This new way of capturing business can
eliminate the need for current risk mitigation measures. A risk score could be auto-
matically calculated for each event and assigned to each account. This could mean
that an applicant for a loan or smart contract would not even have to reveal his iden-
tity, but could be pre-validated by the network (Brooke 2018).
The risks associated with these applications known so far are only a handful of the dan-
gers that will arise as technology advances. Big data’s analysis should be able to identify
cyberattacks in a similar way as it detects fraud, and have real-time mechanisms in place
to prevent it. Since machine learning is usually a black box, correcting a biased model or
its assumptions is more difficult than correcting a deterministic model, so proper testing
and calibration should be an integral part of the model definition.
The maturity of data and technology in ERM provides an indication of how
advanced the company is in this area. The following three maturity levels in
Table 5.8 illustrate this (Deloitte 2016).
5.3 Using Multiple Sources of Data
222 5 Looking at Trends in ERM
It can be summarised that data generation is unprecedented—over 90 percent of the data
currently available has been generated in the last five years. As the ability to manage
and access this data has become better and cheaper, companies are exploring the use of
multiple and novel data sources to gain greater insight (Oliver Wyman 2018, p. 6). ERM
professionals are also faced with the task of recording these developments and translat-
ing them into concrete applications. Otherwise, there is a danger that other functions in
the company will procure the data themselves or that risk analyses will not correspond to
the facts.
5.4 Increasing Demand for Analytic Skill Sets
Data flood, complex regulatory structures, new technologies, new risks and the ever-
increasing pressure for greater efficiency and lower costs pose a challenge to ERM pro-
fessionals. Innovative technologies such as AI, RPA, big data and analytics, machine
learning and blockchain are increasingly becoming part of the solution to both reduce
costs and manage much larger and more diverse amounts of data. Using these technolo-
gies can reduce costs, but it also provides companies with more accuracy and control,
more agility, and improved risk analysis and insight into these investments (Culp 2017).
The lack of the skills needed to adopt new technologies, which has always been an
issue in ERM, remains a challenge, but with a different twist. There are experienced
people with ERM skills and people with technical understanding in areas ranging from
data science to AI. However, it is extremely difficult to find and/or develop people who
combine these skills into one package. Companies are trying to strike the right balance
between risk experience and disciplines on the one hand and a deep understanding of
current digital, data and technology tools on the other (Culp 2017).
This makes it clear that risk managers must also develop their methodological skills.
The focus should be on issues involving techniques and methods for identifying, extract-
ing and processing data for processing with analytical software and data visualization.
An ERM professional should have the necessary skills to effectively organise and com-
bine different data sources for analytical applications to address real business risks and
challenges.
Table 5.8 Maturity of data and technology in ERM
Basic Mature Advanced
Data is nonstandard
with varying levels of
quality, and key risk tools
exist in silos across the
organisation
Automated technology solutions
are used to store and analyse
risk data. Risk data stand-
ards and data quality policy
established
Automated and integrated technol-
ogy is used to store, manage, and
report real-time risk data. Risk
flags are programmed, and data
integrity checks are embedded in
business processes
223
Among others, basic knowledge of data analytics must be acquired. The following list
shows the four maturity levels in data analysis (Romeike 2017, pp. 60–61).
• Descriptive analytics deals with the question “what happened?”, i.e. an analy-
sis of data from the past to understand potential effects on the present (see business
intelligence).
• Diagnostic analytics deals with the question “why did something happen?”, i.e. an
analysis of cause-effect relationships, interactions or consequences of events (see
business analytics).
Using techniques such as drill-down, data discovery, data mining and correlations.
• Predictive analytics deals with the question “what will happen?”, i.e. an analysis of
potential future scenarios and the generation of early warning information. Based on
data mining technologies, statistical methods and operational research, the probabili-
ties of future events are calculated.
Using techniques such as regression analysis, forecasting, multivariate statistics,
pattern matching, predictive modelling, and forecasting.
• Prescriptive analytics deals with the question “How do we have to act in order for a
future event (not) to occur?”, i.e. measures are simulated based on the results of pre-
dictive analytics, such as stochastic scenario analyses and sensitivity analyses. Using
techniques such as graph analysis, simulation complex event processing, neural net-
works, heuristics, and machine learning.
The higher the maturity level of the data analysis, the more value is basically created
for companies. Accordingly, the lower levels are more focused on information, while the
higher levels are focused on optimization. The following example illustrates a company
at a high maturity level of data analysis.
Swisscom: Comprehensive customer reporting
For organisations, customers are sometimes a black box whose characteristics and
needs are largely unknown. In many organisations, different departments are busy
collecting data and manually creating reports to learn more about their customers. At
Swisscom, those responsible try to replace complex reports, which can only be car-
ried out selectively, with an automatic real-time analysis. Predictive analytics is used
to learn more about general customer behaviour. Instead of just accumulating individ-
ual properties, an overall picture should be created. The more information about cus-
tomer needs is available, the better the specialist department can respond to customers
and act accordingly. Swisscom always handles this data with care, as data protection
always remains the top priority when dealing with customer data.
Swisscom uses predictive analytics at various levels: Carrier billing enables cus-
tomers to pay for apps, digital services or products by mobile phone bill. In order to
be able to make forecasts, it is necessary to find previously hidden relationships in
the data records: Which customers use which services? Are 25-year-old Android users
5.4 Increasing Demand for Analytic Skill Sets
224 5 Looking at Trends in ERM
more reliable payers than 40-year-old iPhone users? Is there a correlation between
the type of mobile phone subscription and the type of products purchased? The cal-
culation model tries to give answers to many such questions. Depending on the result,
more suitable products can be offered, discounts can be given on preferred services or
customers can be imposed a spending limit.
In order to provide answers to all questions, the data analysts used several dozen
variables and searched for correlations between all these variables. These variables
contain a variety of information, such as demographics, user behaviour, or previ-
ous transactions. Any employee can easily relate two variables to each other using
an Excel spreadsheet. But it becomes more difficult with dozens or even hundreds of
variables. This is precisely where the potential of automated models lies, which can
uncover hidden relationships and undreamt-of correlations.
In order to understand the processes and find the complex correlations of all influenc-
ing factors, the data experts first searched explanatively together with experts from the
business for possible variables with which the calculations could be carried out. They
also had to find out which data sources were suitable and how the data could be used.
Accounts receivable defaults are also analysed. They are among the big unknowns
at many organisations. Payments for products that have already been delivered are
not paid for, as all mail-order organisations that offer payment by invoice find out.
In order to keep the losses as low as possible, individual customers can be provided
with an individual expenditure limit. But which customers should be subject to such
a limit? Who pays late? Who doesn’t? After all, no loyal customers should be fright-
ened away simply because of a single omission. For example, there are customers
who regularly do not pay their bills until a few days after the payment deadline has
expired. Although these customers do not adhere exactly to the rules, they are still
reliable and do not have to be disgruntled with unnecessary reminders. This not only
saves administrative effort and thus costs, but also improves the customer relationship
in the long term. With the predictive analytics method, such cases can not only be
evaluated more precisely, but also much faster and with less effort (Swisscom 2017).
Parallel to data tsunami, there are increasing demands to understand and correctly inter-
pret the underlying logics, laws and cause-effect relationships. Bits and bytes must be
accompanied by the ability not only to evaluate but also to interpret the resulting data.
And this is exactly where many experts fail in practice. The fact that a pattern exists
presupposes that it was created in the past. This in turn does not necessarily mean that a
conclusion based on this pattern is valid for the future.
ERM professionals and also big data analysts often fall into the trap if they do not
have the difference between correlations and causalities on the radar and consequently
misinterpret information and draw the wrong conclusions. A mathematically calculated
correlation between two variables—which can only measure linear dependencies—does
not mean that the two variables are causally related. This is also referred to as “spurious
relationship” (Romeike 2017, p. 61).
225
5.5 Increasingly Sophisticated Software Tools
In the long term, only those companies will be successful that manage their risks effi-
ciently and weigh up earnings and risks when making decisions. ERM software can
support strategic corporate management in this if it meets the necessary requirements
(Gleißner and Romeike 2005, p. 155). In principle, the software must provide applica-
tions for the entire ERM process. This includes, for example, the identification of risks
for the company for which information must be collected and stored. An ERM solution
should act as a central data repository. Furthermore, a risk taxonomy (e.g. definitions,
classifications, categories and data links or relationships) can be developed and embed-
ded in the solution to enable uniform risk assessments and analyses throughout the com-
pany. Finally, effective ERM requires a comprehensive view of different risk types and
their impact on each other and in their entirety (RIMS 2009, p. 3).
By using adequate ERM software, several weaknesses that occur during the imple-
mentation of ERM in practice can be avoided. These include, for example (adapted from
Gleißner and Romeike 2005, p. 155):
• a missing or incomplete risk database
• no risk-relevant information for the different hierarchy levels
• redundant and inconsistent data acquisition
• lack of an overview of aggregated risk exposures related to business objectives
• unclear information and communication processes
• delayed or unfounded decision-making
As ERM is an important information function within the company, a great deal of rele-
vant data is already available in various specialist areas. This means that re-entering data
into systems would be inefficient if the data were already available in related systems.
Therefore, ERM solutions should be used for integrated data storage so that information
can be moved or pulled across the company (RIMS 2009, p. 3).
ERM software available on the market today differs widely in the scope of the func-
tionality it offers, as well as in its analytical capabilities and reporting capabilities. In
addition to comparatively simple Excel add-ons, there are complex simulation tools that
can be purchased as extensions to the ERP system. Methodologically mature solutions
offer methods such as what-if analyses, simulations, risk aggregation, forecasting proce-
dures, mapping cause-effect relationships, data mining tools or advanced analytics, e.g.
in the form of neural networks. Some products have integrated management cockpits
with drill-down functions that are specifically tailored to the needs of decision-makers
(Gleißner and Romeike 2005, p. 159).
The selection of the ERM solution must always be based on the needs of the com-
pany. In order to support modern ERM, the requirements listed in the following box
should also be considered from a business, methodological and technical point of view
(adapted from Gleißner and Romeike 2005, p. 161).
5.5 Increasingly Sophisticated Software Tools
226 5 Looking at Trends in ERM
Business and Methodological Requirements for ERM software solutions
• Availability of checklists to complement key risks list
• Preparation of a “risk database” to store all risks, not only key risks.
• Prioritization of risks using clever filters (e.g. according to impact)
• Assignment of a risk owner responsible for assessing and monitoring risks
• Assignment of the most important policies—especially for risk reporting and
risk monitoring
• Recording of all significant risk mitigation measures (e.g. also all insurance
policies)
• Assignment of risk management measures to each risk, describing the possibili-
ties for reducing or transferring that risk.
• Possibility to link ERM with business planning or controlling
• Allowing quantitative risk scenario development
• Allowing to correct for correlations of risks (correlation adjustment factors)
• Simulation of several risks affecting business objectives simultaneously (MC
simulation).
• Linking risk exposures to performance measures (e.g. company value, cash
flow, EBIT)
• Assignment of early warning indicators to each risk, which indicate a critical
development at an early stage.
• If relevant: calculation of equity requirements, necessary liquidity reserves and
a risk-adjusted cost of capital rates.
• Offer linking the tool to a variety of other data sources
• Offer integration with strategic planning
• Possibilities for the analysis of large data sets for the identification of risks and
anomalies
• Extension or integrated functionalities for advanced analytics, data visualiza-
tions and trend analysis
• Functionalities to support (risk-oriented) corporate planning and company
valuation
• Possibilities for creating risk dashboards, linked to business objectives.
• Possibility to present risk and opportunities related to business objectives in a
meaningful way (no risk maps, rather tornado diagrams, bar charts and risk dis-
tribution charts)
Buying software is not as easy as buying a bar of chocolate. It requires that companies
have a thorough understanding of the features and benefits of the software. In short,
companies need to know if the functionality offered meets the needs of their business.
Participants in an RIMS survey were asked to list the specific capabilities or charac-
teristics of ERM technology that would help improve the maturity of ERM programmes.
227
Responses varied, but the most commonly cited skills were dashboards, analytical tools,
and automated risk monitoring. Other notable responses included risk maps (unfortu-
nately!), risk registers, and survey and tuning tools. These actions reinforce the need for
immediate and accurate information for risk practitioners. These results show that the
technology solutions that would be most widely used if available: Risk prioritization tools,
analysis software, predictive models and simulation. So, based on the survey data, the
ideal ERM technology solution would include the following features (RIMS 2011, p. 9):
• Web-enabled “single source of truth”
• View of risks at multiple levels
• Automated risk input
• Auto reporting and calculations across the collected data
• Ability to set and calculate risk tolerance levels or triggers
• Project management capabilities
• Import/export capabilities in order to expedite the sharing of risk information and
actions
• End-to-end tracking of risks as they are identified through their eventual resolution
• Common and consistent approach, traceability of account-ability, ownership and
actions
Potential buyers and users of ERM technology should develop a clear understanding of
what they are trying to achieve before they start looking at the available technologies.
They should understand their current and intended ERM maturity levels (see Sect. 3.6.2)
before looking for tools to support their business objectives. There seems to be consider-
able scope for the use of multiple technology tools in the ERM process, and it is unlikely
that a single set of tools will meet all requirements. The decision to purchase a technol-
ogy tool should include a cost-benefit analysis of the tool. Direct and indirect costs for
the tool can be very far-reaching, but without a clear return on investment (ROI) it can be
unwise to continue with the purchase of tools (RIMS 2011, p. 9).
5.6 Networked Economy and Collective ERM
Today more than ever, companies and people are connected with each other and operat-
ing as networked ecosystems. The modern enterprise produces and captures more data
and business results, with people communicating more of this information more fre-
quently through a variety of new communication platforms. Put simply, we all produce
and share more knowledge at the workplace than at any other time. It is this culture of
constant communication that risk managers should use to develop ERM solutions and
strategies. A greater proportion of people in the workplace are now able to share experi-
ences and results that can contribute to the development of ERM controls, contingency
plans and mitigation plans (see similar Cammsrisk 2017).
5.6 Networked Economy and Collective ERM
228 5 Looking at Trends in ERM
As a result, they also share more risks. Increasingly, they are managing risk in a man-
ner that reflects this new reality—transforming their risk processes through more open,
collaborative approaches that rise to the challenges of a networked economy and work-
ing to identify, manage, and reduce risk together. But this new reality will also bring new
challenges. Thus, companies should be prepared to take advantage of an increasingly
networked business environment to identify, manage and report risks (Cammsrisk 2017).
Table 5.9 illustrates some basic challenges and opportunities associated with collective
ERM.
Companies might also form alliances with risk experts, researchers and scientists
to keep abreast of the latest threats and mitigation approaches, and consider forming
industry-wide partnerships and consortia (Deloitte 2016).
5.7 Improving ERM Skills
ERM, as we still know it today, will change in the future. The composition of the risk
function will be less characterised by quantification techniques than by innovative and
strategically thinking business partners. Because many risk reports (as learned pre-
viously), which are mainly based on historical data and usually arrive too late at the
desk of decision-makers, will (hopefully) disappear more and more. There will be an
increased relevance and impact of non-financial risks, whilst risk profiles will change.
Accordingly, ERM skills will enlarge. Future risk companies must be visionary and
able to create added value (i.e. a positive ROI). This can only be achieved by building
an effective risk culture across the organisation and by establishing a new mindset. The
future CRO will probably still report directly to the board (Simon 2016), but he or she
will also need skills that we have not attached too much importance to so far. The com-
position of ERM jobs and required skills will definitely shift.
One of the key challenges for risk managers is to be engaged as a trustworthy busi-
ness partner. For the transition towards the new digital and agile world, ERM should
reinvent itself by deepening existing skills whilst acquiring new skills for a highly
Table 5.9 Opportunities and challenges of collective ERM. (Deloitte 2016)
What are the opportunities? What are potential challenges?
• Use collaborative practices such as gami-
fied crowdsourcing to reduce ERM costs and
improve its effectiveness
• Form alliances with risk experts, research-
ers and scientists to keep abreast of the latest
threats and mitigation approaches
• Take an ecosystem-based approach to ERM
by forming industry-wide partnerships and
consortia
• Possible follow-up costs, regulatory meas-
ures and damage to reputation if sensitive
information is passed on via partners or data
exchange portals
• The results can be manipulated if bad actors
deliberately enter inaccurate data to distort the
models
229
digitised, innovative and agile company (McKinsey 2017). Some of these skills can be
learned, others are intrinsic. Companies have different options to build or acquire the
skills they need for the future, e.g. learning, recruitment, reallocation or partnerships
(Dowdalls 2018).
Learning/Recruitment: More focus on non-financial risks and a holistic ERM approach is
required
The training of ERM professionals often focuses on financial risks. Accordingly, many certifica-
tions are offered in this area (e.g. financial risk manager, quantitative modelling, etc.). However,
the previous explanations have shown that non-financial risks from the strategic and operational
areas have a high relevance. Accordingly, there is often a know-how and experience gap in dealing
with these risks (Segal 2011, p. 31).
In general it can be observed that in most courses in the field of financial management, corpo-
rate finance, and valuation etc. either no or only financial risk management is taught. This is illus-
trated by the analysis of the accompanying textbooks, which describe a strongly quantitative risk
management approach. Similarly, in the courses of strategic management and analysis, only the
analysis instruments such as Porter’s 5-Forces, SWOT or PESTEL are frequently taught. A holistic
ERM approach in the sense of opportunity and risk management is thus often neglected.
If ERM is part of the curriculum, a basis is laid, but integration into other relevant subjects is
often neglected. ERM is characterised by the fact that it is an interdisciplinary subject and the rel-
evant links to accounting, strategic management, financial management etc. must be pointed out.
Aspects of psychology (cognitive and motivational biases) and change management should also be
linked to ERM.
The future role of the ERM professional can be determined by dividing the role into a
number of dimensions. The focus will continue to be on fundamental ERM activi-
ties such as governance, risk analysis and risk reporting. Important developments can
be identified around this. Each of these developments, in turn, requires a shift in the
required skills of the ERM professional (see Table 5.10).
The role of the future ERM professional must be translated into the necessary skills
(Dowdalls 2018). Surprisingly, many of these skills can be observed in people playing
online games. Gamers are used to large, complex, social systems that are constantly
changing. Games must therefore be able to attract and win the attention of their players
because they are always new. It is very similar to the change we are seeing in many com-
panies today. The pace and intensity of change in all companies are constantly increasing
and so is the risk exposure (Simon 2016).
Many of the character traits needed for success in the future of risk management are
in the gamers and these traits will help them to thrive as ERM professionals. Research
done by Thomas and Brown (2011) highlights these five key character traits of gamers.
1. Focus on the bottom line: In the games that these online players are playing, each
player is constantly being measured and assessed. Each player is ranked and com-
pared to other players using systems of rankings, points, and titles (Simon 2016). This
trend makes it clear that risk management will have to concentrate more on strategic
5.7 Improving ERM Skills
230 5 Looking at Trends in ERM
opportunities and risks. After all, these opportunities and risks ultimately determine
the success or failure of a company (IRM 2017, p. 5).
2. Diversity is good. Gamers realise that they cannot do everything themselves. To be
successful in a game, players often have to form strong teams. The teams that are
most successful are those that consist of a strong mix of skills and talents (Simon
2016). This principle can be illustrated, for example, by risk identification. As a rule,
Table 5.10 Role of the risk manager of the future and the associated business value. (Dowdalls
2018)
Dimension Role of risk managers of the future
(examples)
Business value (examples)
ERM foundation The risk managers of the future have a
good understanding of business and a high
organisational sensitivity. They proactively
question the company, ensure that it operates
within its risk tolerance and are the gate-
keepers of the principles and standards of
risk management
An effective balance between
value creation and value
objectives, while protecting
reputation and maintaining the
organisation’s risk appetite by
avoiding unnecessary risks and
surprises
Strategic direc-
tion of the
company
The risk managers of the future anticipate
the effects of the strategic orientation, trans-
late them into improvements in guidelines,
procedures and techniques and anchor
them in daily practice. They are driven by
curiosity to understand the most important
developments in the business world
Enable the company to
develop and manage its
systems, products and regula-
tory functions effectively and
efficiently within risk appetite,
while avoiding unnecessary
cost growth as the company
grows further
New ways of
working
The risk managers of the future will work
seamlessly with the company and feel
comfortable in the rapidly changing business
environment. They advise the company on
the design and implementation of effective
control environments using the principles of
control-by-design and compliance-by-design
Increasing the pace of sustain-
able innovation through timely
and effective identification and
mitigation of potential risks
and issues that allow faster
decision making
Digitization and
automation
The risk managers of the future are familiar
with systems, data and disruptive technolo-
gies and keep abreast of trends in informa-
tion technology and data sciences to ensure
that they can challenge and advise the
company on pitfalls, risks and problems
Leverage data exploration and
modelling insights that enable
management to make better
and faster decisions based on
reliable data
Increasing regula-
tory pressure and
need for trust
The risk managers of the future are strong
representatives of the 2nd line of defence
who work closely with business, law and
compliance to understand the impact of legal
and regulatory requirements on business and
protect the bank from unacceptable risks
Compliance with regulatory
and industry standards for risk
management, reducing the
likelihood of fines and regula-
tory intervention
231
people with different experiences and skills will identify the opportunities and risks of
a company more comprehensively. The same applies to further steps. A balanced risk
assessment, for example, can only be achieved by discussing different views.
3. Change is good. Gamers thrive on constant change. The worlds in which they play is
changing unexpectedly and nothing is constant. Even their own actions transform the
world in which they play. Gamers are used to these massive changes and even demand
them (Simon 2016). Organisations, too, are facing ever faster change. Accordingly,
risk managers have to familiarise themselves with new circumstances. They have to
get used to the fact that assumptions and decisions are constantly questioned and a
high degree of flexibility is required (IRM 2017, p. 4).
4. Learning is seen as fun in games. The games in which the players participate con-
sist of complex challenges that have to be mastered as quickly as possible. These
challenges make the game so enjoyable. The discovery of the tools needed and the
creation of the knowledge required to overcome challenges is what makes problem
solving an entertaining activity (Simon 2016). Risk managers have to adjust to the
fact that routine tasks are becoming less and less. Rather, the future will be about
meeting challenges with creative approaches. For example, new approaches to risk
sharing may become more important in the context of ERM.
