Chapter 12: Information and Risk Management
Chapter 12 Learning Outcomes
After reading this chapter, you should be able to do the following:
- Explain how analyzing Big Data can help businesses.
- Provide three threats to data security a business may experience.
- Explain what is meant by “information sharing” and the challenges this may present.
- Define information mining and visualization.
- Distinguish between real risk and perceived risk by providing an example of each.
- List four types of business risks within one or more sectors.
- Discuss three factors that influence an organization’s risk tolerance.
- Explain how risk impacts business and outline the five steps of risk management.
- List three risk response strategies and provide examples for each.
- Provide at least three strategies businesses can take to mitigate business risks.
The Role and Management of Business Information in Modern Organizations
Business information refers to collective data related to a company and its operations, including statistical information, raw analytical data, customer feedback, and sales numbers.[1]
In today’s fast-evolving digital era, businesses depend heavily on data and information for operations, customer relations, innovation, and strategic planning. The effective use and management of information have become fundamental to achieving organizational goals. While the benefits of robust information systems are significant, they come with challenges, particularly in ensuring security and effective utilization.[2]
The integration of technology in modern business has brought about a revolutionary transformation by automating processes and enhancing efficiency. Today, businesses are leveraging technology to gain a competitive edge, improve customer experience, and optimize resource allocation. Emerging technologies such as artificial intelligence (AI), machine learning (ML), and robotic process automation (RPA) are now part of a solid business strategy. These technologies help businesses to streamline operations, reduce human error, and optimize resource allocation. For instance, AI-powered chatbots can help businesses to provide 24/7 customer support, while RPA can automate repetitive tasks, thus freeing employees to focus on more complex tasks.[3]
Big Data: The Foundation of Modern Business Intelligence (BI)
Big data refers to datasets that are so large and complex that traditional data-processing methods cannot handle them. Its defining characteristics are volume, velocity, variety, veracity, and value (the 5Vs). Organizations use big data to gain actionable insights by analyzing patterns and trends across various domains. It impacts various sectors, including transportation, finance, marketing, and healthcare.

Here are a few ways some companies use Big Data:[4]
- Customer Insights: Retailers like Amazon use big data analytics to personalize recommendations and understand purchasing behavior.
- Operational Efficiency: Manufacturing firms optimize supply chains and predict equipment maintenance needs using big data.
- Market Analysis: Businesses employ big data to identify emerging market trends and competitive analysis.
The financial industry puts Big Data and analytics to highly productive use, for:[5]
- Fraud detection: Banks monitor credit cardholders’ purchasing patterns and other activity to flag atypical movements and anomalies that may signal fraudulent transactions.
- Risk management: Big Data analytics enable banks to monitor and report on operational processes, KPIs, and employee activities.
- Customer relationship optimization: Financial institutions analyze data from website usage and transactions to better understand how to convert prospects to customers and incentivize greater use of various financial products.
- Personalized marketing: Banks use Big Data to construct rich profiles of individual customer lifestyles, preferences, and goals, which are then utilized for micro-targeted marketing initiatives.
Big data presents challenges in storage, processing, and ensuring the accuracy of analyses. Companies need robust infrastructures and skilled professionals to extract meaningful insights from massive datasets.
Data Security: Protecting Valuable Assets
Data security is paramount to protect sensitive information from breaches, unauthorized access, and cyberattacks. As businesses store vast amounts of data, securing this information is critical to maintaining customer trust and meeting regulatory requirements. For example, financial institutions implement advanced cybersecurity measures, such as anomaly detection systems, to protect customer data.[6] The 2017 Equifax data breach exposed the personal data of over 147 million individuals due to unpatched software vulnerabilities, underscoring the importance of proactive cybersecurity measures.[7]
A few of the major threats include:
- Cyberattacks: Incidents like ransomware and phishing attacks can compromise sensitive information.
- Insider Threats: Employees or contractors with malicious intent pose risks.
- Third-Party Vulnerabilities: Vendors and supply chain partners with inadequate security measures may expose a business’s data.
A few of the best practices include:
- Encrypting sensitive data both in transit and at rest.
- Regularly updating security software and protocols.
- Training employees to recognize potential threats.
Information Sharing: Collaboration and Risks
Effective information sharing is crucial for fostering collaboration and improving decision-making both within and across organizations. For instance, supply chain partners exchange real-time inventory data to streamline logistics, minimize delays, and enhance operational efficiency. While seamless information flow supports collaboration, it also introduces potential risks, particularly in terms of data security and privacy. To mitigate these risks, companies rely on secure communication platforms such as Slack or Microsoft Teams, implementing stringent access controls to safeguard sensitive information. A notable example is McDonald’s, which collects and analyzes data from its global outlets to refine its drive-thru service, optimize customer experiences, and customize its digital offerings based on local preferences and patterns. By balancing efficient information sharing with robust security measures, companies can unlock operational efficiencies while protecting their data.[8]
While information sharing offers significant benefits, it also carries inherent risks. Shared data can be misappropriated or lead to privacy violations, and the use of interconnected networks can amplify the risk of a breach affecting multiple stakeholders simultaneously. This makes it essential for organizations to prioritize security when facilitating the exchange of information.
Fortunately, advancements in technology provide robust solutions to ensure secure information sharing. Blockchain technology, for instance, guarantees data integrity and secure transactions in decentralized environments, making it ideal for safeguarding shared information. Additionally, secure file sharing platforms like Dropbox Business and Google Workspace offer controlled access to sensitive data, enabling organizations to manage permissions and protect confidential information while still fostering collaboration. These technologies help mitigate the risks associated with information sharing by providing a secure, transparent, and efficient means of exchanging data.