5. Innovation is a lifestyle. Gamers are ready to develop new ideas and solutions to
take a step forward. Even if the solution to a problem is known, gamers are willing
to look for new solutions that solve the problem faster or with even fewer resources
(Simon 2016). Innovative ideas will also be in high demand in risk management. New
business models will create opportunities and risks that were previously unknown
(McKinsey 2017). It is also becoming increasingly important to use resources in risk
management as efficiently as possible. By taking a proactive role in promoting busi-
ness change and opportunity, risk managers will benefit the company and improve
their profile within the company (IRM 2017, p. 5).
In addition to this list, which is based on the abilities of gamers, there are many other
categorizations (see e.g. Segal 2011). In this context, it is important that companies
define the future function of their ERM department. Based on this, it can be determined
which skills are required.
Key Aspects to Remember
Identify the drivers of digitization and analyse the impact for ERM
Drivers such as technological innovations, changing customer needs, increasing
automation, stronger networking, simplified access to data, and increasing data
volumes and sources characterise digitization. These factors in turn cause changes
5.7 Improving ERM Skills
232 5 Looking at Trends in ERM
in the business environment to which companies must adapt. They may need to
digitally change their business model and value chain to compete with existing and
new competitors.
Name key digital technologies and assess their opportunities and risks
Risk managers do not need to know every detail and every technical aspect of a
new technology. However, they need to understand the full range of opportunities
and challenges these innovations present to businesses and markets. The opportu-
nities and risks of the following technologies are in focus: Robotic process auto-
mation, internet of things, cloud computing, blockchain, artificial intelligence and
big data.
Know possible data analytics methodologies and their application in ERM
A risk management professional should have the skills necessary to effectively
organise and combine multiple data sources for analytical applications to address
real business risks and challenges. Among other things, knowledge in data analysis
must be acquired. This includes basic knowledge of descriptive analytics, diagnos-
tic analytics, predictive analytics and prescriptive analytics.
Create an individual set of requirements for an ERM tool for your
organisation
The selection of the ERM solution must always be geared to the needs of the com-
pany. In order to support modern ERM, the requirements should be considered
from a business, methodological and technical point of view. In particular, depend-
encies to source systems and interfaces, e.g. to the ERM system, must be specifi-
cally analysed.
Recognise future skills and competences for ERM professionals
The future role of ERM professionals can be determined by dividing the role
into several dimensions. The focus continues to be on basic ERM activities such
as governance, risk analysis and risk reporting. Important developments can be
derived from this. These include, for example, the focus on the bottom line, a con-
stantly changing environment, lifelong learning or constant innovation in methods
and processes.
233
Critical Thinking Questions
1. Which external data, which has hardly been used up to now, can become impor-
tant for ERM in the future?
2. Which ERM processes are suitable for using robotic process automation (RPA)
to increase efficiency?
3. How should cooperation with stakeholders and other technical reports be organ-
ised in the sense of collective ERM?
4. How will the role and job profile of ERM professionals change in the future?
5. To what extent do ERM professionals need to acquire new digital competencies
or develop existing ones?
References
Boillet, J. (2018). AI: a risk and a way to manage risk. https://www.ey.com/Publication/vwLUAs-
sets/ey-reporting-ai-a-risk-and-a-way-to-manage-risk/$FILE/ey-reporting-ai-a-risk-and-a-way-
to-manage-risk.pdf. Accessed 28 November 2018.
Brooke, S. (2018). How Can Big Data’s Potential Be Unleashed for Risk Management? https://
towardsdatascience.com/how-can-big-datas-potential-be-unleashed-for-risk-management-
e7c62bcd02b7. Accessed 26 November 2018.
Cammsrisk (2017). Top 5 Trends in Risk Management. https://cammsrisk.com/blog/top-5-trends-
in-risk-management/. Accessed 26 November 2018.
Committee of Sponsoring Organizations of the Treadway Commission (COSO) (2017). Enterprise
Risk Management—Integrating with Strategy and Performance. Jersey City, NJ: AICPA.
Culp, S. (2017). Extending The Skills Of The Risk Professional Is The Next Big Challenge In Risk
Management. https://www.forbes.com/sites/steveculp/2017/09/20/extending-the-skills-of-the-
risk-professional-is-the-next-big-challenge-in-risk-management/#766ebe8f6e40. Accessed 26
November 2018.
DeLoach, J. (2017). Transitioning Risk Management to the Digital Age. https://blog.protiviti.
com/2017/10/03/transitioning-risk-management-digital-age/. Accessed 22 November 2018.
Deloitte (2016). The networked economy demands collective risk management. https://www2.
deloitte.com/us/en/pages/risk/articles/networked-economy-demands-collective-risk-manage-
ment-future-of-risk-trend-eight.html. Accessed 26 November 2018.
Dowdalls, A. (2018). Building risk management skills for the future—where to start? https://
axveco.com/building-risk-management-skills-for-the-future-where-to-start/. Accessed 22
November 2018.
Ernst & Young (2017). What are the new risks associated with digitization, IoT, analyt-
ics and robotics? Presentation Enterprise Risk Summit 9. November 2017. Institut für
Finanzdienstleistungen Zug IFZ der Hochschule Luzern, Zug.
Ganguly, S., Harreis, H., Margolis, B., & Rowshankish, K. (2017). Digital risk: Transforming risk
management for the 2020 s. https://www.mckinsey.com/business-functions/risk/our-insights/
digital-risk-transforming-risk-management-for-the-2020s. Accessed 22 November 2018.
Gleißner, W., & Romeike, F. (2005). Anforderungen an die Softwareunterstützung für das
Risikomanagement. Controlling & Management, 49 (2), 154–164.
References
234 5 Looking at Trends in ERM
Hunziker, S., Fallegger, M., & Balmer, P. (2018). Risiken der digitalen Transformation in
Schweizer Unternehmen (ERM Report 2018). Institut für Finanzdienstleistungen Zug IFZ der
Hochschule Luzern, Zug.
Hüther, M. (2016). Digitalisierung: Systematisierung der Trends im Strukturwandel—Gestal-
tungsaufgabe für die Wirtschaftspolitik. Institut der deutschen Wirtschaft, Policy Paper 15,
Köln.
Institute of Risk Management (IRM) (2017). Perspectives on the future of risk. Risk Agenda
2025. https://www.theirm.org/media/3105903/IRM_Risk_Agenda_2025_v8.pdf. Accessed 22
November 2018.
Kirchberg, A., & Müller, D. (2016). Digitalisierung im Controlling: Einflussfaktoren,
Standortbestimmung und Konsequenzen für die Controllerarbeit. In R. Gleich, K. Grönke, M.
Kirchmann & J. Leyk (Eds.), Konzerncontrolling 2020 (pp. 79–96). Freiburg: Haufe.
McKinsey (Ed.). (2017). The future of risk management in the digital era. https://www.mckinsey.
com/business-functions/risk/our-insights/the-future-of-risk-management-in-the-digital-era.
Accessed 19 November 2018.
OECD (2015). OECD Digital Economy Outlook 2015. Paris: OECD Publishing. doi:http://dx.doi.
org/10.1787/9789264232440-en
Oliver Wyman (Ed.). (2018). Next Generation Risk Management. Targeting a Technology
Dividend. Asia Pacific Risk Center, Oliver Wyman.
RIMS (Ed.). (2011). ERM Technology Tools: A Contemporary Look. A Report of the RIMS
Technology Advisory Council and RIMS ERM Committee. https://www.rims.org/Sales/
Documents/RIMS%20Executive%20Report%20on%20ERM%20Technology%20Tools%20
September%202011.pdf. Accessed 22 November 2018.
RIMS (Ed.). (2009). Enterprise Risk Management Technology Solutions. New York: Risk and
Insurance Management Society, Inc.
RiskNET (Ed.). (2018). Artificial Intelligence. Maximierung des Nutzens von KI durch
Risikomanagement. https://www.risknet.de/themen/risknews/artificial-intelligence/
cbd8995195a65d462243cf9a17eb2aaf/. Accessed 27 November 2018.
Romeike, F. (2018). Risikomanagement. Wiesbaden: Springer Gabler.
Romeike, F. (2017). Predictive Analytics im Risikomanagement—Daten als Rohstoff für den
Erkenntnisprozess. CFO aktuell, 11 (2), 60–63.
Segal, S. (2011). Corporate value of enterprise risk management. The next step in business man-
agement. Hoboken, NJ: Wiley.
Simon, H. (2016). The Future of Risk Management: Gamer boys and girls as Chief Risk Officers.
https://www.linkedin.com/pulse/future-risk-management-gamer-boys-girls-chief-horst-simon.
Accessed 22 November 2018.
Swisscom (2017). Predictive Analytics. Daten sagen die Zukunft voraus. https://www.swisscom.
ch/de/business/enterprise/themen/digital-business/predictive-analytics.html. Accessed 30
January 2019.
Thomas, D., & Brown, J. S. (2011). A New Culture of Learning: Cultivating the Imagination for a
World of Constant Change. CreateSpace Independent Publishing Platform.
- Preface
- Contents
- 1 Introducing ERM
- 1.1 Why ERM Matters
- 1.2 Definition of ERM
- 1.3 Risk Definition in the ERM Approach
- 1.4 ERM Frameworks
- 1.5 Challenges to ERM Implementation
- References
- 2 Countering Biases in Risk Analysis
- 2.1 Motivational Biases
- 2.1.1 Affect Heuristics
- 2.1.2 Attribute Substitution
- 2.1.3 Confirmation Bias
- 2.1.4 Desirability of Options and Choice
- 2.1.5 Optimism
- 2.1.6 Transparency Bias
- 2.2 Cognitive Biases
- 2.2.1 Anchoring
- 2.2.2 Availability Bias
- 2.2.3 Dissonance Bias
- 2.2.4 Zero Risk Bias
- 2.2.5 Conjunction Fallacy
- 2.2.6 Conservatism Bias
- 2.2.7 Endowment and Status Quo Bias
- 2.2.8 Framing
- 2.2.9 Gambler’s Fallacy
- 2.2.10 Hindsight Bias
- 2.2.11 Overconfidence
- 2.2.12 Perceived Risks
- 2.3 Group-Specific Biases
- 2.3.1 Authority Bias
- 2.3.2 Conformity Bias
- 2.3.3 Groupthink
- 2.3.4 Hidden Profile
- 2.3.5 Social Loafing
- References
- 3 Creating Value Through ERM Process
- 3.1 Balance Rationality with Intuition
- 3.2 Embrace Uncertainty Governance as Part of ERM
- 3.3 Collect Risk Scenarios
- 3.3.1 Identify Sources, Events and Impacts of All Risks
- 3.3.2 Develop an Effective and Structured Risk Identification Approach
- 3.3.3 Identify Risks Enterprise-Wide
- 3.3.4 Treat Business and Decision Problems not as True Risks
- 3.3.5 Don’t Let Reputation Risk Fool You
- 3.3.6 Focus on Management Assumptions
- 3.3.6.1 Start with Understanding the Business Strategy and Strategic Risk
- 3.3.6.2 Collect All Management Assumptions
- 3.3.6.3 Use Strategic Tools to Complement Assumption Analysis
- 3.3.6.4 Risk Identification: Mission Accomplished?
- 3.3.7 Conduct One-on-One Interviews with Key Stakeholders
- 3.3.7.1 Prefer Interviews Over Templates and Surveys
- 3.3.7.2 Select and Inform Interviewees Carefully
- 3.3.7.3 Elicit Feedback on Major Risks
- 3.3.7.4 Focus on Plausible Stories, not on Numbers
- 3.3.8 Complement with Traditional Risk Identification
- 3.3.8.1 Conduct Risk Workshops Carefully
- 3.3.8.2 Consider Process-Based Risk Identification
- 3.3.8.3 Use Risk Checklists with Caution
- 3.3.8.4 Try Fault Tree Analysis (FTA) for Critical Processes and Systems
- 3.3.8.5 Prevent Costly Errors with Failure Mode and Effects Analysis (FMEA)
- 3.4 Assess Key Risk Scenarios
- 3.4.1 Identify Key Risk Scenarios
- 3.4.1.1 Exclude Unrealistic, Devastating Risks
- 3.4.1.2 Separate Pure Management Action Items
- 3.4.1.3 Avoid Risk Maps as Selection Criterion
- 3.4.1.4 Avoid Expected Values as Selection Criterion
- 3.4.1.5 Prefer Impact Over Probability
- 3.4.1.6 Distinguish Between Key and Non Key Risks
- 3.4.2 Quantify Key Risk Scenarios
- 3.4.2.1 Why Risk Quantification Matters
- 3.4.2.2 Develop Quantitative Key Risk Scenarios
- 3.4.2.3 Store Key Risk Scenarios in a Database
- 3.4.3 Support Decision-Making
- 3.4.4 Differentiate between Decisions and Outcomes
- 3.4.5 Overcome the Regulatory Risk Management Approach
- 3.4.6 Overcome the Separation of Risk Analysis and Decision-Making
- 3.4.7 Assess Impact on Relevant Objectives
- 3.4.8 Avoid Pseudo-Risk Aggregation
- 3.4.9 Develop Useful Risk Appetite Statements
- 3.4.10 Make Uncertainties Transparent and Comprehensible
- 3.4.11 Exploit the Full Decision-Making Potential of ERM
- 3.4.12 Align ERM with Business Planning
- 3.4.13 Replace Standard Risk Reporting
- 3.4.14 Disclose Risks Appropriately
- 3.5 Assess and Improve ERM Quality
- 3.5.1 Test ERM Effectiveness Appropriately
- 3.5.2 Increase ERM Maturity Level
- References
- 4 Setting up Enterprise Risk Governance
- 4.1 Comply with Laws and Check Relevant Governance Codes
- 4.2 Consider ERM-Frameworks Thoughtfully
- 4.2.1 Motivation for Risk Management Standards
- 4.2.2 ISO 31000
- 4.2.3 COSO ERM
- 4.2.4 Similarities and Differences
- 4.2.5 Limitations of ERM Frameworks
- 4.3 Develop a Sound Risk Policy
- 4.3.1 Risk Policy and Corporate Strategy
- 4.3.2 Risk Policy as the Basis for Dealing with Risks
- 4.3.3 Limitations of Risk Policies
- 4.4 Enhance Risk Culture
- 4.4.1 Relate Risk Culture to Corporate Culture
- 4.4.2 Understand How Risk Culture Evolves
- 4.4.3 Increase Risk Culture Maturity Level
- 4.5 Organise ERM Properly
- 4.5.1 Does a Best-Practice ERM Organisation Exist?
- 4.5.2 ERM Organisation Options
- 4.5.3 Some Thoughts on Roles and Responsibilities
- References
- 5 Looking at Trends in ERM
- 5.1 Emerging Digital Risks
- 5.1.1 Impact of Disruptive Technologies
- 5.1.2 Digital Risk Framework
- 5.2 Digitization of ERM
- 5.3 Using Multiple Sources of Data
- 5.4 Increasing Demand for Analytic Skill Sets
- 5.5 Increasingly Sophisticated Software Tools
- 5.6 Networked Economy and Collective ERM
- 5.7 Improving ERM Skills
- References
Springer Texts in Business and Economics
David L. Olson
Desheng Wu
Enterprise Risk
Management
Models
Third Edition
Springer Texts in Business and Economics
Springer Texts in Business and Economics (STBE) delivers high-quality instruc-
tional content for undergraduates and graduates in all areas of Business/Management
Science and Economics. The series is comprised of self-contained books with a
broad and comprehensive coverage that are suitable for class as well as for individual
self-study. All texts are authored by established experts in their fields and offer a
solid methodological background, often accompanied by problems and exercises.
More information about this series at http://www.springer.com/series/10099
David L. Olson • Desheng Wu
Enterprise Risk
Management Models
Third Edition
David L. Olson
Department of Management
University of Nebraska
Lincoln, NE, USA
Desheng Wu
Economics and Management School
University of Chinese Academy of Sciences
Beijing, China
Stockholm Business School
Stockholm University
Stockholm, Sweden
ISSN 2192-4333 ISSN 2192-4341 (electronic)
Springer Texts in Business and Economics
ISBN 978-3-662-60607-0 ISBN 978-3-662-60608-7 (eBook)
https://doi.org/10.1007/978-3-662-60608-7
# Springer-Verlag GmbH Germany, part of Springer Nature 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology
now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer-Verlag GmbH, DE, part of
Springer Nature.
The registered company address is: Heidelberger Platz 3, 14197 Berlin, Germany
Preface
Enterprise risk management has always been important. However, the events of the
twenty-first century have made it even more critical. Nature has caused massive
disruption, such as the tsunami that hit Fukushima in March 2011. Terrorism seems
to be on the rise, with attacks occurring in the USA, Europe, and Russia with greater
regularity, not to mention the even more common occurrences in the Middle East.
Human activities meant to provide benefits such as food modification and medicine
have led to unintended consequences. The generation of energy involves highly
politicized trade-offs between efficient electricity and carbon emissions, with the
macro-level risk of planetary survival at stake. Oil transport has experienced trau-
matic events. Risks can arise in many facets of business. Businesses in fact exist to
cope with risk in their area of specialization. But chief executive officers are
responsible to deal with any risk fate throws at their organization.
The first edition of this book was published in 2010, reviewing models used in
management of risk in nonfinancial disciplines. It focused more on application areas,
to include management of supply chains, information systems, and projects. It
included review of three basic types of models: multiple criteria analysis, probabi-
listic analysis, and business scorecards to monitor risk performance. The second
edition in 2017 focused more on models, with the underlying assumption that they
can be applied to some degree to risk management in any context. The third edition
adds material on risk-adjusted loss in Chap. 2, updates value analysis cases in
Chap. 4, and corrects an error in a chance constrained programming example in
Chap. 7.
The bulk of this book is devoted to presenting a number of operations research
models that have been (or could be) applied to supply chain risk management. We
begin with risk matrices, a simple way to sort out initial risk analysis. Then we
discuss decision analysis models, focusing on Simple Multi-attribute Rating Theory
(SMART) models to better enable supply chain risk managers to trade off conflicting
criteria of importance in their decisions. Monte Carlo simulation models are the
obvious operations research tool appropriate for risk management. We demonstrate
simulation models in supply chain contexts, to include calculation of value at risk.
We then move to mathematical programming models, to include chance constrained
programming, which incorporates probability into otherwise linear programming
models, and data envelopment analysis. We also discuss data mining with respect to
v
enterprise risk management. We close the modeling portion of the book with the use
of business scorecard analysis in the context of supply chain enterprise risk
management.
Chapters 11 through 15 discuss risk management contexts. Financial risk man-
agement has focused on banking, accounting, and finance.1 There are many good
organizations that have done excellent work to aid organizations dealing with those
specific forms of risk. This book focuses on other aspects of risk, to include
information systems and project management to supplement prior focus on supply
chain perspectives.2 We present more in-depth views of the perspective of supply
chain risk management, to include frameworks and controls in the ERM process
with respect to supply chains, information systems, and project management. We
also discuss aspects of natural disaster management, as well as sustainability, and
environmental damage aspects of risk management.
Operations research models have proven effective for over half a century. They
have been and are being applied in risk management contexts worldwide. We hope
that this book provides some view of how they can be applied by more readers faced
with enterprise risk.
Lincoln, NE David L. Olson
Beijing, China
Stockholm, Sweden
Desheng Wu
September 2019
Notes
1. Wu, D. D., & Olson, D. L. (2015). Enterprise Risk Management in Finance. New York:
Palgrave Macmillan.
2. Olson, D. L., & Wu, D. (2015). Enterprise Risk Management, 2nd ed. Singapore: World
Scientific.
vi Preface
Acknowledgment
This work was supported in part by the Ministry of Science and Technology of
China under Grant 2016YFC0503606, the National Natural Science Foundation of
China under Grant 71825007, the Chinese Academy of Sciences Frontier Scientific
Research Key Project under Grant QYZDB-SSW-SYS021, the CAS Strategic
Research and Decision Support System Development under Grant GHJ-ZLZX-
2019-33-3, the Marianne and Marcus Wallenberg Foundation under Grant MMW
2015.0007, and the Strategic Priority Research Program of CAS under Grant
XDA23020203 and supported by the International Partnership Program of Chinese
Academy of Sciences, Grant No.211211KYSB20180042.
vii
Contents
1 Enterprise Risk Management in Supply Chains . . . . . . . . . . . . . 1
2 Risk Matrices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3 Value-Focused Supply Chain Risk Analysis . . . . . . . . . . . . . . . . 33
4 Examples of Supply Chain Decisions Trading Off Criteria . . . . . 45
5 Simulation of Supply Chain Risk . . . . . . . . . . . . . . . . . . . . . . . . 59
6 Value at Risk Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
7 Chance-Constrained Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
8 Data Envelopment Analysis in Enterprise Risk Management . . . 109
9 Data Mining Models and Enterprise Risk Management . . . . . . . 123
10 Balanced Scorecards to Measure Enterprise Risk Performance . . . 137
11 Information Systems Security Risk . . . . . . . . . . . . . . . . . . . . . . . 149
12 Enterprise Risk Management in Projects . . . . . . . . . . . . . . . . . . 165
13 Natural Disaster Risk Management . . . . . . . . . . . . . . . . . . . . . . 179
14 Sustainability and Enterprise Risk Management . . . . . . . . . . . . . 199
15 Environmental Damage and Risk Assessment . . . . . . . . . . . . . . . 213
ix
Enterprise Risk Management in Supply
Chains 1
All human endeavors involve uncertainty and risk. Mitroff and Alpaslan (2003)
categorized emergencies and crises into three categories: natural disasters, malicious
activities, and systemic failures of human systems.1 Nature does many things to us,
disrupting our best-laid plans and undoing much of what humans have constructed.
Natural disasters by definition are surprises, causing a great deal of damage and
inconvenience. Nature inflicts disasters such as volcanic eruptions, tsunamis,
hurricanes and tornados. Guertler and Spinler2 noted a number of supply chain
disruptions in recent years due to natural causes. In 2007 an earthquake damaged
Toyota’s major supplier for key parts, leading to shutdown of Toyota’s Japanese
factories as well as impacting Mitsubishi, Suzuki, and Honda. In 2010 the Icelandic
volcanic activity shut down European air space for about a week, massively
disrupting global supply chains. In 2011 the tsunami leading to the Fukushima
disaster disrupted automakers and electronic supply chains, as well as many others.
While natural disasters come as surprises, we can be prepared. Events such as
earthquakes, floods, fires and hurricanes are manifestations of the majesty of nature.
In some cases, such as Mount Saint Helens or Hurricane Katrina,3 we have
premonitions to warn us, but we never completely know the extent of what is
going to happen. Emergency management is a dynamic process conducted under
stressful conditions, requiring flexible and rigorous planning, cooperation, and
vigilance.
Some things we do to ourselves, to include revolutions, terrorist attacks and
wars. Malicious acts are intentional on the part of fellow humans who are either
excessively competitive or who suffer from character flaws. Wars fall within this
category, although our perceptions of what is sanctioned or malicious are colored
by our biases. Criminal activities such as product tampering or kidnapping and
murder are clearly not condoned. Acts of terrorism are less easily classified, as
what is terrorism to some of us is expression of political behavior to others. Similar
gray categories exist in the business world. Marketing is highly competitive, and
positive spinning of your product often tips over to malicious slander of competitor
# Springer-Verlag GmbH Germany, part of Springer Nature 2020
D. L. Olson, D. Wu, Enterprise Risk Management Models, Springer Texts in
Business and Economics, https://doi.org/10.1007/978-3-662-60608-7_1
1
products. Malicious activity has even arisen within the area of information technol-
ogy, in the form of identity theft or tampering with company records.
The third category is probably the most common source of crises: unexpected
consequences arising from overly complex systems.4 Some disasters combine
human and natural causes—we dam up rivers to control floods, to irrigate, to
generate power, and for recreation, as at Johnstown, PA at the turn of the twentieth
Century. We have developed low-pollution, low-cost electricity through nuclear
energy, as at Three-Mile Island in Pennsylvania and Chernobyl. The financial
world is not immune to systemic failure. Financial risk importance was evidenced
traumatically by events of 2007 and 2008, when the global financial community
experienced a real estate bubble collapse from which most of the world’s economies
are still recovering. Human investment activity seems determined to create bubbles,
despite our long history of suffering.5 Financial investment seems to be a never-
ending game of greedy players seeking to take advantage of each other, which Adam
Smith assured us would lead to an optimal economic system. It is interesting that we
pass through periods of trying one system, usually persisting until we encounter
failure, and then move on to another system.6
Unexpected Consequences
Charles Perrow contended that humans are creating technologies that are high risk
because they are too complex, involving interactive complexity in tightly coupled
systems. Examples include dam systems, which have provided a great deal of value
to the American Northwest and Midwest, but which also create potential for disaster
when dams might break; mines, which give access to precious metals and other
needed materials but which have been known to collapse; and space activities, which
demonstrate some of mankind’s greatest achievements, as well as some of its most
heartbreaking failures. Nuclear systems (power or weapon) and airline systems are
designed to be highly reliable, with many processes imposed to provide checks and
balances. Essentially, humans respond to high risk by creating redundant and more
complex systems, which by their nature lead to a system prone to greater likelihood
of systems failure.
Technological innovation is a manifestation of human progress, but efforts in this
direction have yielded many issues. In the energy field, nuclear power was consid-
ered the solution to electrical supply 50 years ago. While it has proven to be a viable
source of energy in France and other European countries, it has had problems in the
US (Three Mile Island) and in the former Soviet Union (Chernobyl). There is a
reticence on the part of citizens to nuclear power, and the issue of waste disposal
defies solution. Even in Europe the trend is away from nuclear. The Federal
Government in the US did not license new plants for decades, despite technological
advances developed by national laboratories. Coal remains a major source of
electrical energy fuel, although there are very strong questions concerning the
need to replace it for carbon footprint reasons. Natural gas is one alternative.
Wind power is another. Solar energy has been proposed. All of these alternatives
2 1 Enterprise Risk Management in Supply Chains
can be seen to work physically, if not economically. The question of energy was
further complicated with the recent large-scale adoption of fracking. This technique
introduces risk and uncertainty not only to itself, but its inclusion changes decision-
making regarding all sectors of energy.
All organizations need to prepare themselves to cope with crises from whatever
source. In an ideal world, managers would identify everything bad that could happen
to them, and develop a contingency plan for each of these sources of crisis. It is a
good idea to be prepared. However, crises by definition are almost always the result
of nature, malicious humans, or systems catching us unprepared (otherwise there
may not have been a crisis). We need to consider what could go wrong, and think
about what we might do to avoid problems. We cannot expect to cope with every
contingency, however, and need to be able to respond to new challenges.
Enterprise risk management, especially in finance and accounting,7 is well-
covered by many sources. This book will review the types of risks faced within
supply chains as identified by recent sources. We will also look at project manage-
ment, information systems, emergency management, and sustainability aspects of
supply chain risk. We will then look at processes proposed to enable organizations to
identify, react to, and cope with challenges that have been encountered. This will
include looking at risk mitigation options. One option explored in depth will be the
application of value-focused analysis to supply chain risk. We will then seek to
demonstrate points with cases from the literature. We will conclude this chapter with
an overview.
Supply Chain Risk Frameworks
There is a rapidly growing body of literature concerning risk management, to include
special issues in Technovation,8 Omega,9 and Annals of Operations Research.10
Special issues also have been devoted to sustainability and risk management.11 This
literature involves a number of approaches, including some frameworks, categoriza-
tion of risks, processes, and mitigation strategies. Frameworks have been provided
by many, to include Lavastre et al.12 and Desai et al.13 We begin with a general
framework. Ritchie and Brindley14 viewed five major components to a framework in
managing supply chain risk.
Risk Context and Drivers
Supply chains can be viewed as consisting of primary and secondary levels. The
primary level chain involves those that have major involvement in delivery of goods
and services (Wal-Mart itself and its suppliers). At the secondary level participants
have a more indirect involvement (those who supply vendors who have contracts
with Wal-Mart, or Wal-Mart’s customers). The primary level participants are
governed by contractual relationships, obviously tending to be more clearly stated.
Risk drivers can arise from the external environment, from within an industry, from
Supply Chain Risk Frameworks 3
within a specific supply chain, from specific partner relationships, or from specific
activities within the organization.
Risk drivers arising from the external environment will affect all organizations,
and can include elements such as the potential collapse of the global financial
system, or wars. Industry specific supply chains may have different degrees of
exposure to risks. A regional grocery will be less impacted by recalls of Chinese
products involving lead paint than will those supply chains carrying such items.
Supply chain configuration can be the source of risks. Specific organizations can
reduce industry risk by the way the make decisions with respect to vendor selection.
Partner specific risks include consideration of financial solvency, product quality
capabilities, and compatibility and capabilities of vendor information systems. The
last level of risk drivers relate to internal organizational processes in risk assessment
and response, and can be improved by better equipping and training of staff and
improved managerial control through better information systems.
Risk Management Influencers
This level involves actions taken by the organization to improve their risk position.
The organization’s attitude toward risk will affect its reward system, and mold how
individuals within the organization will react to events. This attitude can be dynamic
over time, responding to organizational success or decline.
Decision Makers
Individuals within the organization have risk profiles. Some humans are more risk
averse, others more risk seeking. Different organizations have different degrees of
group decision making. More hierarchical organizations may isolate specific
decisions to particular individuals or offices, while flatter organizations may stress
greater levels of participation. Individual or group attitudes toward risk can be
shaped by their recent experiences, as well as by the reward and penalty structure
used by the organization.
Risk Management Responses
Each organization must respond to risks, but there are many alternative ways in
which the process used can be applied. Risk must first be identified. Monitoring and
review requires measurement of organizational performance. Once risks are
identified, responses must be selected. Risks can be mitigated by an implicit
tradeoff between insurance and cost reduction. Most actions available to
organizations involve knowing what risks the organization can cope with because
of their expertise and capabilities, and which risks they should outsource to others at
some cost. Some risks can be dealt with, others avoided.
4 1 Enterprise Risk Management in Supply Chains
Performance Outcomes
Organizational performance measures can vary widely. Private for-profit
organizations are generally measured in terms of profitability, short-run and long-
run. Public organizations are held accountable in terms of effectiveness in delivering
services as well as the cost of providing these services. Kleindorfer and Saad gave
8 key drivers of disruption/risk management in supply chains15:
Corporate image Regulatory compliance
Liability Community relations
Employee health and safety Customer relations
Cost reduction Product improvement
In normal times, there is more of a focus on high returns for private
organizations, and lower taxes for public institutions. Risk events can make their
preparation in dealing with risk exposure much more important, focusing on
survival.
Cases
The research literature is very heavily populated by studies of supply chain risk in
recent years. Diabat et al.16 presented a model of a food supply chain with five
categories (macro concerning nature and political, demand, supply, product, and
information management) of risk using interpretive structural modeling. Hachicha
and Elmasalmi17 proposed structural modeling and MICMAC (cross-impact) analy-
sis for risk prioritization. Aqlan and Lam18 applied optimization modeling to
mitigate supply chain risks in a manufacturing environment. Davarzani et al.19
considered economic/political risk in three companies in the automotive field,
while Ceryno et al.20 developed risk profiles in terms of drivers, sources, and events
for automotive cases in Brazil. Trkman et al.21 surveyed 89 supply chain companies,
finding a predominant focus on risk avoidance rather than using risk management for
value generation. These cases cited are only the tip of the iceberg, meant to give
some flavor of the variety of supply chain domains that have been analyzed for risk.
Models Applied
Many different types of models have been proposed in the literature. Because of the
uncertainty involved, statistical analysis and simulation are very appropriate to
consider supply chain risk. Bayesian analysis has been proposed to model supply
chain risk.22 Simulation was proposed in a number of studies, to include discrete-
event simulation.23 Colicchia et al.24 applied simulation modeling to support risk
management in supply chains. Simulation modeling of personnel system supply
chains has been addressed.25 System dynamics models have been widely used26 and
Models Applied 5
with respect to the bullwhip-effect.27 Other modeling approaches have been applied
to supply chain risk as well.28 Optimization is widely used,29 and even data
mining.30
Risk Categories Within Supply Chains
Supply chains involve many risks. Cucchiella and Gastaldi31 divided supply chain
risks into two categories: internal (involving such issues as capacity variations,
regulations, information delays, and organizational factors) and external (market
prices, actions of competitors, manufacturing yield and costs, supplier quality, and
political issues). Specific supply chain risks considered by various studies are given
in Table 1.1:
Supply chain organizations thus need to worry about risks from every direction.
In any business, opportunities arise from the ability of that organization to deal with
risks. Most natural risks are dealt with either through diversification and redundancy,
or through insurance, both of which have inherent costs. As with any business
decision, the organization needs to make a decision considering tradeoffs.
Traditionally, this has involved the factors of costs and benefits. Society is more
and more moving toward even more complex decision-making domains requiring
consideration of ecological factors as well as factors of social equity.
Dealing with other external risks involves more opportunities to control risk
sources. Some supply chains in the past have had influence on political systems.
Arms firms like that of Alfred Nobel come to mind, as well as petroleum businesses,
both of which have been accused of controlling political decisions. While most
supply chain entities are not expected to be able to control political risks like wars
and regulations, they do have the ability to create environments leading to labor
unrest. Supply chain organizations have even greater expected influence over eco-
nomic factors. While they are not expected to be able to control exchange rates, the
benefit of monopolies or cartels is their ability to influence price. Business
organizations also are responsible to develop technologies providing competitive
advantage, and to develop product portfolios in dynamic markets with product life
cycles. The risks arise from never-ending competition.
Internal risk management is more directly the responsibility of the supply chain
organization and its participants. Any business organization is responsible to manage
financial, production, and structural capacities. They are responsible for programs to
provide adequate workplace safety, which has proven to be cost-beneficial to
organizations as well as fulfilling social responsibilities. Within supply chains,
there is need to coordinate activities with vendors, and to some degree with
customers (supported by data obtained through bar-code cash register information
providing instantaneous indication of demand). Information systems technology
provides effective tools to keep on top of supply chain information exchange.
Another factor of great importance is the responsibility of supply chain core
6 1 Enterprise Risk Management in Supply Chains
organizations to manage risks inherent in the tradeoff between wider participation
made possible through Internet connections (providing a larger set of potential
suppliers leading to lower costs) with the reliability provided by long-term
relationships with a smaller set of suppliers that have proven to be reliable.
Table 1.1 Supply chain risk categories
Category Risk A B C D E F G
External
Nature Natural disaster: flood,
earthquake
X X X X X
Plant fire X
Diseases, epidemics X X
Political system War, terrorism X X X
Labor disputes X X X X X
Customs and regulations X X X X X X
Competitor and
market
Price fluctuation X
Economic downturn X
Exchange rate risk X X
Consumer demand volatility X X X
Customer payment X
New technology X X
Obsolescence X X
Substitution alternatives X
Internal
Available capacity Cost X X X
Financial capacity/insurance X X
Structural capacity X X X X X
Supplier bankruptcy X X
Internal operation Forecast inaccuracy X X X X
Safety (worker accidents) X X
Agility/flexibility X X X
On-time delivery X X X
Quality X X X
Information system IS breakdown X
Integration X X X
A—Chopra and Sodhi (2004)32
B—Wu et al. (2006)33
C—Cucchiella and Gastaldi (2006)34
D—Blackhurst et al. (2008)35
E—Manuj and Mentzer (2008)36
F—Wagner and Body (2008)37
G—Lavastre et al. (2014)38
Risk Categories Within Supply Chains 7
Process
A process is a means to implement a risk management plan. Cucchiella and Gastaldi
outlined a supply chain risk management process39:
• Analysis: examine supply chain structure, appropriate performance measures,
and responsibilities
• Identify sources of uncertainty: focus on most important
• Examine risks: select risks in controllable sources of uncertainty
• Manage risk: develop strategies
• Individualize most adequate real option: select strategies for each risk
• Implement
This can be combined with a generic risk management process compatible with
those provided by Hallikas et al., Khan and Burnes, Autry and Bobbitt, and by
Manuj and Mentzer40:
• Risk identification
– Perceiving hazards, identifying failures, recognizing adverse consequences
– Security preparation and planning
• Risk assessment (estimation) and evaluation
– Describing and quantifying risk, estimating probabilities
– Estimating risk significance, acceptability of risk acceptance, cost/benefit
analysis
• Selection of appropriate risk management strategy
• Implementation
– Security-related partnerships
– Organizational adaptation
• Risk monitoring/mitigation
– Communication and information technology security
Both of these views match the Kleindorfer and Saad risk management
framework41:
1. The initial requirement is to specify the nature of underlying hazards leading to
risks;
2. Risk needs to be quantified through disciplined risk assessment, to include
establishing the linkages that trigger risks;
3. To manage risk effectively, approaches must fit the needs of the decision
environment;
4. Appropriate management policies and actions must be integrating with on-going
risk assessment and coordination.
8 1 Enterprise Risk Management in Supply Chains
In order to specify, assess and mitigate risks, Kleindorfer and Saad proposed ten
principles derived from industrial and supply chain literatures:
1. Before expecting other supply chain members to control risk, the core activity
must do so internally;
2. Diversification reduces risk—in supply chain contexts, this can include facility
locations, sourcing options, logistics, and operational modes;
3. Robustness to disruption risks is determined by the weakest link;
4. Prevention is better than cure—loss avoidance and preemption are preferable to
fixing problems after the fact;
5. Leanness and efficiency can lead to increased vulnerability
6. Backup systems, contingency plans, and maintaining slack can increase the
ability to manage risk;
7. Collaborative information sharing and best practices are needed to identify
vulnerabilities in the supply chain;
8. Linking risk assessment and quantification with risk management options is
crucial to understand potential for harm and to evaluate prudent mitigation;
9. Modularity of process and product designs as well as other aspects of agility and
flexibility can provide leverage to reduce risks, especially those involving raw
material availability and component supply;
10. TQM principles such as Six-Sigma give leverage in achieving greater supply
chain security and reduction of disruptive risks as well as reducing operating
costs.
Mitigation Strategies
There are many means available to control risks within supply chains. A fundamen-
tal strategy would be to try to do a great job in the fundamental supply chain
performance measures of consistent fulfillment of orders, delivery dependability,
and customer satisfaction. That basically amounts to doing a good job at what you
do. Of course, many effective organizations have failed when faced with changing
markets or catastrophic risks outlined in the last section as external risks. Some
strategies proposed for supply chains are reviewed in Table 1.2:
Chopra and Sodhi developed a matrix to compare relative advantages or
disadvantages of each strategy with respect to types of risks.47 Adding capacity
would be expected to reduce risk of needing more capacity of course, and also
decrease risk of procurement and inventory problems, but increases the risk of delay.
Adding inventory is very beneficial in reducing risk of delays, and reduces risk of
disruption, procurement, and capacity, but incurs much greater risk of inventory-
related risks such as out-dating, spoilage, carrying costs, etc. Having redundant
suppliers is expected to be very effective at dealing with disruptions, and also can
reduce procurement and inventory risk, but can increase the risk of excess
Mitigation Strategies 9
capacity. Other strategies had no negative expected risk impacts (increasing
responsiveness, increasing flexibility, aggregating demand, increasing capability,
or increasing customer accounts), but could have negative cost implications. Talluri
et al.48 assessed such strategies via simulation.
Tang emphasized robustness.49 He gave nine robust supply chain strategies, some
of which were included in Table 1.2. He elaborated on the expected benefits of each
strategy, both for normal operations as well as in dealing with major disruptions,
outlined in Table 1.3, organized by purpose:
Cucchiella and Gastaldi gave similar strategies, with sources of supply chain
research that investigated each.50 Cucchiella and Gastaldi expanded Tang’s list to
include capacity expansion. Ritchie and Brindley included risk insurance, informa-
tion sharing, and relationship development.51
Table 1.2 Supply chain mitigation strategies
A B C D E
Add capacity Expand where you have
competitive advantage
Add inventory Buffers Safety stock
Redundant
suppliers
Multiple
sources
Monitor
suppliers
Drop troublesome
suppliers
Increase
responsiveness
Information
sharing
Contingency
planning
End-to-end
visibility
Increase
flexibility
Product
differentiation
Late product
differentiation
Delay resource
commitment
Supply
flexibility
Pool demand Multiple
sourcing
Increase
capability
Outsource low
probability demand
More
customers
Early supplier
involvement
Information
sharing
Sharing/transfer Awareness
Risk taking Insurance Hedge (insure, disperse
globally)
Supplier
development
Drop troublesome
customers
A—Chopra and Sodhi (2004)42
B—Khan and Burnes (2007)43
C—Wagner and Bode (2008)44
D—Manuj and Mentzer (2008)45
E—Oke and Gopalakrishnan (2009)46
10 1 Enterprise Risk Management in Supply Chains
Conclusions
Enterprise risk management began focusing on financial factors. After the corporate
scandals in the U.S. in the early 2000s, accounting aspects grew in importance. This
chapter discusses the importance of risk management in the context of supply chain
management.
A representative risk framework based on the work of Ritchie and Brindley was
presented. It rationally begins by identify causes (drivers) of risk, and influencers
within the organization. Those responsible for decision making are identified, and a
process outlined where risks, responses, and measures of outcomes are included.
There have been many cases involving supply chain risk management reported
recently. Some were briefly reviewed, along with quantitative modeling. Typical
risks faced by supply chains were extracted from sources, and categorized. A process
of risk identification, assessment, strategy development and selection, implementa-
tion and monitoring is reviewed. Representative mitigation strategies were extracted
from published sources.
Chapter 2 addresses the enterprise risk management process, describing use of
risk matrices. Chapter 3 describes value-focused supply chain risk analysis, with
examples demonstrated in Chap. 4. Chapter 5 provides simulation modeling of
supply chain inventory. Chapter 6 deals with value at risk, Chap. 7 with chance
Table 1.3 Tang’s Robust supply chain strategies
Strategy Purpose Normal benefits Disruption benefits
Strategic stock Product
availability
Better supply
management
Quick response
Economic
supply
incentives
Can quickly adjust order quantities
Postponement Product
flexibility
Can change product configurations
quickly in response to actual
demand
Flexible
supply base
Supply
flexibility
Can shift production among
suppliers quickly
Make-and-buy Can shift production in-house or
outsource
Flexible
transportation
Transportation
flexibility
Can switch among modes as
needed
Revenue
management
Control
product
demand
Better demand
management
Influence customer selection as
needed
Dynamic
assortment
planning
Can influence product demand
quickly
Silent product
rollover
Control
product
exposure
Better manage both
supply and demand
Quickly affect demand
Conclusions 11
constrained modeling, Chap. 8 with data envelopment analysis, and Chap. 9 with
data mining from the perspective of enterprise risk management. Chapter 10
concludes the methods section of the book with balanced scorecards as tools to
monitor implementation of risk management efforts. Domain specific issues for
information systems are discussed in Chap. 11, for project management in
Chap. 12, natural disaster response in Chap. 13, sustainability risk management in
Chap. 14, and environmental damage and risk assessment in Chap. 15.
Notes
1. Mitroff, I.I. and Alpaslan, M.C. (2003). Preparing for evil, Harvard Business
Review 81:4, 109–115.
2. Guertler, B. and Spinler, S. (2015). Supply risk interrelationships and the
derivation of key supply risk indicators, Technological Forecasting & Social
Change 92, 224–236.
3. Kapucu, N. and Van Wart, M. (2008). Making matters worse: An anatomy of
leadership failures in managing catastrophic events, Administration & Society
40(7): 711–740.
4. Perrow, C. (1984). Normal Accidents: Living with High-Risk Technologies.
Princeton, NJ: Princeton University Press, 1999 reprint.
5. Laeven, L. and F. Valencia (2008) ‘Systemic banking crises: A new database’,
International Monetary Fund Working Paper WP/08/224.
6. Wu, D.D. and Olson, D.L. (2015), Enterprise Risk Management in Finance.
New York: Palgrave Macmillan.
7. Olson, D.L. and Wu, D.D. (2015). Enterprise Risk Management 2nd ed..
Singapore: World Scientific.
8. Olson, D.L., Birge, J. and Linton, J. (2014). Special issue: Risk management in
cleaner production. Technovation 34:8, 395–398.
9. Wu, D.D., Olson, D.L. and Dolgui, A. (2015). Decision making in enterprise
risk management. Omega 57 Part A, 1–4.
10. Wu, D. (2016). Risk management and operations research: A review and
introduction to the special issue. Annals of Operations Research 237(1–2), 1–3.
11. Wu, D.D., Olson, D.L. and Birge, J.R. (2013). Risk management in cleaner
production. Journal of Cleaner Production 53, 1–6.
12. Lavastre, O., Gunasekaran, A. and Spalanzani, A. (2014). Effect of firm charac-
teristic, supplier relationships and techniques used on supply chain risk man-
agement (SCRM): An empirical investigation on French industrial firms.