Play the YouTube video below, “What are the Six Important Business Objectives of Information Technology?” to learn more about how technology supports business processes. [9] Transcript for “What are the Six Important Business Objectives of Information Technology?” Video [PDF–New Tab]. Closed captioning is available on YouTube.
Information Mining and Visualization
Data mining is the process of extracting valuable patterns, trends, and relationships from large volumes of data. Businesses leverage various techniques such as clustering, classification, and predictive modeling to uncover actionable insights that drive decision-making and strategic initiatives. Two common examples of data mining applications are:
- Fraud Detection: Financial institutions, like banks, use data mining techniques to analyze transaction patterns and identify anomalies that may indicate fraudulent activities. By recognizing these unusual patterns, banks can take proactive measures to prevent fraud and protect customer assets.
- Customer Segmentation: Marketers apply clustering algorithms to group customers based on shared characteristics and behaviors. This allows companies to target specific demographics with tailored marketing strategies, improving customer engagement and boosting sales.
By utilizing data mining, organizations can gain deeper insights into their operations, enhance decision-making, and improve customer experiences. Data mining helps businesses identify market trends, predict consumer behavior, and reduce business risk by uncovering hidden patterns in customer data.
Information mining, on the other hand, is sometimes used as a broader term that encompasses the process of gathering, analyzing, and extracting knowledge from various sources, not just data. It can refer to the process of mining both structured data (e.g., databases) and unstructured information (e.g., text documents, websites, or social media content) to uncover valuable insights. While data mining focuses primarily on the extraction of patterns from large datasets, information mining may involve a more general exploration of data and unstructured information for knowledge discovery. In many cases, especially in business and analytics, the terms overlap, and “data mining” is more commonly used to describe the specific practice of extracting valuable patterns from large data sets.
Visualization converts data into graphical representations, making complex datasets easier to understand and interpret. Popular tools include Tableau, Power BI, and Google Charts. Netflix uses advanced visualization to analyze viewer data and recommend personalized content, increasing customer retention and satisfaction.[10]
Information mining and visualization facilitates quick understanding of trends and anomalies and enhances communication of findings to stakeholders.
Despite the advantages, these technologies come with challenges such as privacy concerns and ethical dilemmas. Organizations must balance innovation with regulatory compliance to build trust with customers and stakeholders.[11]
Information Management: An Integrated Approach
Information management encompasses the collection, storage, organization, and distribution of information to optimize business operations and decision-making. Managing large volumes of information comes with some challenges. It requires balancing accessibility with security and avoiding information silos that hinder collaboration.[12]
Some of the key elements in information management include:
- Data Governance: Establishes policies and procedures for data quality, security, and compliance.
- Technology Infrastructure: Includes databases, cloud systems, and analytics platforms.
- Employee Training: Ensures staff can effectively use and manage information systems.
A few trends in information management include:
- Artificial Intelligence: AI streamlines information processing and improves decision-making.
- Cloud Adoption: Cloud platforms offer scalable and cost-effective solutions for information management.
- Automation: Robotic Process Automation (RPA) enhances efficiency in repetitive data tasks.
Future Trends in Business Information
- Edge Computing: With the rise of IoT devices, edge computing processes data closer to its source, reducing latency and enhancing real-time decision-making.
- Ethical AI and Data Use: As AI becomes central to information systems, ensuring ethical use and avoiding biases in data-driven decisions will be critical.
- Advanced Cybersecurity Measures: Innovations like quantum encryption are expected to redefine data security.
Business information plays a crucial role in today’s competitive environment. Leveraging big data, ensuring data security, adopting efficient information-sharing mechanisms, and using visualization tools can provide significant advantages. However, these benefits come with challenges, including cyber threats, compliance requirements, and data overload. Organizations must adopt best practices in information management and invest in emerging technologies to stay resilient and competitive in a data-driven world.[13]
Self-Check Exercise: Information Management Drag-the-Words
Check your understanding of information management concepts by completing this short self-check quiz.
Risk Management in Business Operations
Risk is defined according to its context. For example, if you are camping in the woods there is the risk of meeting a bear; if you are walking down stairs there is the risk of falling; if you are investing in stocks there is the risk of losing money, if you are hiring a new employee there is the risk they won’t work out, and so on.
Business risk refers to the potential for a company to experience financial losses or other challenges that could impact its ability to achieve its objectives. These risks arise from uncertainties in the internal and external environment in which the business operates.
Organizations face a wide array of uncertainties that can disrupt operations, threaten profitability, and damage reputation. Whether it’s market volatility, technological disruptions, or regulatory changes, the ability to anticipate, assess, and mitigate risks has become a crucial part of successful management. This is where risk management comes into play.[14] Risk management is how organizations anticipate and address potential threats. Risk management in business is a structured process that identifies, evaluates, and mitigates risks to minimize their impact.
Types of Business Risks
Understanding the various types of risks helps leaders create a risk mitigation plan tailored to their specific industry. Here’s a look at some key risk categories:
- Operational risk arises from internal processes, people, and systems.
- Financial risk, which is related to financial operations and transactions.
- Strategic risk stems from business strategies and industry changes.
- Compliance risk is due to legal and regulatory requirements.
- Reputational risk impacts public perception and brand reputation.
- Market risk is a result of market dynamics like price and demand fluctuations.
- Credit risk due to potential default on financial obligations.
- Technology risks include cybersecurity threats and system failures.
Real Versus Perceived Risk

Real risks are backed by data, evidence, or historical trends. They are measurable and often require proactive mitigation. For example, there is a real risk of a car accident when driving on icy roads during a Canadian winter. This is a genuine hazard as icy conditions have been proven to increase the likelihood of accidents. Individuals can mitigate this risk by installing winter tires, reducing speed, and checking weather reports. A real risk to a manufacturing company is supply chain disruptions due to geopolitical tensions or natural disasters. These risks can halt production or increase costs. By diversifying suppliers, maintaining inventory buffers, and creating contingency plans a manufacturing company can mitigate this risk.