International Journal of Production Research 52(110), 3381–3403.
13. Desai, K.J., Desai, M.S. and Ojode, L. (2015). Supply chain risk management
framework: A fishbone analysis approach. SAM Advanced Management Journal
80(3), 34–56.
14. Ritchie, B. and Brindley, C. (2007a). An emergent framework for supply chain
risk management and performance measurement, Journal of the Operational
Research Society 58, 1398–1411; Ritchie, B. and Brindley, C. (2007b). Supply
12 1 Enterprise Risk Management in Supply Chains
chain risk management and performance: A guiding framework for future
development, International Journal of Operations & Production Management
27:3, 303–322.
15. Kleindorfer, P.R. and Saad, G.H. (2005). Managing disruption risks in supply
chains, Production and Operations Management 14:1, 53–68.
16. Diabat, A., Govindan, K. and Panicker, v.V. (2012). Supply chain risk manage-
ment and its mitigation in a food industry. International Journal of Production
Research 50(11), 3039–3050.
17. Hachicha, W. and Elmsalmi, M. (2014) An integrated approach based-
struct6ural modeling rfor risk prioritization in supply network management.
Journal of Risk Research 17(10), 1301–1324.
18. Aqlan, F. and Lam, S.S. (2015). Supply chain risk modelling and mitigation.
International Journal of Production Research 53(18), 5640–5656.
19. Davarzani, H., Zanjirani Farahani, R., and Rahmandad, H. (2015). Understand-
ing econo-political risks: Impact of sanctions on an automotive supply chain.
International Journal of Operations & Production Management 35(11),
1567–1591.
20. Ceryno, P.S., Scavarda, L.F., and Klingebiel, K. (2015). Supply chain risk:
Empirical research in the automotive industry. Journal of Risk Research 18(9),
1145–1164.
21. Trkman, P., de Oliveira, M.P.V. and McCormack, K. (2016). Valuie-oriented
supply chain risk management: You get what you expect. Industrial Manage-
ment & Data Systems 116(5), 1061–1083.
22. Burdeen, F., Shuaib, M., Wijekoon, K., Brown, A., Faulkner, W., Amundson,
J., Jawahir, I.S., Goldsby, T.J., Iyengar, D. and Boden, B. (2014). Quantitative
modeling and analysis of supply chain risks using Bayesian theory. Journal of
Manufacturing Technology Management 631–654.
23. Elleuch, H., Hachicha, W., and Chabchoub, H. (2014). A combined approach
for supply chain risk management: Description and application to a real hospital
pharmaceutical case study. Journal of Risk Research 17(5), 641–663.
24. Colicchia, C., Dallari, F., and Melacini, M. (2011). A simulatin-based frame-
work to evaluate strategies for managing global inbound supply risk. Interna-
tional Journal of Logistics: Research & Applications 14(6), 371–384.
25. Swenseth, S.R. and Olson, D.L. (2014). Simulation model of professional
service personnel inventory. International Journal of Services and Operations
Management 19(4), 451–467.
26. Ghadge, A., Dani, S., Chester, M. and Kalawsky, R. (2013). A systems
approach for modelling supply chain risk. Supply Chain Management 18(5),
523–538.
27. Wangphanich, P., Kara, S. and Kayis, B. (2010). Analysis of the bullwhip effect
in multi-product, multi-stage supply chain systems – a simulation approach.
International Journal of Production Research 48(15), 4501–4517.
28. Wu, D. and Olson, D.L. (2011). Forward. Annals of Operations Research 185
(1), 1–3; Wu, D.D., Olson, D.L. and Birge, J. (2011) Guest editorial. Computers
and Operations Research 39(4), 751–752; Wu, D., Olson, D.L. and Birge,
Notes 13
J. Introduction to special issue on enterprise risk management in operations.
International Journal of Production Economics 134(1); Wu, D., Fang, S.-C.,
Olson, D.L. and Birge, J.R. (2012) Introduction to the special issue on
optimizing risk management in services. Optimization 61(10–12), 1175–1177;
Wu, D.D. and Olson, D.L. (2013) Computational simulation and risk analysis:
An introduction of state of the art research.Mathematical & Computer
Modelling 58, 1581–1587; Wu, D.D., Chen, S.-H. and Olson, D.L. (2014)
Business intelligence in risk management: Some recent progresses. Information
Sciences 256(20), 1–7.
29. Aqlan, F. and Lam, S.S. (2015). Supply chain risk modelling and mitigation.
International Journal of Production Research 53(18), 5640–5656.
30. Ting, S.L., Tse, Y.K., Ho, G.T.S., Chung, S.H. and Pang, G. (2014). Mining
logistics data to assure the quality in a sustainable food supply chain: A case in
the red wine industry. International Journal of Production Economics
152, 200–209.
31. Cucchiella, F. and Gastaldi, M. (2006). Risk management in supply chain: A
real option approach, Journal of Manufacturing Technology Management 17:6,
700–720.
32. Chopra, S. and Sodhi, M.S. (2004). Managing risk to avoid supply-chain
breakdown, MIT Sloan Management Review 46:1, 53–61.
33. Wu, T., Blackhurst, J. and Chidambaram, V. (2006). A model for inbound
supply risk analysis. Computers in Industry 57, 350–365. et al. (2006), op cit.
34. Cucchiella and Gastaldi (2006), op cit.
35. Blackhurst, J.V., Scheibe, K.P. and Johnson, D.J. (2008). Supplier risk assess-
ment and monitoring for the automotive industry. International Journal of
Physical Distribution & Logistics Management 38:2, 143–165.
36. Manuj, I. and Mentzer, J.T. (2008). Global supply chain risk management,
Journal of Business Logistics 29:1, 133–155.
37. Wagner, S.M. and Bode, C. (2008). An empirical examination of supply chain
performance along several dimensions of risk, Journal of Business Logistics
29:1, 307–325.
38. Lavastre, O., Gunasekaran, A. and Spalanzani, A. (2014). Effect of firm
characteristics, supplier relationships and techniques used on supply chain risk
management (SCRM): An empirical investigation on French industrial firms.
International Journal of Production Research 52(11), 3381–3403.
39. Cucchiella and Gastaldi (2006), op cit.
40. Hallikas, J., Karvonen, I., Pulkkinen, U., Virolainen, V.-M. and Tuominen,
M. (2004). Risk management processes in supplier networks, International
Journal of Production Economics 90:1, 47–58; Khan and Burnes (2007), op
cit.; Autry, C.W. and Bobbitt, L.M. (2008). Supply chain security orientation:
Conceptual development and a proposed framework, International Journal of
Logistics Management 19:1, 42–64; Manuj and Mentzer (2008), op cit.
41. Kleindorfer and Saad (2005), op cit.
42. Chopra and Sodhi (2004), op cit.
14 1 Enterprise Risk Management in Supply Chains
43. Kahn, O. and Burnes, B. (2007). Risk and supply chain management: Creating a
research agenda. International Journal of Logistics Management 18(2):
197–216.
44. Wagner and Bodhi (2008), op cit.
45. Manuj and Mentzer (2008), op cit.
46. Oke, A., Gopalakrishnan, M. 2009. Managing Disruptions in Supply Chains: A
Case Study of a Retail Supply Chain. International Journal of Production
Economics 118(1); 168–174.
47. Chopra and Sodhi (2004), op cit.
48. Talluri, S., Kull, T.J., Yildiz, H. and Yoon, J. (2013) Assessing the efficiency of
risk mitigation strategies in supply chains. Journal of Business Logistics 34(4),
253–269.
49. Tang, C.S. (2006). Robust strategies for mitigating supply chain disruptions,
International Journal of Logistics: Research and Applications 9:1, 33–45.
50. Cucchiella and Gastaldi (2006), op cit.
51. Ritchie and Brindley (2007a), op cit.
Notes 15
Risk Matrices 2
There is no doubt that risk management is an important and growing area in this
uncertain world. Chapter 1 discussed a number of recent events where events made
doing business highly challenging. Globalization offers many opportunities, but it
also means less control, operating in a wider world where the actions of others
intersect with our own. This chapter looks at enterprise risk management process,
focusing on means to assess risks.
The Committee of Sponsoring Organizations of the Treadway Commission
(COSO) is an accounting organization concerned with enterprise risk management
(ERM). They define ERM as a process designed to identify potential events that may
affect the organization, and manage risk to be within that organization’s risk appetite
in order to provide reasonable assurance of accomplishing the organization’s
objectives.1 Risk identification and mitigation are a key component of an
organization’s ERM program. Table 2.1 outlines this risk framework.
Table 2.1 is compatible with the overall risk management framework we gave in
Chap. 1:
• Risk identification
• Risk assessment and evaluation
• Selection of risk management strategy
• Implementation
• Risk monitoring/mitigation
Risk Management Process
An important step is to set the risk appetite for the organization. No organization
can avoid risk nor should they insure against every risk. Organizations exist to take
on risks in areas where they have developed the capability to cope with risk.
However, they cannot cope with every risk, so top management needs to identify
# Springer-Verlag GmbH Germany, part of Springer Nature 2020
D. L. Olson, D. Wu, Enterprise Risk Management Models, Springer Texts in
Business and Economics, https://doi.org/10.1007/978-3-662-60608-7_2
17
the risks they expect to face, and to identify those risks that they are willing to
assume (and profit from successfully coping).
The risk identification process needs to consider risks of all kinds. Typically,
organizations can expect to encounter risks of the following types:
• Strategic risk
• Operations risk
• Legal risk
• Credit risk
• Market risk
Examples of these risks are outlined in Table 2.2.
Each manager should be responsible for ongoing risk identification and control
within their area of responsibility. Once risks are identified, a risk matrix can be
developed. Risk matrices will be explained in the next section. The risk manage-
ment process is the control aspect of those risks that are identified. The adequacy of
this process depends on assigning appropriate responsibilities by role for implemen-
tation. Effectiveness can be monitored by a risk-screening committee at a high level
within the organization that monitors new significant markets and products. The risk
review process includes a systematic internal audit, often outsourced to third-party
providers responsible for ensuring that the enterprise risk management structure
functions as designed. One tool to aid in risk assessment and evaluation is a risk
matrix.
Risk Matrices
A risk matrix provides a two-dimensional (or higher) picture of risk, either for firm
departments, products, projects, or other items of interest. It is intended to provide a
means to better estimate the probability of success or failure, and identify those
Table 2.1 COSO risk management framework
Concept Elaboration
Mission, strategy, and
objectives
What are the organization’s mission, strategy, and objectives?
Risks What are the significant risks?
Risk appetite What is the organization willing to tolerate?
Likelihood What is the likelihood of the risk occurring?
(How can you measure?)
Impacts What is the potential impact of the risk?
Risk mitigation What are available defense strategies?
Residual risk What is the risk remaining (beyond control)?
Risk response and
effectiveness
How effectively does the organization manage its individual
risks?
Risk maturity How robust is the current ERM program?
18 2 Risk Matrices
activities that would call for greater control. One example might be for product lines,
as shown in Table 2.3.
The risk matrix is meant to be a tool revealing the distribution of risk across a
firm’s portfolio of products, projects, or activities, and assigning responsibilities or
mitigation activities. In Table 2.3, hedging activities might include paying for
insurance, or in the case of investments, using short-sale activities. Internal controls
would call for extra managerial effort to quickly identify adverse events, and take
action (at some cost) to provide greater assurance of acceptable outcomes. Risk
matrices can represent continuous scales. For instance, a risk matrix focusing on
product innovation was presented by Day.2 Many organizations need to have an
ongoing portfolio of products. The more experience the firm has in a particular
product type, the greater the probability of product success. Similarly, the more
experience the firm has in the product’s intended market, the greater the probability
of product success. By obtaining measures based on expert product manager
Table 2.2 Enterprise risk management framework
Strategic
risks
Is there a formal process to identify potential changes in markets, economic
conditions, regulations, and demographic change impacts on the business?
Is new product innovation considered for both short- and long-run impact?
Does the firm’s product line cover the customer’s entire financial services
experience?
Is research and development investment adequate to keep up with competitor
product development?
Are sufficient controls in place to satisfy regulatory audits and their impact on
stock price?
Operations
risks
Does the firm train and encourage use of rational decision-making models?
Is there a master list of vendor relationships, with assurance each provides value?
Is there adequate segregation of duties?
Are there adequate cash and marketable securities controls?
Are financial models documented and tested?
Is there a documented strategic plan to technology expenditures?
Legal risks Are patent requirements audited to avoid competitor abuse as well as litigation?
Is there an inventory of legal agreements and auditing of compliance?
Do legal agreements include protection of customer privacy?
Are there disturbing litigation patterns?
Is action taken to assure product quality sufficient to avoid class action suits and
loss of reputation?
Credit risks Are key statistics monitoring credit trends sufficient?
How are settlement risks managed?
Is their sufficient collateral to avoid deterioration of value?
Is the incentive compensation program adequately rewarding loan portfolio
profitability rather than volume?
Is exposure to foreign entities monitored, as well as domestic entity exposure to
foreign entities?
Market risks Is there a documented funding plan for outstanding lines?
Are asset/liability management model assumptions analyzed?
Is there a contingency funding plan for extreme events?
Are core deposits analyzed for price and cash flow?
Risk Matrices 19
evaluation of both scales, historical data can be used to calibrate prediction of
product success. Scaled measures for product/technology risk could be based on
expert product manager evaluations as demonstrated in Table 2.4 for a proposed
product, with higher scores associated with less attractive risk positions.
Table 2.5 demonstrates the development of risk assessment of the intended
market.
Table 2.4 Product/technology risk assessment
1—Fully
experienced 2
3—
Significant
change 4
5—No
experience Score
Current development
capability
X 3
Technological competency X 2
Intellectual property
protection
X 4
Manufacturing and service
delivery system
X 1
Required knowledge X 3
Necessary service X 2
Expected quality X 3
Total 18
Table 2.5 Product/technology failure risk assessment
1—Same as
present 2
3—
Significant
change 4
5—Completely
different Score
Customer behavior X 4
Distribution and sales X 3
Competition X 5
Brand promise X 5
Current customer
relationships
X 5
Knowledge of
competitor behavior
X 4
Total 26
Table 2.3 Product risk matrix
Likelihood of risk
low
Likelihood of risk
medium
Likelihood of risk
high
Level of risk high Hedge Avoid Avoid
Level of risk
medium
Control internally Hedge Hedge
Level of risk low Accept Control internally Control internally
20 2 Risk Matrices
Table 2.6 combines these scales, with risk assessment probabilities that should be
developed by expert product managers based on historical data to the degree
possible.
In Table 2.6, the combination of technology risk score of 18 with product failure
risk score 26 is in bold, indicating a risk probability assessment of 0.30.
Color Matrices
Risk matrices have been applied in many contexts. McIlwain3 cited the application
of clinical risk management in the UK arising from the National Health Service
Litigation Authority creation in April 1995. This triggered systematic analysis of
incident reporting on a frequency/severity grid comparing likelihood and conse-
quence. Traffic light colors are often used to categorize risks into three (or more)
categories, quickly identifying combinations of frequency and consequence calling
for the greatest attention. Table 2.7 demonstrates the use of a risk matrix that could
be based on historical data, with green assigned to a proportion of cases with serious
incident rates below some threshold (say 0.01), red for high proportions (say 0.10 or
greater), and amber in between.
While risk matrices have proven useful, they can be misused as can any tool. Cox4
provided a critique of some of the many risk matrices in use. Positive examples were
shown from the Federal Highway Administration for civil engineering administration
(Table 2.8), and the Federal Aviation Administration applied to airport operation safety.
The Federal Aviation Administration risk matrix was quite similar, but used
qualitative terms for the likelihood categories (frequent, probable, remote, extremely
remote, and extremely improbable) and severity categories (no safety effect, minor,
major, hazardous, and catastrophic).
There have been many criticisms of color risk matrices, focusing on the following
issues:
• Inconsistency often found between risk matrices and quantitative measures (the
column and row cutoffs are essentially arbitrary).
Table 2.6 Innovation product risk matrix—expert success probability assessments
Failure
<10
Failure
10–15
Failure
15–20
Failure
20–25
Failure
25–30
Technology
30–35
0.50 0.40 0.30 0.15 0.01
Technology
25–30
0.65 0.50 0.45 0.30 0.05
Technology
20–25
0.75 0.60 0.55 0.45 0.20
Technology
15–20
0.80 0.70 0.65 0.55 0.30
Technology
10–15
0.90 0.85 0.80 0.65 0.45
Technology <10 0.95 0.90 0.85 0.70 0.60
Color Matrices 21
• Subjective classification in color matrices.
• Scaling of categories—Levine suggested that scales in risk matrices are often
more appropriately logarithmically scaled rather than linear.5
• Limited resolution often resulting in risk ties.
• Use of a matrix across an organization, often in different contexts.
Some problems arise because inevitably different risk assessors will assign
different ratings to the same hazard. It has been found that even after lengthy
reflection, a great degree of scatter remains, due to fundamentally different beliefs
and world views.6
Cox identified some characteristics that should be present in risk matrices:
1. Under weak consistency conditions, no red cell should share an edge with a
green cell.
2. No red cell can occur in the left column or in the bottom row.
3. A line from a green cell to a red cell must pass through a yellow cell.
4. There must be at least three colors.
5. Too many colors give spurious resolution.
Table 2.7 Risk matrix of medical events
Consequence
insignificant
Consequence
minor
Consequence
moderate
Consequence
major
Consequence
catastrophic
Likelihood
almost
certain
Amber Red Red Red Red
Likelihood
likely
Green Amber Red Red Red
Likelihood
possible
Green Amber Amber Amber Red
Likelihood
unlikely
Green Green Amber Amber Red
Likelihood
rare
Green Green Green Amber Amber
Table 2.8 Risk matrix for Federal Highway Administration (2006)
Very low
impact
Low
impact
Medium
impact
High
impact
Very high
impact
Very high
probability
Green Yellow Red Red Red
High probability Green Yellow Red Red Red
Medium
probability
Green Green Yellow Red Red
Low probability Green Green Yellow Red Red
Very low
probability
Green Green Green Yellow Red
Extracted from Cox (2008)4
22 2 Risk Matrices
Note that Table 2.8 violated characteristics 2 and 3.
Cox argued that risk ratings do not necessarily support good resource allocation
decisions. This is due to the inherently subjective categorization of uncertain
consequences. Thus Cox argues that theoretical results he presented demonstrate
that quantitative and semi-quantitative risk matrices (using numbers instead of
categories) cannot correctly reproduce risk ratings, especially if frequency and
severity are negatively correlated.
Quantitative Risk Assessment
It would be ideal to go deeper than risk matrices allow, to be able to identify costs
and benefits of risk actions. Risk matrices are simple and useful tools because most
of the time, detailed cost and probability data is not available. However, if such data
is available, more accurate risk assessment is possible.7
Risk can be characterized by the attributes of threat, vulnerability, and conse-
quence, each of which can be expressed in terms of probability. Each of these is
uncertain, and in fact these three aspects of risk may be correlated. A normative
argument is that if these measures are important but are not known, the organization
should invest in obtaining them. Levine demonstrated risk management of computer
network security with an example comparing different types of attack in terms of
frequency, consequence, and risk. Table 2.9 provides hypothetical data.
In Table 2.9, risk is defined as the product of frequency and consequence, a
common approach. The risk matrix in this case can overlay treatments with cells, as
in Table 2.10.
In this case, the most attention would be given to identity theft. The others either
are relatively low consequence (web vandalism) or relatively low frequency (cyber
espionage, denial of service). Looking at the quantitative scale of risk, a bit different
Table 2.9 Hypothetical computer network security data
Attack type Label Frequency Consequence Risk
Cyber espionage CE 102 per year $107 per event $109 per year
Denial of service DS 102 per year $106 per event $108 per year
Identity theft IT 104 per year $105 per event $109 per year
Web vandalism WV 103 per year $102 per event $105 per year
Table 2.10 Risk matrix for computer network security
Consequence
<$103/event
Consequence $103–
�$105/event
Consequence
�$106/event
Frequency >103 per year Green Amber IT Red
Frequency >102–103 per
year
Green WV Amber Amber
Frequency �102 per year Green Green Green CE DS
Quantitative Risk Assessment 23
outcome is obtained, with cyber espionage and identity theft both being very high,
closely followed by denial of service. Web vandalism is lower on this scale.
Generally, moving to a more quantitative metric is preferable, with the tradeoff of
requiring more data with accuracy an important factor.
To demonstrate, assume the context of a construction firm with a portfolio of ten
jobs, involving some risk to worker safety. The firm has a safety program that can be
applied to reduce some of these risks to varying degrees on each job. Cox addressed
four different levels of risk evaluation, depending upon the level of data available. The
risk matrices that we have been looking at require little quantitative data, although as
we have demonstrated in Table 2.6, they are more convincing if they are based on
quantitative input. Table 2.11 provides full raw data for the ten construction jobs.
In Table 2.11, column 2 is the potential liability due to injury in thousands of
dollars. Column 3 is the probability of an injury if no special safety improvement is
undertaken. Column 4 is the product of column 2 and column 3, the expected loss
without action. Column 5 is the proportion of the injury probability that can be
reduced by proposed action, which leads to savings in column 6 (the product of
column 4 and column 5). Column 7 is the amount of budget that would be needed to
reduce risk. Column 8 (RRPUC) is the risk reduction per unit cost.
Table 2.12 gives the risk matrix in categorical terms, using the dimensions of
probability of injury {below 0.19; 0.20–0.25; 0.26 and above) and liability risk
{below 399; 400–599; 600 and above).
For each combination of injury probability and liability risk has a mitigation
strategy assigned. Insurance is obtained in all cases (even for subcontracting).
Assigning extra safety personnel costs additional expense. Subcontracting sacrifices
Table 2.11 Hypothetical construction data
Job
Liability
risk (k$)
Prob
{injury}
(frequency)
Expected
loss (risk) Reducible
Savings
(k$)
Cost of
reducing RRPUC
1 250 0.30 75.0 0.7 52.50 25 2.100
2 300 0.20 60.0 0.5 30.00 20 1.500
3 320 0.15 48.0 0.6 28.80 25 1.152
4 340 0.20 68.0 0.3 20.40 15 1.360
5 370 0.11 40.7 0.5 20.35 20 1.018
6 410 0.18 73.8 0.6 44.28 25 1.771
7 440 0.33 145.2 0.4 58.08 20 2.904
8 460 0.25 115.0 0.7 80.50 30 2.683
9 480 0.20 96.0 0.5 48.00 20 2.400
10 530 0.08 42.4 0.4 16.96 18 0.942
Table 2.12 Hypothetical risk matrix
Liability risk low Liability risk medium Liability risk high
Prob{injury} high Assign safety Assign safety Subcontract
Prob{injury} medium Insurance only Assign safety Assign safety
Prob{injury} low Insurance only Insurance only Assign safety
24 2 Risk Matrices
quite a bit of expected profit, and thus is to be avoided except in extreme cases.