Perceived risks are based on feelings, fears, or assumptions and may lack concrete evidence. They often result from misinformation, cognitive biases, or heightened awareness. For example, some people have a fear of flying in an airplane due to hearing about high-profile crashes or turbulence, despite the fact that air travel is statistically much safer than driving. The perception arises from media coverage and the dramatic nature of plane crashes compared to car accidents. A perceived risk for a business starting up is competition from established companies within its market. While this is a valid concern, the more pressing real risk might be inadequate cash flow or poor internal management, which pose a higher likelihood of failure. The perceived risk may distract management from addressing the more immediate operational risks.
It’s important to differentiate real risks from perceived risks in both personal and business contexts. This allows individuals and companies to allocate resources and attention effectively to mitigate genuine threats while avoiding unnecessary anxiety or misdirection.
Risk Tolerance
Risk tolerance in a business context refers to the degree of uncertainty and potential loss an organization is willing to accept to achieve its objectives. It reflects the company’s capacity and willingness to take on risks as part of its strategy and decision-making processes.
Factors influencing business risk tolerance include:
- Industry and market environment.
- Financial stability.
- Leadership and culture.
- Strategic goals.
- Regulatory and ethical constraints.
A startup investing heavily in research and development (R&D) for an untested product is an example of high risk tolerance. While the potential for failure is high, the company is willing to take the risk for significant market rewards. Example: Tesla’s early years involved large investments in electric vehicle technology without guaranteed returns.
A family-owned retail business focusing on incremental growth and avoiding aggressive expansion to preserve stability is an example of low risk tolerance. Example: A local grocery store choosing to maintain its single location rather than expanding into new markets.
Risk tolerance must align with the company’s mission, values, and objectives to avoid taking on unnecessary risks or missing growth opportunities. Businesses must periodically reassess their risk tolerance to adapt to changing internal and external conditions, such as market shifts, economic downturns, or technological advancements.
Personal risk tolerance refers to an individual’s ability or willingness to accept uncertainty and potential loss in pursuit of a goal. It plays a critical role in decision-making, particularly in areas like investments, career choices, and lifestyle decisions. While personal risk tolerance focuses on individual comfort and goals, business risk tolerance considers organizational objectives, resources, and stakeholder expectations. However, both require balancing the potential for loss with the pursuit of rewards.
Risk Management
Risk management is the structured process of identifying potential threats, evaluating their likelihood and impact, and developing strategies to minimize or eliminate their adverse effects. By integrating risk management into their decision-making processes, organizations can not only safeguard their assets but also seize opportunities that arise from taking calculated risks.[15]
The five primary steps in risk management are as follows:[16]
- Identify Risks. Recognize potential risks that could negatively affect the business.
- Analyze Risks. Analyze and assess the likelihood and potential impact of each risk.
- Evaluate and Prioritize Risks. Determine which risks require immediate attention and resources.
- Implement Risk Controls. Develop and apply strategies to mitigate, transfer, accept, or avoid risks.
- Monitor and Review. Continuously track risks and the effectiveness of implemented controls.
Best business practices in risk management include:[17]
- Involving all levels of the organization in risk management discussions.
- Maintaining documentation for accountability and future reference.
- Using a risk management framework like ISO 31000.

Proactive risk management helps businesses safeguard operations, protect resources, and adapt to uncertainties effectively.
To mitigate business risks, companies can take a variety of proactive measures designed to identify, mitigate, and manage risks.
Here are several strategies businesses can adopt:
- Forecasting, planning and budgeting.
- Align projects with company goals, budget for innovation, plan contingencies, etc.
- Performing environmental scan before making decisions.
- SWOT, PEST, Porter’s Five Forces to analyze the industry’s competitive forces, specific competitor analysis, and others.
- Purchasing insurance to cover the business, employees, customers.
- Injuries, theft, damage, fire, etc.
- Implementing Safety Protocols.
- Provide training for employees, personal protective equipment when warranted, emergency response plans, and evacuation procedures to help prevent accidents or injuries.
- Diversifying suppliers and markets.
- More than one supplier, geographical locations, customer bases.
- Creating effective risk assessment and management frameworks.
- Conduct regular risk assessments, identify risks early, establish a risk management framework.
- Building strong financial reserves.
- Emergency funds, investments, cashflow.
- Safeguarding intellectual property.
- Patents, trademarks, copyrights, and trade secrets.
- Following the law and making ethical decisions.
- Adhering to industry regulations, employment law, contract law, human rights, taxation, etc.
- Training and developing employees.
- Clear communication, compliance training, choosing the right people and teams, etc.
- Improving supply chain transparency and collaboration.
- Improve transparency and communication with suppliers and other stakeholders.
- Developing crisis management and business continuity planning.
- Developing a crisis management plan and business continuity plan.
- Using metrics.
- Input metrics, development metrics, and output metrics.
- Integrating technology for efficiency and security.
- Project software, data security, data privacy, ERP systems, data analytics, employee access to systems, data storage, etc.
- Creating partnerships to share the risks.
- With government, competitors, customers, suppliers, etc.
- Reviewing risk management strategies.
- Regularly review risk management strategies and adapt them as needed. This includes monitoring new market trends, technological developments, and regulatory changes.
By taking these steps, businesses can significantly reduce risks and increase their resilience in the face of uncertainties. Proactively managing risks and having plans in place can help companies avoid disruptions and maintain their long-term success.
Risk Management Across Different Sectors
Risk management helps organizations anticipate and address potential threats and uncertainties in areas such as:
Project Management
Risk management is equally important in project management, where uncertainties and potential risks can significantly impact project success. By incorporating risk management into project planning and execution, project managers can identify potential obstacles, allocate resources effectively, and implement contingency plans to minimize project delays and cost overruns. Almost everything that happens in a business is a project. For example, developing a new product, implementing a new process, hiring a new employee, upgrading to a new computer system–all business projects. Most likely you will be part of one of these types of project teams in the future.
Creating a comprehensive project plan is crucial for ensuring the smooth execution and successful completion of any project. A well-structured plan serves as a strategic guide, detailing the tasks, timelines, required resources, and project objectives necessary to meet the desired outcomes. For example, consider a large organization undertaking the implementation of an enterprise resource planning (ERP) system.
To manage potential project risks effectively, the organization could take several key actions:
- First, it would identify potential risks such as data migration challenges, gaps in employee training, and potential system downtimes that could disrupt operations.
- Next, the organization would implement strategies to mitigate these risks, including conducting pilot tests, selecting a vendor with a strong track record in similar projects, and ensuring thorough and ongoing staff training before the full system rollout. Additionally, the organization would establish a clear project scope and deliverables to avoid scope creep, ensure that all stakeholders are aligned on expectations, and set realistic milestones.
- Third, the organization would implement strong change management practices to address any resistance to new technology and processes, providing employees with clear communication and support throughout the transition. Furthermore, it would allocate a contingency budget to cover any unforeseen issues that may arise during the project.
- Finally, the organization would closely monitor progress through regular project team meetings, maintain open communication about project goals and timelines, and establish feedback loops to address emerging issues proactively, ensuring that the project stays on track and any risks are promptly managed.
Project management tools can help reduce risks. Tools like Trello, Asana, Monday.com and Microsoft Project help organize tasks, track progress, and manage resources. Gantt Charts and PERT Charts are visual timelines that show project progress against deadlines. While both visualize timelines, Gantt charts are more explicit about specific dates, whereas PERT charts emphasize task relationships and sequences without necessarily focusing on calendar-specific details. Many project managers use both tools together for comprehensive project planning and execution. RiskWatch is risk management software that tracks and analyzes risks.
Information Technology
Information technology (IT) is another sector where risk management is of utmost importance. With the increasing reliance on digital systems and the rise of cyberthreats, organizations must implement robust risk management practices to protect sensitive data, maintain system integrity, and ensure business continuity. Cybersecurity risks, such as data breaches and malware attacks, can have severe consequences, including financial losses and reputational damage.
Information risk management is defined as the policies, procedures, and technology an organization adopts to reduce the threats, vulnerabilities, and consequences that could arise if data is not protected.[18]
To continuously manage information risk, a business should do the following:[19]
- Use Security Performance Monitoring. Software can help a business monitor for emerging vulnerabilities such as identifying and alerting the business to misconfigured software, unpatched systems, open ports, and anomalies in user behaviour. It also ranks areas of disproportionate risk, allowing security teams to prioritize where to allocate resources.
- Measure Security Effectiveness. Software can provide data-driven views of how effective the business’s information security efforts are and help maintain alignment with compliance requirements. Findings are presented as a numerical score making it easy to convey security risks and the organization’s cyber readiness in terms that all stakeholders can understand.
- Manage Third-Party Risks: Third-party vendors and partners are an integral part of modern business operations but also introduce significant risk. Mitigate supply chain risk by measuring, verifying, and continuously monitoring vendors’ security postures – without relying on manual, subjective, point-in-time assessments. If a vendor’s security performance drops below a pre-agreed risk threshold, the business will receive automatic alerts and insights that can be shared with your vendors, making third-party risk management a more collaborative process.
Finance
In the financial sector, risk management is crucial for banks, insurance companies, and investment firms. These institutions face a wide range of risks, including credit risk, market risk, operational risk, and liquidity risk. Effective risk management practices in the financial industry help ensure stability and prevent financial crises. Canadian financial institutions face an increasingly complex regulatory web as regulators in Canada and globally are imposing greater pressures to assess, monitor and mitigate regulatory and operational risks. Also, today’s financial institutions need to keep up with new regulations, deal with new issues, including those created by remote work and emerging technologies, and manage the human resources and technological requirements to get the job done. The speed of change is rapid and the demands are increasing.[20]
Risk management in the financial world is the process of identification, analysis, and acceptance or mitigation of uncertainty in investment decisions. Essentially, risk management occurs when an investor or fund manager analyzes and attempts to quantify the potential for losses in an investment.
A few of the alternatives financial institutions might choose to mitigate to risk include:
- Credit risk. Establish strict loan approval criteria and conduct creditworthiness evaluations.
- Market risk. Hedge against fluctuations using derivatives and portfolio diversification.
- Operational risk. Implement strong internal controls and compliance programs.
JPMorgan Chase uses advanced data analytics and stress-testing models to manage its credit and market risk exposures. It also employs a robust cybersecurity framework to protect against data breaches, integrating these efforts into its broader enterprise risk management strategy.[21]
The financial industry’s reliance on technology, global markets, and complex financial instruments underscores the importance of a proactive and comprehensive approach to risk management.
Health Care

The healthcare industry relies heavily on risk management to ensure patient safety and quality of care. Health care organizations face risks related to medical errors, patient privacy breaches, and regulatory compliance. By implementing robust risk management strategies, providers can identify and mitigate potential risks, leading to improved patient outcomes and reduced legal liabilities.
Risks in health care include medication errors, patient safety incidents (e.g., falls, infections), data breaches involving patient records, and legal risks from malpractice claims. Strategies to reduce risks might include staff training, installing electronic health records with safety checks, and ensuring compliance with infection control protocols.