Table 2.12 demonstrates what Cox expressed as a limitation in that while the risk
matrix is quick and easy, it is a simplification that can be improved upon. Cox
suggested three indices, each requiring additional accurate inputs.
The first index is to use risk (the expected loss column in Table 2.11), the second
risk reduction (savings column in Table 2.11), the third the risk reduction per unit
cost (RRPUC column in Table 2.11). These would yield different rankings of which
jobs should receive the greatest attention. In all three cases, the contention is that
there is a risk reduction budget available to be applied, starting with the top-ranked
job and adding jobs until the budget is exhausted. Table 2.13 shows rankings and
budget required by job.
If there were a budget of $100k, using the risk ranking jobs 7, 8, 9, and 1 would be
given extra safety effort, as well as a 20% effort on job 6. With the risk reduction
index as well as the RRPUC index, a different order of selection would be applied,
here yielding the same set of jobs. For a budget of $150k, the risk index would
provide full treatment to job 6, add job 4, and 75% of job 2. The risk reduction index
would also provide full treatment to job 6, add job 2, and provide 40% coverage to
job 3. The RRPUC index also would again provide full treatment to job 6, add job
2, and 2/3rds coverage to job 4. The idea of all three indices is much the same, but
with more information provided. Table 2.14 shows the expected gains from these
two budget levels for each index.
Given a budget of $100k, the risk index would reduce expected losses by $58.08k
on job 7, $80.50k on job 8, $48k on job 9, $52.50k on job 1, and $8.856k on job 6, for
total risk reduction of $247.936k. As we saw, this was the same for all three indices.
But there is a difference given a budget of $150k. Here the risk index actually comes
out a bit higher than the risk reduction index, but Cox has run simulations showing that
Table 2.13 Ranking by index
Risk index
ranking
Budget
(k$)
Risk reduction index
ranking
Budget
(k$)
RRPUC
ranking
Budget
(k$)
Job 7 20 Job 8 30 Job 7 20
Job 8 30 Job 7 20 Job 8 30
Job 9 20 Job 1 25 Job 9 20
Job 1 25 Job 9 20 Job 1 25
Job 6 25 Job 6 25 Job 6 25
Job 4 15 Job 2 20 Job 2 20
Job 2 20 Job 3 25 Job 4 15
Job 3 25 Job 4 15 Job 3 25
Job 10 18 Job 5 20 Job 5 20
Job 5 20 Job 10 18 Job 10 18
Table 2.14 Risk reductions achieved by index
Budget Risk index Risk reduction index RRPUC
$100k 247.936 247.936 247.936
$150k 326.260 324.880 326.961
Quantitative Risk Assessment 25
risk reduction should provide a bit better performance. The RRPUC has to be at least
as good as the other two, as its basis is the sorting key. The primary point is that there
are ways to incorporate more complete information into risk management. The
tradeoff is between the availability of information and accuracy of output.
Strategy/Risk Matrix
Risk matrices can be applied to capture the essence of tradeoffs in risk and other
measures of value. In this case, we apply a risk matrix to a construction industry
study where the original authors applied an analytic hierarchy model.8 The model is
relatively straightforward. The construction context included a number of types of
work, each with a relative rating of supply risk along with a similar weighting of
strategic impact. Data is given in Table 2.15.
Figure 2.1 displays a scatter diagram of this data.
Table 2.15 Construction
work risk and impact
Type Supply risk Strategic impact
Cement 0.05 0.34
Workforce 0.09 0.40
Aggregate 0.11 0.58
Transport 0.12 0.18
Demolition 0.12 0.38
Painting 0.15 0.25
Misc. 0.15 0.28
Steel 0.15 0.65
Insulation 0.16 0.18
Travel 0.17 0.29
Cast iron 0.18 0.23
Excavation 0.20 0.26
Locksmith 0.21 0.36
Floor cover 0.22 0.23
Infrastructure 0.23 0.58
Sanitary 0.23 0.70
Ceilings 0.25 0.24
Geotechnical 0.25 0.29
Electrical 0.25 0.57
Climate 0.26 0.34
Aluminum 0.31 0.24
Formwork 0.31 0.31
Concrete 0.46 0.92
Mosaic 0.51 0.26
Carpentry 0.54 0.24
Special forming 0.56 0.31
Stone 0.59 0.24
Scaffolding 0.62 0.29
26 2 Risk Matrices
Construction contexts could differ widely, but we will assume an operation where
the greatest profit is expected from conducting operations normally. Risk can be
reduced by spending extra money in the form of added inspection and safety
supervisors, but this would eat into profit. The least profit would be expected from
an option to outsource construction, placing the risk on subcontractors. The criteria
can be sorted in a risk matrix considering both dimensions, as in Table 2.16.
In this case, this policy would result in outsourcing (subcontracting) concrete
work, which has a supply risk rating of 0.46 and a very high strategic impact of 0.92.
Added risk control would be adopted for ten other types of work: aggregate, steel,
infrastructure, sanitary, electrical, mosaic, carpentry, special forming and scaffold-
ing, and stone.
Cement
0.4
Aggregate
0.18
Demolition
0.250.28
Steel
Insulation
0.29
0.230.26
Locksmith
0.23
0.58
Sanitary
0.24
0.29
Electrical
Climate
Aluminum
Formwork
Concrete
0.26Carpentry
Forming
Stone
Scaffolding
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7
St
ra
te
gi
c
im
pa
ct
Supply risk
Strategic Impact vs. Supply Risk
Fig. 2.1 Strategic impact plotted against supply risk
Table 2.16 Risk matrix of risk/strategic impact trade-off
Supply risk
�0.2
Supply risk >0.2
to �0.5
Supply risk >0.5
to �0.8
Supply risk
>0.8
Strategic impact
>0.8
Add risk
control
Outsource Outsource Outsource
Strategic impact
>0.5 to �0.8
Add risk
control
Add risk control Outsource Outsource
Strategic impact
>0.2 to �0.5
Normal
operation
Normal operation Add risk control Outsource
Strategic impact
�0.2
Normal
operation
Normal operation Normal operation Add risk
control
Strategy/Risk Matrix 27
Risk Adjusted Loss
It is better to be quantitative than qualitative—but the problem is that data is not
always available. But Monat and Doremus9 have presented a risk-adjusted index
approach with the following steps:
• Identify risks
• Assign quantitative values for probability and dollar impact to each risk
(subjective)
• Estimate the organization’s or individual’s risk tolerance using rule-of-thumb
• Calculate Risk-Adjusted Loss (RAL formula below)
• Prioritize risks from highest RAL to lowest
RAL ¼ Probability � Impact
� 1 þ 1 � Probabilityð Þ � Impact= 2 � Risk Toleranceð Þ½ �
Monat and Doremus include variance in the above formulation. RAL essentially
adds a risk factor to expected value based on their formulation of variance and risk
aversion. Risk tolerance tries to reflect the organization’s ability to absorb risk. The
larger the organization, the greater their ability to absorb risk. A rule-of-thumb for
risk-averse companies would be to multiply net income by 1.24 (there are other rule-
of-thumbs). To demonstrate, consider Table 2.7 redone in terms of assessment of
impact and probability in Table 2.17, showing expected losses as P � I.
This approach could make it easier to set the color limits. For instance, expected
loss above $450,000 might call for red, below $60,000 green, and in between amber.
This would vary a bit from the verbal limits given in Table 2.7, where the P ¼ 0.95
Impact¼Insignificant was assigned amber classification, but in Table 2.17 you can
see that very little expected loss was expected. The same for P ¼ 0.01 Impact Major.
The red categories were similar except that P ¼ 0.95 Impact Minor was here
classified as Amber, as was P ¼ 0.7 Impact Moderate, while they were red in
Table 2.17 Table of expected losses
Impact
insignificant
10,000
Impact
minor
100,000
Impact
moderate
500,000
Impact
major
1,000,000
Impact
catastrophic
10,000,000
Probability
0.95
9500 95,000 475,000 950,000 9,500,000
Probability
0.7
7000 70,000 350,000 700,000 7,000,000
Probability
0.4
4000 40,000 200,000 400,000 4,000,000
Probability
0.2
2000 20,000 100,000 200,000 2,000,000
Probability
0.01
100 1000 5000 10,000 100,000
28 2 Risk Matrices
Table 2.17. With expected losses, it is less likely to get inversions of categories
(although just because you quantify an estimate does not mean that you have
removed all subjectivity). To apply the formula, assume an organization with net
income of 1,000,000 per year, making RT ¼ 1,240,000. Table 2.18 gives the risk-
adjusted losses for the expected losses in Table 2.17.
The formula seems to have an anomaly for high P and high I, with an inversion.
This occurs because the high impact value of 10,000,000 overwhelms the RT of
1,240,000, making the latter component of the formula negative. Thus there is an
interesting phenomenon in the formula for high P and high I, but in reality, such
cases would easily be considered high risk, and firms should be wary of taking on
risks greater than twice their annual income. Further, the formula yields drastic
increases over expected loss when Impact is 10,000,000. Not only is the inversion
there for high probability, the extreme low probability outcome turns red (which
might be appropriate for catastrophic loss).
Monat and Doremus also suggest using their formula to rank order new risks. For
a new case with an estimated probability of 0.65 and estimated impact of
$4,000,000, the RAI would be 2,884,375, definitely in the red zone. If a portfolio
of five new projects were being considered with the estimates given in Table 2.19
(along with the RT of 1,240,000 used above), the RAI could provide a basis for
ranking relative risks.
Table 2.18 Table of RAI
Impact
insignificant
10,000
Impact
minor
100,000
Impact
moderate
500,000
Impact
major
1,000,000
Impact
catastrophic
10,000,000
Probability
0.95
9502 95,192 479,788 969,153 11,415,323?
Probability
0.7
7008 70,847 371,169 784,677 15,467,742
Probability
0.4
4010 40,968 224,194 496,774 13,677,419
Probability
0.2
2006 20,645 116,129 264,516 8,451,613
Probability
0.01
100 1040 5998 13,992 499,194
Table 2.19 New cases
Probability Impact Expected loss RAI Rank
0.65 4,000,000 2,600,000 4,067,742 3
0.15 6,000,000 900,000 2,750,806 4
0.25 8,000,000 2,000,000 6,838,710 1
0.40 5,000,000 2,000,000 4,419,355 2
0.90 1,000,000 900,000 936,290 5
Risk Adjusted Loss 29
Note that the expected loss for cases 4 and 5 were the same, but the RAI is much
greater for case 3, which ranked highest in risk of the five cases. Based on expected
loss, case 1 was the riskiest. Based on RAI, cases 3 and 4 are both rated riskier than
case 1. Consideration of risk aversion is a valid approach, but does require some
assumptions just as any quantitative model.
Conclusions
The study of risk management has grown in the last decade in response to serious
incidences threatening trust in business operations. The field is evolving, but the first
step is generally considered to be application of a systematic process, beginning with
consideration of the organization’s risk appetite. Then risks facing the organization
need to be identified, controls generated, and review of the risk management process
along with historical documentation and records for improvement of the process.
Risk matrices are a means to consider the risk components of threat severity and
probability. They have been used in a number of contexts, basic applications of
which were reviewed. Cox and Levine provide useful critiques of the use of risk
matrices. That same author also suggested more accurate quantitative analytic tools.
An ideal approach would be to expend such measurement funds only if they enable
reducing overall cost. The interesting aspect is that we do not really know. Thus we
would argue that if you have accurate data (and it is usually worth measuring
whatever you can), you should get as close to this ideal as you can. Risk matrices
provide valuable initial tools when high levels of uncertainty are present. Quantita-
tive risk assessment in the form of indices as demonstrated would be preferred if data
to support it is available.
Notes
1. Prasad, S.B. (2011). A matrixed assessment. Internal Auditor 68(6), 63–64.
2. Day, G.S. (2007). Is it real? Can we win? Is it worth doing? Managing risk and
reward in an innovation portfolio, Harvard Business Review 85:12, 110–120.
3. McIlwain, J.C. (2006). A review: A decade of clinical risk management and risk
tools, Clinician in Management 14:4, 189–199.
4. Cox, L.A. Jr. (2008). What’s wrong with risk matrices? Risk Analysis 28:2,
497–512.
5. Levine, E.S. (2012). Improving risk matrices: The advantages of logarithmically
scaled axes. Journal of Risk Research 15(2), 209–222.
6. Ball, D.J. and Watt, J. (2013). Further thoughts on the utility of risk matrices.
Risk Analysis 33(11), 2068-2078.
7. Cox, L.A., Jr. (2012). Evaluating and improving risk formulas for allocating
limited budgets to expensive risk-reduction opportunities. Risk Analysis 32(7),
1244–1252.
30 2 Risk Matrices
8. Ferreira, L.M.D.F., Arantes, A. and Kharlamov, A.A. (2015). Development of a
purchasing portfolio model for the construction industry: An empirical study.
Production Planning & Control 26(5), 377–392.
9. Monat, J.P. and Doremus, S. (2018). An alternative to Heat Map Risk Matrices
for project risk prioritization. Journal of Modern Project Management May–Aug,
104–113.
Notes 31
Value-Focused Supply Chain Risk Analysis 3
A fundamental premise of Keeney’s book1 is that decision makers should not settle
for those alternatives that are thrust upon them. The conventional solution process
is to generate alternative solutions to a problem, and then focus on objectives. This
framework tends to suppose an environment where decision makers are powerless
to do anything but choose among given alternatives. It is suggested that a more
fruitful approach would be for decision makers to take more control over this
process, and use objectives to create alternatives, based on what the decision
makers would like to achieve, and why objectives are important.
Hierarchy Structuring
Structuring translates an initially ill-defined problem into a set of well-defined
elements, relations, and operations. This chapter is based on concepts presented in
Keeney, and in Olson.2
Before we discuss hierarchies and their structure, we should give some basic
definitions. Keeney and Raiffa3 gave the following definitions:
Objective—the preferred direction of movement on some measure of value
Attribute—a dimension of measurement
Keeney and Raiffa distinguish between utility models, based upon tradeoffs of
return and risk found in von Neumann-Morgenstern utility theory and the more
general value models allowing tradeoffs among any set of objectives and
sub-objectives. Preferential independence concerns whether the decision maker’s
preference among attainment levels on two criteria do not depend on changes in
other attribute levels. Attribute independence is a statistical concept measured by
correlation. Preferential independence is a property of the desires of the decision
maker, not the alternatives available.
# Springer-Verlag GmbH Germany, part of Springer Nature 2020
D. L. Olson, D. Wu, Enterprise Risk Management Models, Springer Texts in
Business and Economics, https://doi.org/10.1007/978-3-662-60608-7_3
33
The simplest hierarchy would involve VALUE as an objective with available
alternatives branching from this VALUE node. Hierarchies generally involve addi-
tional layers of objectives when the number of branches from any one node exceeds
some certain value. Cognitive psychology has found that people are poor at
assimilating large quantities of information about problems. Saaty used this concept
as a principle in analytic hierarchy development, calling for a maximum of from
seven branches in any one node in the analytic hierarchy process (AHP).4
Desirable characteristics of hierarchies given by chapter 2 of Keeney and Raiffa
(1976) include:
Completeness—objectives should span all issues of concern to the decision maker,
and attributes should indicate the degree to which each objective is met.
Operability—available alternatives should be characterized in an effective way.
Decomposability—preferential and certainty independence assumptions should be
met
Lack of Redundancy—there should not be overlapping measures
Size—the hierarchy should include the minimum number of elements necessary.
Keeney and Saaty both suggest starting with identification of the overall funda-
mental objective. In the past, business leaders would focus on profit. Keeney stated
that the overall objective can be the combination of more specific fundamental
objectives, such as minimizing costs, minimizing detrimental health impacts, and
minimizing negative environmental impacts. For each fundamental objective,
Keeney suggested the question, “Is it important?”
Subordinate to fundamental objectives are means objectives—ways to accom-
plish the fundamental objectives. Means objectives should be mutually exclusive
and collectively exhaustive with respect to fundamental objectives. When asked
“Why is it important?”, means objectives would be those objectives for which a clear
reason relative to fundamental objectives appears. If no clear reason other than “It
just is” appear, the objective probably should be a fundamental objective. Available
alternatives are the bottom level of the hierarchy, measured on all objectives
immediately superior. If alternative performance on an objective is not measurable,
Keeney suggests dropping that objective. Value judgments are required for funda-
mental objectives, and judgments about facts required for means-ends objectives
(Fig. 3.1):
Decision makers should not settle for those alternatives that are thrust upon them.
The conventional solution process is to generate alternative solutions to a problem,
and then focus on objectives. This framework tends to suppose an environment
where decision makers are powerless to do anything but choose among given
alternatives. It is suggested that a more fruitful approach would be for decision
makers to use objectives to create alternatives, based on what the decision makers
would like to achieve, and why objectives are important.
34 3 Value-Focused Supply Chain Risk Analysis
Hierarchy Development Process
Hierarchies can be developed in two basic manners: top-down or bottom-up. The
most natural approach is to start at the top, identifying the decision maker’s
fundamental objective, and developing subelements of value, proceeding downward
until all measures of value are included (weeding out redundancies and
measures that do not discriminate among available alternatives). At the bottom of
the hierarchy, available alternatives can be added. It is at this stage that new and
better alternatives are appropriate to consider. The top-down approach includes the
following phases:5
1. Ask for overall values
2. Explain the meanings of initial value categories and interrelationships
WHAT IS MEANT by this value?
WHY IS THIS VALUE IMPORTANT?
HOW DO AVAILABLE OPTIONS AFFECT attaining this value?
3. Get a list of concerns—as yet unstructured
The aim of this approach is to gain as wide a spectrum of values as possible. Once
they are attained, then the process of weeding and combining can begin.
The value-focused approach has been applied to supply chain risk identification.6
Here we will present our view of value-focused analysis to a representative supply
chain risk situation. We hypothesize a supply chain participant considering location
of a plant to produce products for a multinational retailer. We can start looking for
overall values, using the input from published sources given in Table 3.1. The first
focus is on the purpose of the business—the product. Product characteristics of
importance include its quality, meeting specifications, cost, and delivery. In today’s
business environment, we argue that service is part of the product. We represent that
in our hierarchy with the concept of manufacturability and deliverability to
consumer (which reflects life cycle value to the customer). The operation of the
supply chain is considered next, under the phrase “management,” which reflects the
Fig. 3.1 Value hierarchy framework
Hierarchy Structuring 35
ability of the supply chain to communicate, and to be agile in response to changes.
There are also external risks, which we cluster into the three areas of political
(regulation, as well as war and terrorism), economic (overall economic climate as
well as the behavior of the specific market being served), and natural disaster. Each
of these hierarchical elements can then be used to identify specific risks for a given
supply chain situation. We use those identified in Table 3.1 to develop a value
hierarchy.
Table 3.1 Value hierarchy for supply chain risk
Top Level Second Level Third Level
Product Quality
Cost Price
Investment required
Holding cost/service level tradeoff
On-time delivery
Service Manufacturability Outsourcing opportunity cost/risk tradeoff
Ability to expand production
New technology breakthroughs
Product obsolescence
Deliverability Transportation system
Insurance cost
Management Communication IS breakdown
Distorted information leading to bullwhip
effect
Forecast accuracy
Integration
Viruses/bugs/hackers
Flexibility Agility of sources
Ability to replace sources as needed
Safety Plant disaster
Labor Risk of strikes, disputes
Political Government Customs and regulations
War and Terrorism
Economic Overall economy Economic downturn
Exchange rate risk
Specific regional
economy
Labor cost influence
Changes in competitive advantage
Specific market Price fluctuation
Customer demand volatility
Customer payment
Natural
disaster
Uncontrollable disaster
Diseases, epidemics
36 3 Value-Focused Supply Chain Risk Analysis
The next step in multiple attribute analysis is to generate the alternatives. There
are a number of decisions that might be made, to include vendor selection, plant
siting, information system selection, or the decision to enter specific markets by
region or country. For some of these, there may be binary decisions (enter a
country’s market or not), or there might be a number of variants (including different
degrees of entering a specific market). In vendor selection and in plant siting, there
may be very many alternatives. Usually, multiple attribute analysis focuses on two to
seven alternatives that are selected as most appropriate through some screening
process. Part of the benefit of value analysis is that better alternatives may be
designed as part of the hierarchical development, seeking better solutions
performing well on all features.
Suggestions for Cases Where Preferential Independence Is Absent
If an independence assumption is found to be inappropriate, either a fundamental
objective has been overlooked or means objectives are beings used as fundamental
objectives. Therefore, identification of the absence of independence should lead to
greater understanding of the decision maker’s fundamental objectives.
Multiattribute Analysis
The next step of the process is to conduct multiattribute analysis. There are a
number of techniques that can be applied.7 Multiattribute utility theory (MAUT)
can be supported by software products such as Logical Decision, which are usually
applied in more thorough and precise analyses. The simple multiattribute rating
theory (SMART)8 can be used with spreadsheet support, and is usually the easiest
method to use. Analytic hierarchy process can also be applied, as was the case in all
of the cases applying multiple objective analysis. Expert Choice software is avail-
able, but allows only seven branches, so is a bit more restrictive than MAUT, and
much more restrictive than SMART. Furthermore, the number of pairwise
comparisons required in AHP grows enormously with the number of branches.
Still, users often are willing to apply AHP and feel confident in its results.9 Here
we will demonstrate using SMART for a decision involving site selection of a plant
within a supply chain.
The SMART Technique
Edwards proposed a ten step technique. Some of these steps include the process of
identifying objectives and organization of these objectives into a hierarchy.
Guidelines concerning the pruning of these objectives to a reasonable number
were provided.
The SMART Technique 37
Step 1: Identify the person or organization whose utilities are to be
maximized Edwards argued that MAUT could be applied to public decisions in
the same manner as was proposed for individual decision making.
Step 2: Identify the issue or issues Utility depends on the context and purpose of
the decision.
Step 3: Identify the alternatives to be evaluated This step would identify the
outcomes of possible actions, a data gathering process.