Some challenges experienced in the health care sector include balancing patient care with cost control, integrating new technologies without compromising security, and navigating evolving regulations and industry standards.
Risk management in healthcare requires a proactive and multidisciplinary approach, involving clinicians, administrators, and compliance experts to create a safe and efficient care environment.
Supply Chain Management
Supply chain management is yet another area where effective risk management is critical. Supply chains are vulnerable to various risks, such as disruptions in logistics, supplier failures, and natural disasters. By implementing risk management strategies, organizations can identify potential vulnerabilities, establish alternative supply sources, and develop contingency plans to minimize the impact of supply chain disruptions.
Here are a few examples of supply chain risks:
- Natural Disasters: Earthquakes, hurricanes, or floods can damage infrastructure or halt production, as seen in the aftermath of the 2011 earthquake in Japan, which disrupted global supply chains, particularly in the automotive and electronics sectors.
- Global Pandemic: The COVID-19 pandemic disrupted the supply chain globally as it caused widespread factory shutdowns. The directly impacted industries were electronics, automotive, and consumer goods. COVID-19 revealed numerous vulnerabilities in supply chains, from reliance on single-source suppliers to inadequate risk management practices for global disruptions. Many companies have since adapted by diversifying suppliers, investing in digital technologies for better supply chain visibility, and rethinking inventory strategies.
- Geopolitical Risks: Trade wars, tariffs, and sanctions, like the U.S.-China trade war, can disrupt international supply chains, leading to delays, cost increases, and changes in supplier strategies.
- Cybersecurity Risks: Data breaches, such as the 2020 cyberattack on a major food distributor, can compromise sensitive information, causing financial and reputational damage.
Technological Tools in Supply Chain Relationship Management that help monitor and reduce risks:
- Supply Chain Mapping: Tools like RiskMethods and Resilience360 help companies map their entire supply chain to visualize risks.
- Predictive Analytics: Software like Llamasoft and SAP Integrated Business Planning use AI and machine learning to forecast risks and optimize supply chain operations.
- Blockchain: Companies like IBM and Maersk have used blockchain technology to improve transparency and reduce fraud risks in supply chains.
Supply chain risk management is a critical component of modern business operations, enabling companies to proactively handle disruptions, reduce costs, and improve their resilience. By using a combination of strategic planning, risk assessment, and technological solutions, companies can minimize vulnerabilities and maintain a competitive edge even in times of uncertainty.
Risk Response Strategy

The choice of risk response for an organization depends on:[22]
- Severity of Risk: High-impact risks often require avoidance or mitigation.
- Cost-Benefit Analysis: The cost of mitigating or transferring the risk must be balanced against the potential impact.
- Organizational Goals: Align the response with strategic priorities and resources.
- Risk Appetite: An organization’s willingness to tolerate certain risks plays a significant role in determining the response.
Risk response strategies include:[23]
- Avoidance.
- Definition: Eliminating the risk entirely by choosing not to engage in the activity or decision that creates the risk.
- Example: A company decides not to launch a product in a highly unstable market to avoid financial losses.
- When to Use: For high-probability, high-impact risks that cannot be mitigated to acceptable levels.
- Mitigation (Reduction).
- Definition: Reducing the likelihood or impact of a risk to acceptable levels through preventive measures.
- Example: Implementing stronger cybersecurity protocols to reduce the likelihood of data breaches.
- When to Use: For risks that are manageable with controls and investments.
- Transfer (Sharing).
- Definition: Shifting the risk to a third party, such as through insurance, outsourcing, or contracts.
- Example: Purchasing insurance for liability protection or hiring a third-party logistics provider to manage shipping risks.
- When to Use: For risks that are costly to manage internally or are outside the organization’s expertise.
- Acceptance (Retention).
- Definition: Acknowledging the risk and choosing to accept its potential impact without taking specific preventive measures.
- Example: A startup accepts the risk of initial financial losses while developing its product.
- When to Use: For low-impact, low-probability risks or when the cost of mitigation exceeds the potential loss.
- Exploitation (for Opportunities).
- Definition: Taking actions to ensure a positive risk (opportunity) is fully realized.
- Example: Expanding into a new market based on favorable conditions or trends.
- When to Use: For risks that present clear potential benefits if managed correctly.
- Enhancement (Opportunity-Related).
- Definition: Increasing the likelihood or impact of a positive risk.
- Example: Strengthening relationships with a key supplier to secure better terms or reliability.
- When to Use: When opportunities can be leveraged with added effort or resources.
An example, a software company identifies the risk of data breaches in its cloud storage services. It may choose one of the following risk responses:[24]
- Avoidance: Discontinue offering cloud storage services.
- Mitigation: Invest in encryption and security monitoring tools.
- Transfer: Obtain cybersecurity insurance to cover potential breaches.
- Acceptance: Accept the risk and allocate funds to cover potential damages.
Risk response planning ensures risks are managed proactively, helping businesses achieve their objectives while minimizing potential disruptions.
Risk Management Standards
There are a number of risk management standards designed to consolidate best practice principles and help to streamline and improve risk management implementations for businesses. Another factor driving the standardization of risk management frameworks has been the increased scrutiny that organizations must face with regard to their risk management systems. Risk management systems are often required to stand up to rigorous internal audits and assessments, in order to prove that they are effective in their implementation, and that they are in line with company goals and objectives.