Step 4: Identify the relevant dimensions of value for evaluation
of the alternatives It is important to limit the dimensions of value to those that
are important for this particular decision. This can be accomplished by restating and
combining goals, or by omitting less important goals. Edwards argued that it was not
necessary to have a complete list of goals. If the weight for a particular goal is quite
low, that goal need not be included. There is no precise range of goals for all
decisions. However, eight goals was considered sufficiently large for most cases,
and fifteen too many.
Step 5: Rank the dimensions in order of importance For decisions made by one
person, this step is fairly straightforward. Ranking is a decision task that is easier
than developing weights, for instance. This task is usually more difficult in group
environments. However, groups including diverse opinions can lead to a more
thorough analysis of relative importance, as all sides of the issue are more likely to
be voiced. An initial discussion could provide all group members with a common
information base. This could be followed by identification of individual judgments
of relative ranking.
Step 6: Rate dimensions in importance, preserving ratios The least important
dimension would be assigned an importance of 10. The next-least-important dimen-
sion is assigned a number reflecting the ratio of relative importance to the
least important dimension. This process is continued, checking implied ratios as
each new judgment is made. Since this requires a growing number of comparisons,
there is a very practical need to limit the number of dimensions (objectives).
Edwards expected that different individuals in the group would have different
relative ratings.
Step 7: Sum the importance weights, and divide each by the sum This step
allows normalization of the relative importances into weights summing to 1.0.
Step 8: Measure the location of each alternative being evaluated on each
dimension Dimensions were classified into the groups: subjective, partly subjec-
tive, and purely objective. For subjective dimensions, an expert in this field would
estimate the value of an alternative on a 0–100 scale, with 0 as the minimum
plausible value and 100 the maximum plausible value. For partly subjective
38 3 Value-Focused Supply Chain Risk Analysis
dimensions, objective measures exist, but attainment values for specific alternatives
must be estimated. Purely objective dimensions can be measured. Raiffa advocated
identification of utility curves by dimension.10 Edwards proposed the simpler expe-
dient of connecting the maximum plausible and minimum plausible values with a
straight line.11 It was argued that the straight line approach would provide an
acceptably accurate approximation.
Step 9: Calculate utilities for alternatives Uj ¼ Σk wk ujk where Uj is the utility
value for alternative j, wk is the normalized weight for objective k, and ujk is the
scaled value for alternative j on dimension k. Σk wk ¼ 1. The wk values were
obtained from Step 7 and the ujk values were generated in Step 8.
Step 10: Decide If a single alternative is to be selected, select the alternative with
maximum Uj. If a budget constraint existed, rank order alternatives in the order of
Uj/Cj where Cj is the cost of alternative j. Then alternatives are selected in order of
highest ratio first until the budget is exhausted.
Plant Siting Decision
Assume that a supply chain vendor is considering sites for a new production facility.
Management has considered the factors that they feel are important in this decision
(the criteria):
• Acquisition and building cost
• Expected cost per unit
• Work force ability to produce quality product
• Work force propensity for labor dispute
• Transportation system reliability
• Expandability
• Agility to changes in demand
• Information system linkage
• Insurance structure
• Tax structure
• Governmental stability
• Risk of disaster
Each of these factors need to be measured in some way. If possible, objective
data would be preferred, but often subjective expert estimates are all that is
available. The alternatives need to be identified as well. There are an infinite
number of sites. But the number considered is always filtered down to a smaller
number. Here we will start with ten options. Each of them has estimates
performances on each of the twelve criteria listed (Table 3.2):
The SMART Technique 39
Each of the choices involves some tradeoff. With twelve criteria, it will be rare
that one alternative (of the final set of filtered choices) will dominate another,
meaning that it is at least as good or better on all criteria measures, and strictly
better on at least one criterion.
Each measure can now be assigned a value score on a 0–1 scale, with 0 being the
worst performance imaginable, and 1 being the best performance imaginable. This
reflects the decision maker’s perception, a subjective value. For our data (Table 3.3),
a possible set of values could be:
The SMART method now needs to identify relative weights for the importance of
each criterion in the opinion of the decision maker or decision making group. This
process begins by sorting the criteria by importance. One possible ranking:
• Work force ability to produce quality product
• Expected cost per unit
• Risk of disaster
• Agility to changes in demand
• Transportation system reliability
• Expandability
• Governmental stability
• Tax structure
Table 3.2 Plant siting data
Location A&B UnitC Quality Labor Trans Expand
Alabama $20 m $5.50 High Moderate 0.30 Good
Utah $23 m $5.60 High Good 0.28 Poor
Oregon $24 m $5.40 High Low 0.31 Moderate
Mexico $18 m $3.40 Moderate Moderate 0.25 Good
Crete $21 m $6.20 High Low 0.85 Poor
Indonesia $15 m $2.80 Moderate Moderate 0.70 Fair
Vietnam $12 m $2.50 Good Good 0.75 Good
India $13 m $3.00 Good Good 0.80 Good
China #1 $17 m $3.10 Good Good 0.60 Fair
China #2 $15 m $3.20 Good Good 0.55 Good
Location Agility IS link Insurance Tax Govt Disaster
Alabama 2 mos Very good $400 $1000 Very good Hurricane
Utah 3 mos Very good $350 $1200 Very good Drought
Oregon 1 mo Very good $450 $1500 Good Flood
Mexico 4 mos Good $300 $1800 Fair Quake
Crete 5 mos Good $600 $3500 Good Quake
Indonesia 3 mos Poor $700 $800 Fair Monsoon
Vietnam 2 mos Good $600 $700 Good Monsoon
India 3 mos Very good $700 $900 Very good Monsoon
China #1 2 mos Very good $800 $1200 Very good Quake
China #2 3 mos Very good $500 $1300 Very good Quake
40 3 Value-Focused Supply Chain Risk Analysis
• Insurance structure
• Acquisition and building cost
• Information system linkage
• Work force propensity for labor dispute
The SMART method proceeds by assigning the most important criterion a value
of 1.0, and then assessing relative importance by considering the proportional worth
of moving from the worst to the best on the most important criterion (quality) and
moving from the worst to the best on the criterion compared to it. For instance, the
decision maker might judge moving from the worst possible unit cost to the best
possible unit cost to be 0.8 as important as moving from the worst possible quality
to the best possible quality. We assume the following ratings based on this
procedure:
Criterion Rating Proportion
Work force ability to produce quality product Quality 1.00 0.167
Expected cost per unit UnitC 0.80 0.133
Risk of disaster Disaster 0.70 0.117
(continued)
Table 3.3 Standardized scores for plant siting data
Location A&B UnitC Quality Labor Trans Expand
Alabama 0.60 0.40 0.90 0.30 0.90 1.0
Utah 0.30 0.35 0.90 0.80 0.95 0
Oregon 0.10 0.45 0.90 0.10 0.86 0.5
Mexico 0.70 0.80 0.40 0.30 1.00 1.0
Crete 0.50 0.20 0.90 0.10 0.30 0
Indonesia 0.80 0.90 0.40 0.30 0.55 0.3
Vietnam 0.90 0.95 0.60 0.80 0.50 1.0
India 0.85 0.87 0.60 0.80 0.40 1.0
China #1 0.75 0.85 0.60 0.80 0.60 0.3
China #2 0.80 0.83 0.60 0.80 0.70 1.0
Location Agility IS link Insurance Tax Govt Disaster
Alabama 0.8 1.0 0.70 0.80 1.0 0.5
Utah 0.6 1.0 0.80 0.70 1.0 0.9
Oregon 1.0 1.0 0.60 0.60 0.8 0.8
Mexico 0.4 0.7 1.00 0.40 0.4 0.4
Crete 0.2 0.7 0.50 0.00 0.8 0.3
Indonesia 0.6 0 0.30 0.90 0.4 0.7
Vietnam 0.8 0.7 0.50 1.00 0.8 0.7
India 0.6 1.0 0.30 0.85 1.0 0.7
China #1 0.8 1.0 0.10 0.70 1.0 0.8
China #2 0.6 1.0 0.55 0.65 1.0 0.4
Note that for the Disaster criterion, specifics for each locale can lead to different ratings for the same
major risk category.
The SMART Technique 41
Agility to changes in demand Agility 0.65 0.108
Transportation system reliability Trans 0.60 0.100
Expandability Expand 0.58 0.097
Government stability Govt 0.40 0.067
Tax structure Tax 0.35 0.058
Insurance structure Insurance 0.32 0.053
Acquisition and building cost A&B 0.30 0.050
Information system linkage IS link 0.20 0.033
Work force propensity for labor dispute Labor 0.10 0.017
Proportion is obtained by dividing each rating by the sum of ratings (6.00).
Overall value for each alternative site can then be ranked by the sumproduct of
criterion relative importances times the matrix of scores on criteria.
Location A&B UnitC Quality Labor Trans Expand Agility
IS
link Insurance Tax Govt Disaster
weight 0.05 0.133 0.167 0.017 0.1 0.097 0.108 0.033 0.053 0.058 0.067 0.117
Alabama 0.6 0.4 0.9 0.3 0.9 1 0.8 1 0.7 0.8 1 0.5
Utah 0.3 0.35 0.9 0.8 0.95 0 0.6 1 0.8 0.7 1 0.9
Oregon 0.1 0.45 0.9 0.1 0.86 0.5 1 1 0.6 0.6 0.8 0.8
Mexico 0.7 0.8 0.4 0.3 1 1 0.4 0.7 1 0.4 0.4 0.4
Crete 0.5 0.2 0.9 0.1 0.3 0 0.2 0.7 0.5 0 0.8 0.3
Indonesia 0.8 0.9 0.4 0.3 0.55 0.3 0.6 0 0.3 0.9 0.4 0.7
Vietnam 0.9 0.95 0.6 0.8 0.5 1 0.8 0.7 0.5 1 0.8 0.7
India 0.85 0.87 0.6 0.8 0.4 1 0.6 1 0.3 0.85 1 0.7
China #1 0.75 0.85 0.6 0.8 0.6 0.3 0.8 1 0.1 0.7 1 0.8
China #2 0.8 0.83 0.6 0.8 0.7 1 0.6 1 0.55 0.65 1 0.4
This analysis ranks the alternatives as follows:
Rank Site Score
1 Vietnam 0.762
2 Alabama 0.754
3 India 0.721
4 China #2 0.710
5 Oregon 0.706
6 China #1 0.679
7 Utah 0.674
8 Mexico 0.626
9 Indonesia 0.557
10 Crete 0.394
This indicates a close result for Vietnam and Alabama, with the first seven sites all
reasonably close as well. There are a couple of approaches. More detailed
comparisons might be made between Vietnam and Alabama. Another approach is
42 3 Value-Focused Supply Chain Risk Analysis
to look at characteristics that these alternatives were rated low on, with the idea that
maybe the site’s characteristics could be improved.
Conclusions
Structuring of a value hierarchy is a relatively subjective activity, with a great deal of
possible latitude. It is good to have a complete hierarchy, including everything that
could be of importance to the decision maker. However, this yields unworkable
analyses. Hierarchies should focus on those criteria that are important in discrimi-
nating among available alternatives. The key to hierarchy structuring is to identify
those criteria that are most important to the decision maker, and that will help the
decision maker make the required choice.
This chapter presented the value-focused approach, and the SMART method.
These were demonstrated in the context of the supply chain risk management
decision of selecting a plant location for production of a component. The methods
apply for any decision involving multiple criteria.
Notes
1. Keeney, R.L. (1992). Value-Focused Thinking: A Path to Creative
Decisionmaking. Cambridge, MA: Harvard University Press.
2. Olson, D.L. (1996). Decision Aids for Selection Problems. New York: Springer.
3. Keeney, R.L. & Raiffa, H. (1976). Decisions with Multiple Objectives:
Preferences and Value Tradeoffs. New York: John Wiley & Sons.
4. Saaty, T.L. (1988). Decision Making for Leaders: The Analytic Hierarchy
Process for Decisions in a Complex World. Pittsburgh: RWS Publications.
5. Keeney, R.L., Renn, O. and von Winterfeldt, D. (1987). Structuring Germany’s
energy objectives, Energy Policy 15, 352–362.
6. Neiger, D., Rotaru, K and Churilov, L. (2009). Supply chain risk identification
with value-focused process engineering, Journal of Operations Management
27, 154–168.
7. Olson (1996), op cit.
8. Edwards, W. (1977). How to use multiattribute utility measurement for social
decisionmaking, IEEE Transactions on Systems, Man, and Cybernetics,
SMC-7:5, 326–340.
9. Olson, D.L., Moshkovich, H.M., Schellenberger, R. and Mechitov, A.I. (1995).
Consistency and Accuracy in Decision Aids: Experiments with Four
Multiattribute Systems, Decision Sciences 26:6, 723–749; Olson, D.L.,
Mechitov, A.I. and Moshkovich, H. (1998). Cognitive Effort and Learning
Features of Decision Aids: Review of Experiments, Journal of Decision Systems
7:2, 129–146.
10. Raiffa, H. (1968). Decision Analysis. Reading, MA: Addison-Wesley.
11. Edwards, W. (1977), op cit.
Notes 43
Examples of Supply Chain Decisions
Trading Off Criteria 4
In prior editions, we reviewed five cases of models trading off criteria, seeking to
demonstrate how multiple criteria models can be applied, along with value analysis
to seek improvement. Sometimes risk is dealt with directly. Other times it is implicit,
especially in cases involving environmental issues. In this third edition, we present
five more cases.
In the five cases to follow, we will try to demonstrate the kinds of trade-off
decisions often applied in practice. A number of different multiple criteria
methodologies were applied in the original papers. We demonstrate with the less
complex SMART methodology, which is not often published recently because
journal publication requires new approaches, and the SMART methodology is
well-known (and quite useful). You can refer to the original articles if you are
interested in the methodologies they specifically used. We try to use their data as
closely as possible.
Case 1: Zhu, Shah and Sarkis (2018)1
This paper dealt with identifying product lines in the beverage industry to delete
when faced with a downsizing situation, seeking lean and sustainable supply chain
organization. Companies often have extensive product portfolios, making it difficult
to be lean. The authors consider strategic impact, resource management, financial
performance, and stakeholder interest. They apply analytic hierarchy process and its
variant analytic network process, as well as benefit cost and risk analysis. The
alternatives were three product families. Product family A was a signature brand
with many loyal customers, making it difficult to make changes. Product family B
was a secondary line, a healthier version of product family A, and a substitute.
Product family C was an innovative product line facing less direct competition than
the other two product families.
The company had a mature supply chain and a reputation for high quality. They
considered nine product candidates to delete with the intent of focusing to a leaner
# Springer-Verlag GmbH Germany, part of Springer Nature 2020
D. L. Olson, D. Wu, Enterprise Risk Management Models, Springer Texts in
Business and Economics, https://doi.org/10.1007/978-3-662-60608-7_4
45
supply chain system. These alternatives consisted of plastic (product family A), glass
(product family B), or metal (product family C) containers for each of the three
product families.
The analysis applied analytic hierarchy process (AHP) to obtain relative weights
for the higher level criteria of product characteristics as well as impact on internal
and external operational factors. They then went on to holistically evaluate plastic,
glass, and metal variants of each of the three products (nine alternatives) using
analytic network processing, followed by benefit-cost ratio adjusted for opportunity
(adjusting benefits) and risk (adjusting costs). The three analyses looked at different
aspects of the decision. We will use their AHP study to compare with a value
analysis.
Product-specific decision characteristics included the three criteria of impact on
resources (IOR), impact on strategy (IOS), and impact on financial performance
(IOFP). Criteria relating to internal operations were competencies (CO), supply
chain operations activities (SCOA), and lean dimensions (LD). External environ-
mental characteristics involved environmental sustainability (ES) and external
shareholders (SH). Thus eight criteria were involved. These criteria can be rank
ordered as follows:
CO > ES > SCOA > SH > LD > IOS ¼ IOFP > IOR
Swing weighting for these criteria could be accomplished as in Table 4.1.
To make the sum equal 1.0, the last weight (IOR) was raised to 0.02 from the
calculated 0.02. The scores for the three options of product families A, B, and C
would need to be scored on all eight criteria. These are given in Table 4.2.
Here product family C won out, with product family A second. Thus the analysis
would recommend going with metal containers in place of plastic. These rankings
match what the source authors obtained from AHP.
Table 4.1 Product deletion case swing weighting
Criteria Code
From
max Weight
From
min Weight Compromise
Internal operations
competencies
CO 100 0.303 300 0.303 0.30
Environmental
sustainability
ES 70 0.212 220 0.222 0.22
Supply chain operations
activities
SCOA 55 0.167 170 0.172 0.17
External stakeholders SH 35 0.106 110 0.111 0.11
Lean dimensions LD 35 0.106 100 0.101 0.10
Impact on strategy IOS 15 0.045 40 0.040 0.04
Impact on financial
performance
IOFP 15 0.045 40 0.040 0.04
Impact on resources IOR 5 0.015 10 0.010 0.01
46 4 Examples of Supply Chain Decisions Trading Off Criteria
Value Analysis
Value analysis looks at relative strengths and weaknesses of each option. The score
matrix given in Table 4.2 provides a means to assess these. Product family C’s
relative strengths are in external stakeholders, internal operational competencies,
supply chain operations activities, and impact on strategy, while it is relatively weak
on environmental stability and impact on financial performance. Product family A is
strong on environmental stability, lean dimensions, financial performance, and
impact on resources, while weak on internal operations, supply chain operations,
and strategy impact. Product family B was not best on anything, while weakest with
respect to external stakeholder and resource impact.
Case 2: Liu, Eckert, Yannou-Le Bris, and Petit (2019)2
This case involves a larger dataset. Supplier selection is a widely popular supply
chain decision supported by multiple criteria models. Liu et al. (2019) modeled
sustainability balanced against economic value and social responsibility, in line with
the triple bottom line approach emphasized in Europe. They combined fuzzy input
into the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS)
and the analytic network process (ANP) to the task of ranking 12 types of farmers
and intermediate suppliers in a pork value chain in France. In that study, two
decision makers were involved, applying pairwise comparisons to the three triple
bottom line factors, as well as the three groups of subcriteria.
The 12 sources varied in feeding practices, dominant feed composition, size, and
horizontal or vertical storage. Twenty measures of environmental, economic, and
social (the triple bottom line) aspects were considered as displayed in Table 4.3.
Table 4.2 Product family scores on criteria
Criteria Code Weight
Prod.
family A
Prod.
family B
Prod.
family C
Internal operations
competencies
CO 0.30 0.2 0.6 0.8
Environmental
sustainability
ES 0.22 1 0.2 0.1
Supply chain operations
activities
SCOA 0.17 0.2 0.6 0.8
External stakeholders SH 0.11 0.6 0.2 1
Lean dimensions LD 0.10 1 0.5 0.5
Impact on strategy IOS 0.04 0.2 0.6 0.8
Impact on financial
performance
IOFP 0.04 1 0.7 0.3
Impact on resources IOR 0.02 1 0.2 0.4
Value score 0.556 0.450 0.634
Case 2: Liu, Eckert, Yannou-Le Bris, and Petit (2019) 47
The 12 source alternatives were categories of suppliers in the value chain is
shown in Table 4.4.
Measures were given for each criterion on each type of farmer.
The SMART methodology would begin by identifying swing weights. The first
step in that process would be to rank order the 20 criteria. The rank order complying
with the analytic network process values obtained in the original article were:
C2:4 > C3:1 > C2:1 ¼ C2:7 > C2:5 ¼ C2:6 > C1:7 > C3:2 ¼ C3:3 ¼ C3:4
> C2:2 ¼ C2:3 > C1:6 > C1:1 ¼ C1:8 ¼ C1:9 > C1:3 > C1:4 ¼ C1:5
> C1:2
The greatest weight was given to feed manufacturing cost (C2.4), more than
double that of the second-ranked measure of work hours (C3.1). The lowest weights
were given to the environmental factors, with the exception of land occupation
(C1.7).
Swing weighting could be applied as shown in Table 4.5.
The next step is to obtain relative scores for each alternative on each criterion.
Table 4.6 gives normalized scores where 1.0 is the best score, and 0 the worst.
Table 4.3 Pork supply chain criteria
TBL component Criteria Code Measure
Environmental Freshwater eutrophication C1.1 Kg SO2 eq
Terrestrial acidification C1.2 Kg SO2 eq
Human toxicity C1.3 Kg1, 4-DB eq
Fossil depletion C1.4 Kg oil eq
Water depletion C1.5 M3
Climate change C1.6 Kg CO2 eq
Land occupation C1.7 M2a
Freshwater ecotoxicity C1.8 Kg1, 4-DB eq
Marine ecotoxicity C1.9 Kg1, 4-DB eq
Economic Investment <5 years C2.1 Euro/ton
Investment 5–9 years C2.2 Euro/ton
Investment 10–14 years C2.3 Euro/ton
Feed manufacturing cost C2.4 Euro/ton
Total feed system cost C2.5 Euro/ton
Waste C2.6 Percentage
Labor cost C2.7 Euro/ton
Social Work hours C3.1 Hours/day
Biodiversity varieties C3.2 Number by formula
Biodiversity species C3.3 Number by formula
Localness C3.4 Percent by formula
48 4 Examples of Supply Chain Decisions Trading Off Criteria
Liu et al. found ranks by preference as follows:
Excellent: S1 > S2
Acceptable: S10 > S3 > S4
Poor: S12 > S7 > S8 > S11 > S5 > S6
Table 4.6 has the same ranking for the Excellent category, and S10 also came
third. There was some difference for the intermediate-ranked categories, but quite a
bit of similarity for the lower ranks.
Value Analysis
Value analysis is possible by identifying where each alternative has relative
strengths and weaknesses. S1, the colza farmer, was strongest on six measures,
including low land occupation, short-term investment, low waste, low labor cost,
and work hours. It was weakest on long-term investment. The twelfth-ranked
alternative, S6, was strongest on localness, but weak on human toxicity, long-term
investment, waster, and labor cost. The context of this problem was to rank given
alternatives. The value analysis can show why ranking was as it ended up.
Table 4.4 Types of farmers
Code Type name Orientation
Dominant
feed Size of feed
Type of
storage
S1 Bought colza Purchasing Colza
S2 Bought soy Purchasing Soy
S3 Made < 2500 T Producing Dry cereals Silo < 2500
T
S4 Made > 2500 T Producing Dry cereals Silo < 2500
T
S5 Made maize Hori <
2500 T
Producing Corn Silo < 2500
T
Horizontal
S6 Made maize Hori >
2500 T
Producing Corn Silo < 2500
T
Horizontal
S7 Made maize Vert <
2500 T
Producing Corn Silo < 2500
T
Vertical
S8 Made maize Vert >
2500 T
Producing Corn Silo < 2500
T
Vertical
S9 Mix Horizontal Mix Dry cereals Horizontal
S10 Mix Vertical Mix Dry cereals Vertical
S11 Mix maize Horizontal Mix Corn Horizontal
S12 Mix maize Vertical Mix Corn Vertical
Case 2: Liu, Eckert, Yannou-Le Bris, and Petit (2019) 49
Case 3: Khatri and Srivastava (2016)3
This case involves technology selection considering environmental considerations.
The context is an Indian aluminum recycling company that operated five plants.
They wanted to align business practices with sustainable development, and identified
three furnace and burner technologies seeking the most promising technology to
reach their goals.
The AHP model these authors used involved three alternative (RER—a reverber-
atory furnace with a regenerative burner, OROO—a rotary furnace with oxy fuel
burner technology, and REO—a reverberatory furnace with oxy fuel burner tech-
nology). They considered the following six criteria:
1. Environmental sustainability (EnvS) considered landfill area saved, hazardous
chemical reduction, reutilization of wastes, environmental emission reduction,
and recycled material usage.
Table 4.5 Swing weighting
Criteria Code
From
max. Weight
From
min. Weight Compromise
Food manufacturing
cost
C2.4 100 0.181 120 0.152 0.167
Work hours C3.1 50 0.091 60 0.076 0.080
Investment <5 years C2.1 45 0.082 55 0.070 0.075
Labor cost C2.7 45 0.082 55 0.070 0.075
Total feed system cost C2.5 40 0.073 50 0.063 0.068
Waste C2.6 40 0.073 50 0.063 0.068
Land occupation C1.7 35 0.064 45 0.057 0.060
Biodiversity varieties C3.2 30 0.054 40 0.051 0.053
Biodiversity species C3.3 30 0.054 40 0.051 0.053
Localness C3.4 30 0.054 40 0.051 0.053
Investment 5–9 years C2.2 20 0.036 35 0.044 0.040
Investment 10–14
years
C2.3 20 0.036 35 0.044 0.040
Climate change C1.6 15 0.027 30 0.038 0.033
Freshwater
eutrophication
C1.1 10 0.018 25 0.032 0.025
Freshwater ecotoxicity C1.8 10 0.018 25 0.032 0.025
Marine ecotoxicity C1.9 10 0.018 25 0.032 0.025
Human toxicity C1.3 8 0.015 20 0.025 0.020
Fossil depletion C1.4 5 0.009 15 0.019 0.015
Water depletion C1.5 5 0.009 15 0.019 0.015
Terrestrial acidification C1.2 3 0.005 10 0.013 0.010
50 4 Examples of Supply Chain Decisions Trading Off Criteria
T
a
b
le
4
.6
S
co
re
s
fo
r
al
te
rn
at
iv
es
W
g
t
S
1
S
2
S
3
S
4
S
5
S
6
S
7
S
8
S
9
S
1
0
S
1
1
S
1
2
C
2
.4
0
.1
6
7
0
0
0
.6
0
.6
0
.3
0
.3
0
.3
0
.3
0
.5
0
.5
0
.4
0
.4
C
3
.1
0
.0
8
0
1
1
0
.8
0
.8
0
.5
0
.5
0
.8
0
.8
0
.3
0
.8
0
.3
0
.8
C
2
.1
0
.0
7
5
1
1
0
.3
0
.2
0
.3
0
.2
0
.3
0
.2
0
.5
0
.3
0
.5
0
.3
C
2
.7
0
.0
7
5
1
1
0
.5
0
.5
0
.2
0
.2
0
.5
0
.5
0
.1
0
.5
0
.1
0
.5
C
2
.5
0
.0
6
8
0
.8
0
.7
0
.4
0
.4
0
.6
0
.6
0
.6
0
.6
0
.5
5
0
.5
5
0
.6
5
0
.6
5
C
2
.6
0
.0
6
8
1
1
0
.8
0
.8
0
.2
0
.2
0
.2
0
.2
0
.8
0
.8
0
.2
0
.2
C
1
.7
0
.0
6
0
1
0
.5
0
.2
0
.2
0
.4
0
.4
0
.4
0
.4
0
.6
0
.6
0
.7
0
.7
C
3
.2
0
.0
5
3
0
.8
0
.9
0
.3
0
.3
0
.6
0
.6
0
.6
0
.6
0
.2
0
.2
0
.5
0
.5
C
3
.3
0
.0
5
3
0
.8
0
.9
0
.3
0
.3
0
.7
0
.7
0
.7
0
.7
0
.1
0
.1
0
.6
0
.6
C
3
.4
0
.0
5
3
0
.1
0
.4
0
.9
0
.9
0
.8
0
.8
0
.8
0
.8
0
.7
0
.7
0
.3
0
.3
C
2
.2
0
.0
4
0
1
1
0
.7
0
.4
0
.7
0
.4
0
.7
0
.4
0
.9
0
.7
0
.9
0
.7
C
2
.3
0
.0
4
0
0
0
0
.5
0
.2
0
.5
0
.2
0
.5
0
.2
0
.8
0
.5
0
.8
0
.5
C
1
.6
0
.0
3
3
0
.6
0
.2
0
.3
0
.3
0
.4
0
.4
0
.4
0
.4
0
.3
5
0
.3
5
0
.3
3
0
.3
3
C
1
.1
0
.0
2
5
0
.9
0
.6
0
.4
0
.4
0
.5
0
.5
0
.5
0
.5
0
.6
0
.6
0
.2
0
.2
C
1
.8
0
.0
2
5
0
.6
0
.8
0
.4
0
.4
0
.3
0
.3
0
.3
0
.3
0
.5
0
.5
0
.2
0
.2
C
1
.9
0
.0
2
5
0
.7
0
.8
0
.2
0
.2
0
.3
0
.3
0
.3
0
.3
1
1
0
.9
0
.9
C
1
.3
0
.0
2
0
0
.8
0
.6
0
.1
0
.1
0
.2
0
.2
0
.2
0
.2
1
1
0
.9
0
.9
C
1
.4
0
.0
1
5
0
.5
0
.2
0
.6
0
.6
0
.7
0
.7
0
.7
0
.7
0
.9
0
.9
0
.1
0
.1
C
1
.5
0
.0
1
5
0
.6
0
.9
0
.3
0
.3
0
.3
5
0
.3
5
0
.3
5
0
.3
5
5
0
.7
0
.7
0
.4
0
.4
C
1
.2
0
.0
1
0
0
.5
0
.5
0
.7
0
.7
0
.8
0
.8
0
.8
0
.8
0
.4
0
.4
0
.2
0
.2
S
co
re
0
.6
5
5
0
.6
2
7
0
.5
0
3
0
.4
7
1
0
.4
3
4
0
.4
0
2
0
.4
8
0
0
.4
4
9
0
.5
1
3
0
.5
4
8
0
.4
4
9
0
.4
8
4
R
an
k
1
2
5
8
1
1
1
2
7
9
4
3
1
0
6
Case 3: Khatri and Srivastava (2016) 51
2. Social sustainability (SS) considered employee health and safety, employee skill
development, manual operation reduction, and employment in the local
community.
3. Customer orientation (CO) considered customer satisfaction, supply chain risk
mitigation, product quality improvement, and lead time reduction.
4. Technical criteria (TC) considered use of proven technology, output/input
improvement, technology licensing required, and the technology life cycle.
5. Manufacturing flexibility (MF) considered capacity growth, improved efficiency,
reduced changeover time, and inventory reduction.
6. Economic sustainability (ES) considered return on investment, profitability ratio,
operational cost, additional physical facilities required, and project cost.
Swing weighting calculations started with ranking as shown here:
ES > CS > EnvS > SS ¼ MF > TC
Swing weighting is shown in Table 4.7.
The next step is to score alternative performance on each of the six criteria, as
given in Table 4.8.
In this case, the model overwhelmingly pointed to selecting the regenerative
burner technology (RER). Value analysis is obvious here—there is a slight disad-
vantage relative to the oxy fuel burner technology with respect to manufacturing
flexibility, but RER had very strong relative advantages on environmental
Table 4.7 Aluminum swing weighting
Criteria From max. Weight From min. Weight Compromise
ES 100 0.290 40 0.276 0.28
CO 90 0.261 35 0.241 0.25
EnvS 70 0.203 30 0.207 0.2
SS 30 0.087 15 0.103 0.1
MF 30 0.087 15 0.103 0.1
TC 25 0.072 10 0.069 0.07
345 145 1
Table 4.8 Aluminum value scores
RER OROO REO Weight
ES Economic sustainability 1 0.75 0.3 0.25
CO Customer orientation 1 0.35 0.2 0.25
EnvS Environmental sustainability 1 0.25 0.1 0.2
SS Social sustainability 1 0.9 0.2 0.1
MF Manufacturing flexibility 0.6 1 0.4 0.1
TC Technical criteria 1 0.4 0.1 0.07
SCORE 0.930 0.543 0.212
52 4 Examples of Supply Chain Decisions Trading Off Criteria
sustainability, customer orientation, and technical criteria. Some decisions are not
too difficult.
Value Analysis
In this case, there were clear distinguishing performance scores. The first two
alternatives have some compensating advantage (the third does not, among the
criteria included). There were few criteria. While it is often best to focus on fewer
criteria, if there are a number of measurable items falling into clear categories, it can
work. In this case, RER is inferior to OROO only on manufacturing flexibility. Thus
value analysis might seek ways to improve manufacturing flexibility for RER.
Case 4: Envinda, Briggs, Obuah, and Mbah (2011)4
The fourth case involves the interesting decision domain of strategy selection. A
petroleum supply chain in Nigeria faced significant risks, which were modeled in six
areas (the criteria). The purpose of the model was to support selection of one of four
risk mitigation strategies:
• Reduce risk
• Share risk
• Avoid risk
• Retain risk
The six criteria are:
1. Geological and production risk (GPR)
2. Environmental and regulatory risk (ERR)
3. Transportation risk (TR)
4. Oil availability risk (OAR)
5. Geopolitical risk (GR)
6. Reputation risk (RR)
Weight generation began with rank ordering these risks:
GPR > TR > GR > RR > OAR > ERR
Swing weighting is shown in Table 4.9.
Note here that on the backwards pass TR and GR were rated as similar—the point
of swing weighting is to get different perspectives. Ties are possible, rank reversal
would be more concerning. The next step is to obtain scores for the four alternative
risk treatments (Table 4.10).
Case 4: Envinda, Briggs, Obuah, and Mbah (2011) 53
In application, the model could use the weight set for multiple cases, each with
new scores to reflect the new situation.
Value Analysis
Here the choice for this situation would indicate a strong recommendation to reduce
risk through proactive action. The reasons are much higher scores on all criteria
except reputation risk, where simply getting out of that business opportunity was
rated as higher.
Case 5: Akyuz, Karahalios, and Celik (2015)5
The last case involves application of multiple criteria analysis to balanced scorecard
assessment. Balanced scorecards involve measuring performance on four
perspectives (financial, operational, business process, and organizational learning
and growth). These can be applied in many different contexts. The case in point
involved maritime labor compliance in a British environment. Each of the four
perspectives considered four or five factors. The authors applied AHP to rank
order the relative importance of these 19 factors with the intent of identifying
where relative emphasis might be placed in operations. In general, their model
could be used to compare performance at multiple sites. Here we simply want to
demonstrate multiple criteria modeling in a balanced scorecard setting.
Table 4.9 Oil risk swing weighting
Criteria From max. Weight From min. Weight Compromise
GPR 100 0.299 50 0.303 0.30
TR 90 0.269 30 0.182 0.22
GR 70 0.209 30 0.182 0.19
RR 30 0.090 25 0.152 0.13
OAR 25 0.075 20 0.121 0.10
ERR 20 0.060 10 0.061 0.06
335 165 1
Table 4.10 Oil risk scoring
Reduce risk Share risk Avoid risk Retain risk Weights
GPR 0.9 0.6 0.7 0.33 0.30
TR 1 0.25 0.5 0.15 0.22
GR 1 0.3 0.8 0.3 0.19
RR 0.8 0.1 1 0.25 0.13
OAR 0.9 0.45 0.25 0.35 0.10
ERR 0.9 0.4 0.8 0.7 0.06
Scores 0.928 0.374 0.675 0.299
54 4 Examples of Supply Chain Decisions Trading Off Criteria
Each of the four balanced scorecard perspectives consisted of critical success
factors in the context of maritime labor environment assessment (Table 4.11).
Table 4.12 gives the subcriteria and swing weighting implied in the source article.
This involves rank ordering the 19 subfactors, and giving assessments of relative
importance.
Here the source author intent was to rank-order the subcriteria, identifying where
emphasis would be placed. Wages clearly were the most preferred factor, reflecting a
strong emphasis on financial perspectives. Summing weights by balanced scorecard
perspective, Financial received 0.512 of the relative weight, Internal business pro-
cesses 0.238, labor 0.164, and learning and growth 0.086. Inherently, value analysis
is implied by the compromise weights identify relative importance using the ratings
given.
Value Analysis
This application differs, because its intent is to provide a balanced scorecard type of
model. This can be very useful, and interesting. But value analysis applies only to
hierarchical development, because Akyuz et al. applied AHP to performance
measurement.
Table 4.11 Balanced scorecard components in Maritime Labor context
Perspective Critical success factor Code
Financial Seafarer’s employment agreements FP1
Wages FP2
Seafarer compensation for ship loss or foundering FP3
Food and catering FP4
Labor Recruitment and placement LP1
Entitlement to leave LP2
Repatriation LP3
Medical care on-board and ashore LP4
Social security LP5
Internal business Medical certificate IBP1
Manning levels IBP2
Accommodation and recreational facilities IBP3
Shipowner’s liability IBP4
Health and safety and accident prevention IBP5
Learning and growth Minimum age LGP1
Training and qualifications LGP2
Hours of work and rest LGP3
Career and skill development LGP4
Access to shore-based welfare facilities LGP5
Case 5: Akyuz, Karahalios, and Celik (2015) 55
Conclusions
The cases presented involved multiple criteria selection decisions (with the excep-
tion of the fifth, demonstrating how balanced scorecard modeling could be
supported). Multiple criteria analysis is a very good framework to describe specific
aspects of risk and to assess where they impact a given decision context. The value
scores might be useful as a means to select a preferred alternative, or as a perfor-
mance metric that directs attention to features calling for improvement.
Value analysis can provide useful support to decision-making by first focusing on
hierarchical development. In all five cases presented here, this was done in the
original articles. Nonetheless, it is important to consider overarching objective
accomplishment.
Two aspects of value analysis should be considered. First, if scores on available
alternatives are equivalent on a specific criterion, this criterion will not matter for this
Table 4.12 Implied swing weighting
Criteria
From
max. Weight
From
min. Weight Compromise
FP2 Wages 100 0.249 980 0.293 0.270
FP3 Seafarer compensation for
ship loss or foundering
50 0.125 470 0.140 0.130
IBP5 Health and safety and
accident prevention
40 0.100 340 0.102 0.110
LP5 Social security 30 0.075 250 0.075 0.075
FP4 Food and catering 28 0.070 225 0.067 0.068
IBP4 Shipowner’s liability 26 0.065 190 0.057 0.060
LP4 Medical care on-board and
ashore
20 0.050 142 0.042 0.045
FP1 Seafarer’s employment
agreements
19 0.047 140 0.042 0.044
LGP4 Career and skill development 16 0.040 101 0.030 0.035
IBP3 Accommodation and
recreational facilities
13 0.032 99 0.030 0.031
LGP2 Training and qualifications 11 0.027 80 0.024 0.025
IBP2 Manning levels 10 0.025 75 0.022 0.023
LP2 Entitlement to leave 9 0.022 70 0.021 0.021
LGP3 Hours of work and rest 7 0.017 50 0.015 0.016
IBP1 Medical certificate 6 0.015 40 0.012 0.014
LP1 Recruitment and placement 6 0.015 38 0.011 0.013
LP3 Repatriation 5 0.012 30 0.009 0.010
LGP1 Minimum age 3 0.007 18 0.005 0.006
LGP5 Access to shore-based
welfare facilities
2 0.005 10 0.003 0.004
401 1 3348 1 1
56 4 Examples of Supply Chain Decisions Trading Off Criteria
set of alternatives. However, it may matter if new alternatives are added, or existing
alternatives improved. Second, a benefit of value analysis is improvement of existing
alternatives. The score matrix provides useful comparisons of relative alternative
performance. If decision makers are not satisfied with existing alternatives, they
might seek additional choices by expanding their search or designing better
alternatives. The criteria with the greatest weights might provide an area of focus
in this search, and the ideal scores might give a standard for design.
Notes
1. Zhu, Q., Shah, P. and Sarkis, J. (2018). Addition by subtraction: Integrating
product deletion with lean and sustainable supply chain management. Interna-
tional Journal of Production Economics 205, 201–214.
2. Liu, Y., Eckert, C., Yannou-Le Bris, G. and Petit, G. (2019). A fuzzy decision
tool to evaluate the sustainable performance of suppliers in an agrifood value
chain. Computers & Industrial Engineering 127, 196–212.
3. Khatri, J. and Srivastava, M. (2016). Technology selection for sustainable supply
chains. International Journal of Technology Management & Sustainable Devel-
opment 15(3), 275–289.
4. Enyinda, C.I., Briggs, C., Obuah, E. and Mbah, C. (2011). Petroleum supply
chain risk analysis in a multinational oil firm in Nigeria. Journal of Marketing
Development and Competitiveness 5(7), 37–44.
5. Akyuz, E., Karahalios, H. and Celik, M. (2015). Assessment of the maritime
labour convention compliance using balanced scorecard and analytic hierarchy
process approach. Maritime Policy & Management 42(2), 145–162.
Notes 57
Simulation of Supply Chain Risk 5
Supply chains involve many risks, as we have seen. Modeling that risk focuses on
probability, a well-developed analytic technique. This chapter addresses basic simu-
lation models involving supply chains, to include inventory modeling (often accom-
plished through system dynamics) and Monte Carlo simulation of vendor
outsourcing decisions.
Inventory Systems
Inventory is any resource that is set aside for future use. Inventory is necessary
because the demand and supply of goods usually are not perfectly matched at any
given time or place. Many different types of inventories exist. Examples include raw
materials (such as coal, crude oil, and cotton), semifinished products (aluminum
ingots, plastic sheets, lumber), and finished products (cans of food, computer
terminals, shirts). Inventories can also be human resources (standby crews and
trainees), financial resources (cash on hand, accounts receivable), and other
resources such as airplanes seats.
The basic risks associated with inventories are the risks of stocking out (and thus
losing sales), and the counter risk of going broke because excessive cash flow is tied
up in inventory. The problem is made interesting because demand is almost always
uncertain, driven by the behavior of the market, usually many people making
spontaneous purchasing decisions.
Inventories represent a considerable investment for many organizations; thus, it is
important that they be managed well. Although many analytic models for managing
inventories exist, the complexity of many practical situations often requires
simulation.
The two basic inventory decisions that managers face are how much to order or
produce additional inventory, and when to order or produce it. Although it is
possible to consider these two decisions separately, they are so closely related
# Springer-Verlag GmbH Germany, part of Springer Nature 2020
D. L. Olson, D. Wu, Enterprise Risk Management Models, Springer Texts in
Business and Economics, https://doi.org/10.1007/978-3-662-60608-7_5
59
that a simultaneous solution is usually necessary. Typically, the objective is to
minimize total inventory costs.
Total inventory cost can include four components: holding costs, ordering costs,
shortage costs, and purchasing costs. Holding costs, or carrying costs, represent
costs associated with maintaining inventory. These costs include interest incurred or
the opportunity cost of having capital tied up in inventories; storage costs such as
insurance, taxes, rental fees, utilities, and other maintenance costs of storage space;
warehousing or storage operation costs, including handling, record keeping, infor-
mation processing, and actual physical inventory expenses; and costs associated with
deterioration, shrinkage, obsolescence, and damage. Total holding costs are depen-
dent on how many items are stored and for how long they are stored. Therefore,
holding costs are expressed in terms of dollars associated with carrying one unit of
inventory for unit of time.
Ordering costs represent costs associated with replenishing inventories. These
costs are not dependent on how many items are ordered at a time, but on the number
of orders that are prepared. Ordering costs include overhead, clerical work, data
processing, and other expenses that are incurred in searching for supply sources, as
well as costs associated with purchasing, expediting, transporting, receiving, and
inspecting. In manufacturing operations, setup cost is the equivalent to ordering
cost. Setup costs are incurred when a factory production line has to be shut down in
order to reorganize machinery and tools for a new production run. Setup costs
include the cost of labor and other time-related costs required to prepare for the
new product run. We usually assume that the ordering or setup cost is constant and is
expressed in terms of dollars per order.
Shortage costs, or stock-out costs, are those costs that occur when demand
exceeds available inventory in stock. A shortage may be handled as a backorder,
in which a customer waits until the item is available, or as a lost sale. In either case, a
shortage represents lost profit and possible loss of future sales. Shortage costs
depend on how much shortage has occurred and sometimes for how long. Shortage
costs are expressed in terms of dollar cost per unit of short item.
Purchasing costs are what firms pay for the material or goods. In most inventory
models, the price of materials is the same regardless of the quantity purchased; in this
case, purchasing costs can be ignored. However, when price varies by quantity
purchased, called the quantity discount case, inventory analysis must be adjusted
to account for this difference.
Basic Inventory Simulation Model
Many models contain variables that change continuously over time. One example
would be a model of a retail store’s inventory. The number of items change gradually
(though discretely) over an extended time period; however, for all intents and
purposes, they may be treated as continuous. As customer demand is fulfilled,
inventory is depleted, leading to factory orders to replenish the stock. As orders
are received from suppliers, the inventory increases. Over time, particularly if orders
60 5 Simulation of Supply Chain Risk
are relatively small and frequent as we see in just-in-time environments, the inven-
tory level can be represented by a smooth, continuous, function.