The family of risk management standards defined by ISO 31000 is one such example of a leading international standardization of a risk management approach.[25]
ISO refers to the International Organization for Standardization; the 31000 portion refers to a family of standards for risk management. As well as being an umbrella term for a bunch of different standards, ISO 31000 also refers to a singular standard, specifically known as ISO 31000:2018. This standard defines a set of guidelines for managing risk, designed to be used by organizations of any size, working in any area, to implement effective risk management systems. Unlike many other ISO standards like 9001 for quality management, or 14001 for environmental management, ISO 31000 is a set of guidelines. That means you can’t get an ISO 31000 certification in the same way you could for other standards with specific requirements. Nonetheless, ISO 31000 is a leading framework for organizations seeking to get started with risk management.
There are several standards organizations and committees that have developed risk management frameworks, guidance, and approaches that business teams can leverage and adapt for their own company.[26]
Some of the more popular risk management frameworks available include:
- ISO 31000 Family: The International Standards Organization’s guidance on risk management is broach and adaptable to various sectors and industries.
- NIST Risk Management Framework (RMF): The National Institute of Standards and Technology has released risk management guidance compatible with their Cybersecurity Framework (CSF).
- COSO Enterprise Risk Management (ERM): The Committee of Sponsoring Organizations’ enterprise risk management guidance. COSO ERM is highly strategic and focuses on aligning risk with organizational objectives.
- PMBOK and RIMS are more suited for project and insurance-related risks, respectively.
- FERMA and BS 31100 are more region-specific but still provide valuable guidelines for broader risk management practices.
- AIRMIC/IRM/ALARM Risk Management Standard is widely used in the UK to manage risks.
Each of these frameworks provides valuable insights and methods for organizations to manage risks effectively, but the choice of framework depends on the organization’s industry, structure, and specific risk management needs.
Emerging Trends in Risk Management
In the dynamic landscape of business and technology, the importance of effective risk management cannot be overstated. The ever-evolving global environment brings forth new challenges and opportunities that demand a proactive and adaptive approach to risk.[27]
Here are six of the key risk management trends shaping the corporate landscape (in 2024):
- Digital transformation and cybersecurity. Robust IT infrastructure and fostering a culture of cyber-awareness among employees. Continuous monitoring, threat intelligence, and advanced analytics are becoming essential components of a comprehensive cybersecurity risk strategy.
- Supply chain resilience. Building resilience by diversifying suppliers, embracing digital technologies like blockchain for transparent and traceable supply chains, and implementing contingency plans for unforeseen events.
- Environmental, social, and governance (ESG) risks. Assessing and mitigating risks related to climate change, social justice issues, and ethical business practices. Companies are realizing that effective ESG risk management not only aligns with societal expectations but also enhances long-term sustainability and reputation.
- Data privacy and compliance. Investing in robust data governance frameworks, ensuring that they not only comply with regulations but also uphold customer trust. Innovations in data anonymization and encryption technologies are gaining prominence to navigate the complex landscape of data privacy risks.
- Remote work and challenges. Managing remote teams, ensuring data security in dispersed environments, and addressing the mental health and well-being of employees. Risk management strategies now encompass policies and technologies that secure remote workspaces while fostering a supportive and inclusive organizational culture.
- Regulatory changes and geopolitical risks. Scenario planning for potential regulatory shifts, tariff impacts, and geopolitical tensions that may affect supply chains and market dynamics. The ability to navigate regulatory complexities has become a key differentiator for businesses operating on a global scale.
Key Takeaways
- Business information refers to collective data related to a company and its operations, including statistical information, raw analytical data, customer feedback, and sales numbers.
- Big data refers to datasets that are so large and complex that traditional data-processing methods cannot handle them. Its defining characteristics are volume, velocity, variety, veracity, and value (the 5Vs).
- Data mining involves extracting valuable patterns and relationships from large datasets. Businesses use techniques like clustering, classification, and predictive modeling to derive actionable insights.
- Data security is paramount to protect sensitive information from breaches, unauthorized access, and cyberattacks.
- Effective information sharing enhances collaboration and decision-making within and between organizations.
- Visualization converts data into graphical representations, making complex datasets easier to understand and interpret. Popular tools include Tableau, Power BI, and Google Charts.
- Information management encompasses the collection, storage, organization, and distribution of information to optimize business operations and decision-making.
- ISO refers to the International Organization for Standardization; the 31000 part refers to a family of standards for risk management. As well as being an umbrella term for a bunch of different standards, ISO 31000 also refers to a singular standard, specifically known as ISO 31000:2018.
- Business risk refers to the potential for a company to experience financial losses or other challenges that could impact its ability to achieve its objectives. These risks arise from uncertainties in the internal and external environment in which the business operates.
- Risk management is the structured process of identifying potential threats, evaluating their likelihood and impact, and developing strategies to minimize or eliminate their adverse effects.
- Real risks are backed by data, evidence, or historical trends. They are measurable and often require proactive mitigation.
- Perceived risks are based on feelings, fears, or assumptions and may lack concrete evidence. They often result from misinformation, cognitive biases, or heightened awareness.
- Risk tolerance in a business context refers to the degree of uncertainty and potential loss an organization is willing to accept to achieve its objectives. It reflects the company’s capacity and willingness to take on risks as part of its strategy and decision-making processes.
- Personal risk tolerance refers to an individual’s ability or willingness to accept uncertainty and potential loss in pursuit of a goal. It plays a critical role in decision-making, particularly in areas like investments, career choices, and lifestyle decisions.
- In the financial sector, risk management is crucial for banks, insurance companies, and investment firms. These institutions face a wide range of risks, including credit risk, market risk, operational risk, and liquidity risk. Effective risk management practices in the financial industry help ensure stability and prevent financial crises.
- The healthcare industry relies heavily on risk management to ensure patient safety and quality of care. Health care organizations face risks related to medical errors, patient privacy breaches, and regulatory compliance. By implementing robust risk management strategies, providers can identify and mitigate potential risks, leading to improved patient outcomes and reduced legal liabilities.
- Project risk management, where uncertainties and potential risks can significantly impact project success. By incorporating risk management into project planning and execution, project managers can identify potential obstacles, allocate resources effectively, and implement contingency plans to minimize project delays and cost overruns.
- Information risk management is defined as the policies, procedures, and technology an organization adopts to reduce the threats, vulnerabilities, and consequences that could arise if data is not protected
End-of-Chapter Exercises
- Big Data in Google Trends. Visit the Google Trends website and explore what Canada is searching right now. Assume you are a business that sells a product, for example, Harley Davidson motorbikes, or M&Ms Candy, or Nike shoes, use Google Trends to learn about the band’s popularity. Are people searching for that company’s brand? Which brands are most popular? Discuss with the class and/or professor how Google Trends might be useful to a business.
- Power BI Visualization. Download Power BI online for free. Review a simple “Getting Started” with Power BI tutorial. Try making a simple visualization. You may notice that the charts look similar to those in Excel. This is one of the tools businesses use to make visualizations. How did you do? Share your learning with the class and/or professor.
- Data Analytics. Use the Internet to research data analytics. What is it? How do companies use it? What kind of jobs are there in data analytics? Is this a field that is expanding? What is Google Data Analytics Certification about? Share your findings with the class and/or professor.
- Tableau for Students. Visit the Tableau for Students website. Review the resources for learning. What resources are available to students? Do you think it would be helpful to gain certification? What can you learn for free? Take a short course or module (your professor may assign a specific module) and share your experience with the class and/or professor.
- IT Monitoring. How does electronic monitoring impact your life as a student? Should the IT department at your college or university be monitoring emails and files? How might the goals of the institution come into conflict with the needs of the students on this issue? What if a student were to send a threatening email, should IT notify authorities? Who should judge what is deemed threatening?
- Managers’ Information Needs. Think of Walmart. Consider these three levels of management: 1) the manager in the store who is in charge of day-to-day operations, 2) the district manager who is in charge of several stores), and 3) the National or Regional Manager who manages sever districts within a region or country. Identify the information needs of the managers at each of these levels. Discuss with a partner, the class and/or professor.
- Data Security. What are some of the ways companies try to protect their data against hackers? What is a firewall? What is encryption? What can you do to protect yourself from being hacked or defrauded? Discuss with the class and/or the professor.
- ERP. Use the Internet to find one company that is using an ERP system to manage data. Does the company have multiple locations that are networked together to share data? What can you discover about the data the company stores, the security used to keep the data safe, and the information that is pulled from that data to support business operations and decisions? Share your findings with the class and/or professor.
- Personal Risk. Identify three personal risks you have taken over the past three years. What happened? How did you mitigate those risks? Did you change your behaviour or thinking afterward? Discuss with a partner, the class and/or the professor.
- Personal Risk Tolerance. Do you have a high or low risk tolerance? What have you done that demonstrates your risk tolerance? Provide three examples. Do you think your risk tolerance might change over time? Why or why not? Discuss with a partner, the class and/or the professor.
- Financial Risk Tolerance Quiz. Take one of these free risk tolerance quizzes to determine your investment risk tolerance level. Rugers Paper-based Quiz or finmasters Online Quiz.
- Risk Response Strategy. Select an extreme sport, for example rock climbing, zip lining, or white-water rafting (or other). What would your risk response strategy be? If it’s avoid, then let’s assume a friend of yours is going to do this. You and/or your friend sign up with a company that offers these sporting excursions. Make a list of the things you and/or your friend could do to mitigate the risks. Make another list of the things the company could do to mitigate the risks for their customers. Share your lists with a partner, the class and/or professor.
- Risk Failure. Use the Internet to find information on a company that took a risk and it failed. What happened? What risk response strategy did the company take, if any? Why do you think it failed? Summarize your findings and share them with the class and/or professor.
- Risk Success. Use the Internet to find information on a company that took a risk and it was successful in a big way. What happened? What risk response strategy did the company take, if any? Why was it so successful? Summarize your findings and share them with the class and/or professor.
- Remote Work. Does working remotely increase employee productivity? What are the pros and cons for employers of allowing employees to work from home? What are the pros and cons of working from home for employees? Would you like a job where you work from home? Why or why not? What types of people might like to work from home? Discuss with the class and/or professor.
Self-Check Exercise: Risk Management Quiz
Check your understanding of risk management concepts by completing this short self-check quiz.
Additional Resources
- What are the 4 Concepts of Business Intelligence? YouTube Video.
- The Intersection of Business and Technology: An Interview with Mike Jackowski, CEO, Duck Creek. YouTube Video.
- Report a Privacy Breach at Your Organization.
- Get Started with Google Analytics. YouTube Video.
- Risk Management, Judgement, and Decision-Making OER
- Risk Management, Supply Chain and Operations Perspective OER
- What is Information Risk Management?
- The 7 Best Free and Open Risk Management Software
- Innovation Metrics. YouTube Video.
- Google Data Analytics Professional Certificate
- Google Foundations: Data, Data, Everywhere Course.
Attributions
The contents of this chapter is a compilation sourced from various OER resources, please refer to the Book Information for details.