We can build a simple inventory simulation model beginning with a spreadsheet
model as shown in Table 5.1. Model parameters include a holding rate of 0.8 per
item per day, an order rate of 300 for each order placed, a purchase price of 90, and a
sales price of 130. The decision variables are when to order (when the end of day
quantity drops below the reorder point (ROP)), and the quantity ordered (Q). The
model itself has a row for each day (here 30 days are modeled). Each day has a
starting inventory (column B) and a probabilistic demand (column C) generated
from a normal distribution with a mean of 100 and a standard deviation of 10.
Demand is made integer. Sales (column D) are equal to the minimum of the starting
quantity and demand. End of day inventory (column E) is the maximum of 0 or
starting inventory minus demand. The quantity ordered at the end of each day in
column F (here assumed to be on hand at the beginning of the next day) is 0 if ending
inventory exceeds ROP, or Q if ending inventory drops at or below ROP.
Profit and shortage are calculated to the right of the basic inventory model.
Column G calculates holding cost by multiplying the parameter is cell B2 times
the ending inventory quantity for each day, and summing over the 30 days in cell G5.
Order costs are calculated by day as $300 if an order is placed that day, and
0 otherwise, with the monthly total ordering cost accumulated in cell H5. Cell I5
calculates total purchasing cost, cell J5 total revenue, and cell H3 calculates net profit
considering the value of starting inventory and ending inventory. Column K
identifies sales lost (SHORT), with cell K5 accumulating these for the month.
Note that cell H3 adjusts for beginning and ending inventory.
Crystal Ball simulation software allows introduction of three types of special
variables. Probabilistic variables (assumption cells in Crystal Ball terminology) are
modeled in column C using a normal distribution [CB.Normal (mean, std)]. Decision
variables are modeled for ROP (cell E1) and Q (cell E2). Crystal Ball allows setting
minimum and maximum levels for decision variables, as well as step size. Here we
used ROP values of 80, 100, 120, and 140, and Q values of 100, 110, 120, 130, and
140. The third type of variable is a forecast cell. We have forecast cells for net profit
(H3) and for sales lost (cell K3).
The Crystal Ball simulation can be set to run for up to 10,000 repetitions for
combination of decision variables. We selected 1000 repetitions. Output is given for
forecast cells. Figure 5.1 shows net profit for the combination of an ROP of 140 and
a Q of 140.
Tabular output is also provided as in Table 5.2.
Similar output is given for the other forecast variable, SHORT (Fig. 5.2;
Table 5.3).
Crystal Ball also provides a comparison over all decision variable values, as given
in Table 5.4.
The implication here is that the best decision for the basic model parameters
would be an ROP of 120 and a Q of 130, yielding an expected net profit of $101,446
for the month. The shortage for this combination had a mean of 3.43 items per day,
with a distribution shown in Fig. 5.3. The probability of shortage was 0.4385.
Basic Inventory Simulation Model 61
T
a
b
le
5
.1
B
as
ic
in
v
en
to
ry
m
o
d
el
A
B
C
D
E
F
G
H
I
J
K
1
H
o
ld
ra
te
0
.8
R
O
P
1
4
0
2
O
rd
er
ra
te
3
0
0
Q
1
4
0
3
P
u
rc
h
as
e
9
0
N
et
1
0
1
,8
0
9
.2
S
h
o
rt
0
4
S
el
l
1
3
0
5
2
4
4
0
.8
6
6
0
0
2
7
7
,2
0
0
3
8
8
,0
5
0
6
D
ay
S
ta
rt
D
em
an
d
S
al
es
E
n
d
O
rd
er
H
o
ld
co
st
O
rd
er
co
st
P
u
rc
h
as
e
R
ev
en
u
e
S
H
O
R
T
7
1
1
0
0
8
5
8
5
1
5
1
4
0
1
2
3
0
0
1
2
,6
0
0
1
1
,0
5
0
0
8
2
1
5
5
8
4
8
4
7
1
1
4
0
5
6
.8
3
0
0
1
2
,6
0
0
1
0
,9
2
0
0
9
3
2
1
1
1
0
4
1
0
4
1
0
7
1
4
0
8
5
.6
3
0
0
1
2
,6
0
0
1
3
,5
2
0
0
1
0
4
2
4
7
1
0
5
1
0
5
1
4
2
0
1
1
3
.6
0
0
1
3
,6
5
0
0
1
1
5
1
4
2
1
0
4
1
0
4
3
8
1
4
0
3
0
.4
3
0
0
1
2
,6
0
0
1
3
,5
2
0
0
1
2
6
1
7
8
1
1
6
1
1
6
6
2
1
4
0
4
9
.6
3
0
0
1
2
,6
0
0
1
5
,0
8
0
0
1
3
7
2
0
2
1
0
5
1
0
5
9
7
1
4
0
7
7
.6
3
0
0
1
2
,6
0
0
1
3
,6
5
0
0
1
4
8
2
3
7
9
4
9
4
1
4
3
0
1
1
4
.4
0
0
1
2
,2
2
0
0
1
5
9
1
4
3
8
3
8
3
6
0
1
4
0
4
8
3
0
0
1
2
,6
0
0
1
0
,7
9
0
0
1
6
1
0
2
0
0
9
4
9
4
1
0
6
1
4
0
8
4
.8
3
0
0
1
2
,6
0
0
1
2
,2
2
0
0
1
7
1
1
2
4
6
1
1
5
1
1
5
1
3
1
1
4
0
1
0
4
.8
3
0
0
1
2
,6
0
0
1
4
,9
5
0
0
1
8
1
2
2
7
1
1
2
8
1
2
8
1
4
3
0
1
1
4
.4
0
0
1
6
,6
4
0
0
1
9
1
3
1
4
3
1
0
7
1
0
7
3
6
1
4
0
2
8
.8
3
0
0
1
2
,6
0
0
1
3
,9
1
0
0
2
0
1
4
1
7
6
1
1
0
1
1
0
6
6
1
4
0
5
2
.8
3
0
0
1
2
,6
0
0
1
4
,3
0
0
0
2
1
1
5
2
0
6
1
0
2
1
0
2
1
0
4
1
4
0
8
3
.2
3
0
0
1
2
,6
0
0
1
3
,2
6
0
0
2
2
1
6
2
4
4
9
6
9
6
1
4
8
0
1
1
8
.4
0
0
1
2
,4
8
0
0
2
3
1
7
1
4
8
9
1
9
1
5
7
1
4
0
4
5
.6
3
0
0
1
2
,6
0
0
1
1
,8
3
0
0
2
4
1
8
1
9
7
1
0
2
1
0
2
9
5
1
4
0
7
6
3
0
0
1
2
,6
0
0
1
3
,2
6
0
0
2
5
1
9
2
3
5
1
0
4
1
0
4
1
3
1
1
4
0
1
0
4
.8
3
0
0
1
2
,6
0
0
1
3
,5
2
0
0
62 5 Simulation of Supply Chain Risk
2
6
2
0
2
7
1
9
6
9
6
1
7
5
0
1
4
0
0
0
1
2
,4
8
0
0
2
7
2
1
1
7
5
1
0
3
1
0
3
7
2
1
4
0
5
7
.6
3
0
0
1
2
,6
0
0
1
3
,3
9
0
0
2
8
2
2
2
1
2
9
8
9
8
1
1
4
1
4
0
9
1
.2
3
0
0
1
2
,6
0
0
1
2
,7
4
0
0
2
9
2
3
2
5
4
9
7
9
7
1
5
7
0
1
2
5
.6
0
0
1
2
,6
1
0
0
3
0
2
4
1
5
7
1
0
3
1
0
3
5
4
1
4
0
4
3
.2
3
0
0
1
2
,6
0
0
1
3
,3
9
0
0
3
1
2
5
1
9
4
8
6
8
6
1
0
8
1
4
0
8
6
.4
3
0
0
1
2
,6
0
0
1
1
,1
8
0
0
3
2
2
6
2
4
8
1
0
5
1
0
5
1
4
3
0
1
1
4
.4
0
0
1
3
,6
5
0
0
3
3
2
7
1
4
3
8
9
8
9
5
4
1
4
0
4
3
.2
3
0
0
1
2
,6
0
0
1
1
,5
7
0
0
3
4
2
8
1
9
4
1
0
6
1
0
6
8
8
1
4
0
7
0
.4
3
0
0
1
2
,6
0
0
1
3
,7
8
0
0
3
5
2
9
2
2
8
8
9
8
9
1
3
9
1
4
0
1
1
1
.2
3
0
0
1
2
,6
0
0
1
1
,5
7
0
0
3
6
3
0
2
7
9
8
4
8
4
1
9
5
0
1
5
6
0
0
1
0
,9
2
0
0
Basic Inventory Simulation Model 63
System Dynamics Modeling of Supply Chains
Many models contain variables that change continuously over time. One example
would be a model of an oil refinery. The amount of oil moving between various
stages of production is clearly a continuous variable. In other models, changes in
variables occur gradually (though discretely) over an extended time period;
Fig. 5.1 Crystal ball output for net profit ROP 140, Q 140. # Oracle. Used with permission
Table 5.2 Statistical
output for net profit ROP
140, Q 140
Forecast: net
Statistic Forecast values
Trials 1000
Mean 100,805.56
Median 97,732.8
Mode 97,042.4
Standard deviation 6264.80
Variance 39,247,672.03
Skewness 0.8978
Kurtosis 2.21
Coeff. of variability 0.0621
Minimum 89,596.80
Maximum 112,657.60
Mean Std. error 198.11
# Oracle. Used with permission
64 5 Simulation of Supply Chain Risk
however, for all intents and purposes, they may be treated as continuous. An
example would be the amount of inventory at a warehouse in a production–distribu-
tion system over several years. As customer demand is fulfilled, inventory is
depleted, leading to factory orders to replenish the stock. As orders are received
from suppliers, the inventory increases. Over time, particularly if orders are rela-
tively small and frequent as we see in just-in-time environments, the inventory level
can be represented by a smooth, continuous, and function.
Fig. 5.2 SHORT for ROP 140, Q 140. # Oracle. Used with permission
Table 5.3 Statistical
output: ROP 140, Q 140
Forecast: net
Statistic Forecast values
Trials 1000
Mean 3.72
Median 0.00
Mode 0.00
Standard deviation 5.61
Variance 31.47
Skewness 1.75
Kurtosis 5.94
Coeff. of variability 1.51
Minimum 0.00
Maximum 31.00
Mean Std. error 0.18
System Dynamics Modeling of Supply Chains 65
T
a
b
le
5
.4
C
o
m
p
ar
at
iv
e
n
et
p
ro
fi
t
fo
r
al
l
v
al
u
es
o
f
R
O
P
,
Q
Q
(1
0
0
.0
0
)
Q
(1
1
0
.0
0
)
Q
(1
2
0
.0
0
)
Q
(1
3
0
.0
0
)
Q
(1
4
0
.0
0
)
R
O
P
(8
0
.0
0
)
9
9
,5
3
0
9
9
,9
4
8
9
9
,9
1
8
1
0
0
,1
5
9
1
0
1
,3
3
1
1
R
O
P
(1
0
0
.0
0
)
9
9
,6
2
7
1
0
0
,7
0
1
1
0
1
,0
5
1
1
0
1
,9
7
2
1
0
1
,5
1
2
2
R
O
P
(1
2
0
.0
0
)
9
9
,5
1
9
1
0
0
,4
2
9
1
0
0
,9
1
9
10
1,
44
6
1
0
1
,2
5
2
3
R
O
P
(1
4
0
.0
0
)
9
9
,5
2
5
9
9
,8
9
4
1
0
0
,5
8
6
1
0
0
,7
1
2
1
0
0
,8
0
5
4
1
2
3
4
5
#
O
ra
cl
e.
U
se
d
w
it
h
p
er
m
is
si
o
n
66 5 Simulation of Supply Chain Risk
Continuous variables are often called state variables. A continuous simulation
model defines equations for relationships among state variables so that the dynamic
behavior of the system over time can be studied. To simulate continuous systems, we
use an activity-scanning approach whereby time is decomposed into small
increments. The defining equations are used to determine how the state variables
change during an increment of time. A specific type of continuous simulation is
called system dynamics, which dates back to the early 1960s and a classic work by
Jay Forrester of M.I.T.1 System dynamics focuses on the structure and behavior of
systems that are composed of interactions among variables and feedback loops. A
system dynamics model usually takes the form of an influence diagram that shows
the relationships and interactions among a set of variables.
System dynamics models have been widely used to model supply chains, espe-
cially with respect to the bullwhip phenomenon,2 which has to do with the dramatic
increase in inventories across supply chains when uncertainty in demand appears.
Many papers have dealt with the bullwhip effect through system dynamics models.3
These models have been used to evaluate lean systems,4 Kanban systems,5 and JIT
systems,6 They also have been used to model vendor management inventory in
supply chains.7
We present a four-echelon supply chain model, consisting of a vendor providing
raw materials, an assembly operation to create the product, a warehouse, and a set of
five retailers. We will model two systems—one a push system, the other pull in the
sense that upstream activity depends on downstream demand. We will present the
pull system first.
Fig. 5.3 SHORT for R ¼ 120, Q ¼ 130. # Oracle. Used with permission
System Dynamics Modeling of Supply Chains 67
Pull System
The basic model uses a forecasting system based on exponential smoothing to drive
decisions to send material down the supply chain. We use EXCEL modeling, along
with Crystal Ball software to do simulation repetitions, following Evans and Olson
(2004).8 The formulas for the factory portion of the model are given in Fig. 5.4.
Figure 5.4 models a month of daily activity. Sales of products at retail generate
$100 in revenue for the core organization, at a cost of $70 per item. Holding costs are
$1 at the retail level ($0.50 at wholesale, $0.40 at assembly, and $0.25 at vendors).
Daily orders are shipped from each element, at a daily cost of $1000 from factory to
assembler, $700 from assembler to warehouse, and $300 from warehouse to
retailers. Vendors produce 50 items of material per day if inventory drops to
20 items or less. If not, they do not produce. They send material to the assembly
operation if called by that element, which is modeled in Fig. 5.5 (only the first 5 days
are shown). Vendor ending inventory is shown in column E, with cell E37 adding
total monthly inventory.
The assembly operation calls for replenishment of 30 units from the vendor
whenever their inventory of finished goods drops to 20 or less. Each daily delivery
A B C D E
1 RevP 100 ROPven 20
2 Cost 70 Qven 50
3 Hold 1
4 Vendor Vendor
5 Start Prod Send End
6 Time
7 1 40 =IF(E7<=$D$1,$D$2,0) =IF(J7<=$I$1,$D$2,0) =MAX(0,B7-D7)
8 =A7+1 =E7 =IF(E8<=$D$1,$D$2,0) =IF(J8<=$I$1,$D$2,0) =MAX(0,B8-D8)
9 =A8+1 =E8+C7 =IF(E9<=$D$1,$D$2,0) =IF(J9<=$I$1,$D$2,0) =MAX(0,B9-D9)
10 =A9+1 =E9+C8 =IF(E10<=$D$1,$D$2,0) =IF(J10<=$I$1,$D$2,0) =MAX(0,B10-D10)
11 =A10+1 =E10+C9 =IF(E11<=$D$1,$D$2,0) =IF(J11<=$I$1,$D$2,0) =MAX(0,B11-D11)
12 =A11+1 =E11+C10 =IF(E12<=$D$1,$D$2,0) =IF(J12<=$I$1,$D$2,0) =MAX(0,B12-D12)
13 =A12+1 =E12+C11 =IF(E13<=$D$1,$D$2,0) =IF(J13<=$I$1,$D$2,0) =MAX(0,B13-D13)
14 =A13+1 =E13+C12 =IF(E14<=$D$1,$D$2,0) =IF(J14<=$I$1,$D$2,0) =MAX(0,B14-D14)
15 =A14+1 =E14+C13 =IF(E15<=$D$1,$D$2,0) =IF(J15<=$I$1,$D$2,0) =MAX(0,B15-D15)
16 =A15+1 =E15+C14 =IF(E16<=$D$1,$D$2,0) =IF(J16<=$I$1,$D$2,0) =MAX(0,B16-D16)
17 =A16+1 =E16+C15 =IF(E17<=$D$1,$D$2,0) =IF(J17<=$I$1,$D$2,0) =MAX(0,B17-D17)
18 =A17+1 =E17+C16 =IF(E18<=$D$1,$D$2,0) =IF(J18<=$I$1,$D$2,0) =MAX(0,B18-D18)
19 =A18+1 =E18+C17 =IF(E19<=$D$1,$D$2,0) =IF(J19<=$I$1,$D$2,0) =MAX(0,B19-D19)
20 =A19+1 =E19+C18 =IF(E20<=$D$1,$D$2,0) =IF(J20<=$I$1,$D$2,0) =MAX(0,B20-D20)
21 =A20+1 =E20+C19 =IF(E21<=$D$1,$D$2,0) =IF(J21<=$I$1,$D$2,0) =MAX(0,B21-D21)
22 =A21+1 =E21+C20 =IF(E22<=$D$1,$D$2,0) =IF(J22<=$I$1,$D$2,0) =MAX(0,B22-D22)
23 =A22+1 =E22+C21 =IF(E23<=$D$1,$D$2,0) =IF(J23<=$I$1,$D$2,0) =MAX(0,B23-D23)
24 =A23+1 =E23+C22 =IF(E24<=$D$1,$D$2,0) =IF(J24<=$I$1,$D$2,0) =MAX(0,B24-D24)
25 =A24+1 =E24+C23 =IF(E25<=$D$1,$D$2,0) =IF(J25<=$I$1,$D$2,0) =MAX(0,B25-D25)
26 =A25+1 =E25+C24 =IF(E26<=$D$1,$D$2,0) =IF(J26<=$I$1,$D$2,0) =MAX(0,B26-D26)
27 =A26+1 =E26+C25 =IF(E27<=$D$1,$D$2,0) =IF(J27<=$I$1,$D$2,0) =MAX(0,B27-D27)
28 =A27+1 =E27+C26 =IF(E28<=$D$1,$D$2,0) =IF(J28<=$I$1,$D$2,0) =MAX(0,B28-D28)
29 =A28+1 =E28+C27 =IF(E29<=$D$1,$D$2,0) =IF(J29<=$I$1,$D$2,0) =MAX(0,B29-D29)
30 =A29+1 =E29+C28 =IF(E30<=$D$1,$D$2,0) =IF(J30<=$I$1,$D$2,0) =MAX(0,B30-D30)
31 =A30+1 =E30+C29 =IF(E31<=$D$1,$D$2,0) =IF(J31<=$I$1,$D$2,0) =MAX(0,B31-D31)
32 =A31+1 =E31+C30 =IF(E32<=$D$1,$D$2,0) =IF(J32<=$I$1,$D$2,0) =MAX(0,B32-D32)
33 =A32+1 =E32+C31 =IF(E33<=$D$1,$D$2,0) =IF(J33<=$I$1,$D$2,0) =MAX(0,B33-D33)
34 =A33+1 =E33+C32 =IF(E34<=$D$1,$D$2,0) =IF(J34<=$I$1,$D$2,0) =MAX(0,B34-D34)
35 =A34+1 =E34+C33 =IF(E35<=$D$1,$D$2,0) =IF(J35<=$I$1,$D$2,0) =MAX(0,B35-D35)
36 =A35+1 =E35+C34 =IF(E36<=$D$1,$D$2,0) =IF(J36<=$I$1,$D$2,0) =MAX(0,B36-D36)
37 =SUM(E7:E36)
Fig. 5.4 Factory model
68 5 Simulation of Supply Chain Risk
is 30 units, and is received at the beginning of the next day’s operations. The
assembly operation takes 1 day, and goods are available to send that evening.
Column J shows ending inventory to equal what starting inventory plus what was
processed that day minus what was sent to wholesale. Figure 5.6 shows the model of
the wholesale operation.
The wholesale operation feeds retail demand, which is shown in column L. They
feed retailers up to the amount they have in stock. They order from the assembler if
they have less than 25 items. If they stock out, they order 20 items plus 70% of what
they were unable to fill (this is essentially an exponential smoothing forecast). If they
still have stock on hand, the order to fill up to 25 items. Figure 5.7 shows one of the
five retailer operations (the other four are identical).
Retailers face a highly variable demand with a mean of 4. They fill what orders
they have stock for. Shortfall is measured in column U. They order if their end-of-
day inventory falls to 4 or less. The amount ordered is 4 plus 70% of shortfall, up to a
maximum of 8 units.
This model is run of Crystal Ball to generate a measure of overall system profit.
Here the profit formula is $175 times sales minus holding costs minus transportation
costs. Holding costs at the factory were $0.25 times sum of ending inventory, at the
assembler $0.40 times sum of ending inventory, at the warehouse 0.50 times ending
inventory, and at the retailers $1 times sum of ending inventories. Shipping costs
were $1000 per day from factory to assembler, $700 per day from assembler to
warehouse, and $300 per day from warehouse to retailer. The results of 1000
repetitions are shown in Fig. 5.8.
Here average profit for a month is $5942, with a minimum a loss of $8699 and a
maximum gain of $18,922. There was a 0.0861 probability of a negative profit. The
amount of shortage across the system is shown in Fig. 5.9. The average was 138.76,
with a range of 33–279 over the 1000 simulation repetitions.
10 4 =J9 =D9 =G9 =MIN(F10,M9) =F10+H10-I10
11 5 =J10 =D10 =G10 =MIN(F11,M10) =F11+H11-I11
Fig. 5.5 Core assembly model
A K L M N O P
1 WholMin 20
2 WholMax 25
3
4 Whol
5 Day Start Demand Order End Short Sent
6 0
7 1
=20 =20
=IF(O7>0,$N$1+INT(0.7*O7),IF(N
7>$N$2,0,$N$2-N7))
=K7-
P7 =IF(L7>K7,L7-K7,0)
MIN(K7,
L7)
8 2
=N7+I7
=T7+Y7+AD7+AI
7+AM7
=IF(O8>0,$N$1+INT(0.7*O8),IF(N
8>$N$2,0,$N$2-N8))
=K8-
P8 =IF(L8>K8,L8-K8,0)
MIN(K8,
L8)
9 3
=N8+I8
=T8+Y8+AD8+AI
8+AM8
=IF(O9>0,$N$1+INT(0.7*O9),IF(N
9>$N$2,0,$N$2-N9))
=K9-
P9 =IF(L9>K9,L9-K9,0)
MIN(K9,
L9)
10 4
=N9+I9
=T9+Y9+AD9+AI
9+AM9
=IF(O10>0,$N$1+INT(0.7*O10),IF
(N10>$N$2,0,$N$2-N10))
=K10-
P10 =IF(L10>K10,L10-K10,0)
MIN(K1
0,L1