References
(Note: This reference list was produced using the auto-footnote and media citation features of Pressbooks)
Media Attributions
- Standing Beside Server Racks © Christina Morillo | Pexels
- Hanging on Zip Line © Alexandre Cubateli Zanin | Pexels
- Analyzing Data © Tima Miroshnichenko | Pexels
- Medical Operation © sasint | Pixabay
- Electrical Box © Erik McLean | Pexels
- Indeed Editorial Team. (2024, August 15). What is data in business? (Plus importance and examples). https://www.indeed.com/career-advice/career-development/data-in-business ↵
- Arora, R. (2024, August 23). Technology in today's business world. https://www.m-inc.com/article/the-role-of-information-technology-in-todays-business-world/ ↵
- U-Tech Electronics. (n.d.). The impact of technology on modern business: A comprehensive analysis. https://utech.co/blog/the-impact-of-technology-on-modern-business/ ↵
- Hillier, W. (2023, September 23). What are some real-world examples of big data? https://careerfoundry.com/en/blog/data-analytics/big-data-examples/ ↵
- MongoDB. (n.d.). 9 big data examples & use cases. https://www.mongodb.com/resources/basics/big-data-explained/examples ↵
- MongoDB. (n.d.). 9 big data examples & use cases. https://www.mongodb.com/resources/basics/big-data-explained/examples ↵
- Equifax. (n.d.). Equifax. https://www.equifax.com/ ↵
- Hillier, W. (2023, September 23). What are some real-world examples of big data? https://careerfoundry.com/en/blog/data-analytics/big-data-examples/ ↵
- BusinessGuide360. (2024, November 30). What are the six important business objectives of information technology?. [Video]. YouTube. https://www.youtube.com/watch?v=4IvdzLRyDSo ↵
- Hillier, W. (2023, September 23). What are some real-world examples of big data? https://careerfoundry.com/en/blog/data-analytics/big-data-examples/ ↵
- Hillier, W. (2023, September 23). What are some real-world examples of big data? https://careerfoundry.com/en/blog/data-analytics/big-data-examples/ ↵
- MongoDB. (n.d.). 9 big data examples & use cases. https://www.mongodb.com/resources/basics/big-data-explained/examples ↵
- MongoDB. (n.d.). 9 big data examples & use cases. https://www.mongodb.com/resources/basics/big-data-explained/examples ↵
- Peterson, O. (2019, August 9). The ultimate risk management guide: Everything you need to know. https://www.process.st/risk-management/ ↵
- Peterson, O. (2019, August 9). The ultimate risk management guide: Everything you need to know. https://www.process.st/risk-management/ ↵
- IMD. (2024, November). Risk management: Understanding the basics and importance. https://www.imd.org/blog/management/risk-management/ ↵
- OpenAI. (2023). ChatGPT (Jan 21 version) [Large language model]. https://chat.openai.com ↵
- Holmes, R. (2024, June 4). What is information risk management? https://www.bitsight.com/blog/what-is-information-risk-management ↵
- Holmes, R. (2024, June 4). What is information risk management? https://www.bitsight.com/blog/what-is-information-risk-management ↵
- BCCampus. (2022). Fundamentals of business. https://pressbooks.bccampus.ca/fundamentalsbusiness/chapter/chapter-17-financial-decisions-and-risk-management/ ↵
- OpenAI. (2023). ChatGPT (Jan 21 version) [Large language model]. https://chat.openai.com ↵
- OpenAI. (2023). ChatGPT (Jan 21 version) [Large language model]. https://chat.openai.com ↵
- OpenAI. (2023). ChatGPT (Jan 21 version) [Large language model]. https://chat.openai.com ↵
- OpenAI. (2023). ChatGPT (Jan 21 version) [Large language model]. https://chat.openai.com ↵
- Peterson, O. (2019, August 9). The ultimate risk management guide: Everything you need to know. https://www.process.st/risk-management/ ↵
- Villanueva, E. (2023, August 16). Risk management 1010: Process, examples, strategies. https://www.auditboard.com/blog/risk-management-101/ ↵
- Aragon Research. (2024, January 5). 6 emerging risk management trends in 2024. https://aragonresearch.com/6-emerging-risk-management-trends-in-2024/ ↵
Business information refers to collective data related to a company and its operations, including statistical information, raw analytical data, customer feedback, and sales numbers.
Big data refers to datasets that are so large and complex that traditional data-processing methods cannot handle them. Its defining characteristics are volume, velocity, variety, veracity, and value (the 5Vs).
Data security is paramount to protect sensitive information from breaches, unauthorized access, and cyberattacks.
Effective information sharing enhances collaboration and decision-making within and between organizations.
Data mining involves extracting valuable patterns and relationships from large datasets. Businesses use techniques like clustering, classification, and predictive modeling to derive actionable insights.
Visualization converts data into graphical representations, making complex datasets easier to understand and interpret. Popular tools include Tableau, Power BI, and Google Charts.
Information management encompasses the collection, storage, organization, and distribution of information to optimize business operations and decision-making.
Business risk refers to the potential for a company to experience financial losses or other challenges that could impact its ability to achieve its objectives. These risks arise from uncertainties in the internal and external environment in which the business operates.
Real Risks are backed by data, evidence, or historical trends. They are measurable and often require proactive mitigation.
Perceived Risks are based on feelings, fears, or assumptions and may lack concrete evidence. They often result from misinformation, cognitive biases, or heightened awareness.
Risk tolerance in a business context refers to the degree of uncertainty and potential loss an organization is willing to accept to achieve its objectives. It reflects the company's capacity and willingness to take on risks as part of its strategy and decision-making processes.
Personal risk tolerance refers to an individual's ability or willingness to accept uncertainty and potential loss in pursuit of a goal. It plays a critical role in decision-making, particularly in areas like investments, career choices, and lifestyle decisions.
Risk management is the structured process of identifying potential threats, evaluating their likelihood and impact, and developing strategies to minimize or eliminate their adverse effects.
ISO refers to the International Organization for Standardization; the 31000 part refers to a family of standards for risk management. As well as being an umbrella term for a bunch of different standards, ISO 31000 also refers to a singular standard, specifically known as ISO 31000:2018.