Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Course Outcome

Apply lessons learned from real-world situations to present day business-continuity planning/disaster-recovery planning (BCP/DRP)

Assess risk to the continuity of business processes

Analyze "what-if scenarios

Describe Continuity of Operations Planning

Describe risk and analyze risk strategies

Assignment Instructions

This is the first individual assignment that will start to inform your phased group activity. Using the business scenario information provided by your instructor, you will identify and prioritize four critical business processes for each business area and perform a risk assessment following the Risk Assessment Form provided by the instructor and as identified by further research.

1. Your business areas should be well defined and appropriate to the case studies. The four critical processes per business area should be clearly explained and correctly relates to the case study.

2. You should conduct a risk assessment for the business area and four critical processes, ensuring that these are well defined and appropriate to the case study.

3. The risk assessment categories (columns) should be complete and measures clearly defined.

4. The mitigation strategy, additional measures, and contingency plan for the risk should be well defined and mapped to the business area and four critical processes.

Additional Guidance for Completing the Spreadsheet:

What is a business area in this scenario?

As discussed in the scenario which is one of the attachments for this assignment, there are several business areas noted: Accounting, marketing, human Resources, and payroll. You are to list these (and you can use your own names or labels), then identify four critical business processes for each area. For example:

Accounting:

• Creating billing invoices

• Management company financial assets

• Producing financial reports

• Collecting customer payments

After laying out those 4 processes (these are just examples), you will then work through the matrix. Without this, it is hard to just take a generalized business area and provide mitigation steps.

So, on your risk assessment spreadsheet, please ensure that you state the business areas and then provide 4 processes for each of these areas. You will then assess the risk for each of the four processes as you traverse across the matrix.

Probability of Occurrence:

Very Likely: 91-100%
Likely to occur: 61-90%
May occur about half of the time: 41-60%
Unlikely: 11-40%
Very unlikely to occur: 0-10%

Impact Intensity:

The impact intensity of the risk can be categorized as High, Medium and Low depending on how critical the risk and its effects can be.

Existing Measures:

The policies, procedures, and resources which are already available to prevent or reduce the impact of the risk.

Mitigation Strategies:

After analyzing all the aspects of the risks and the existing preventive measures that can be used, the project team needs to decide on the mitigation strategy to deal with the risk. There can be four different mitigation strategies. Please note that various risk management guides will provide other flavors of mitigation strategies, but for purposes of this assignment, let's go with the following:

Risk Avoidance:

Risk avoidance is the opposite of risk acceptance. It is the action that avoids any exposure to the risk whatsoever. Risk avoidance is usually the most expensive of all risk mitigation options.

Risk Transference:

Risk transference is the involvement of handing risk off to a willing third party. For example, numerous companies outsource certain operations such as customer service, payroll services, etc. This can be beneficial for a company if a transferred risk is not a core competency of that company. It can also be used so a company can focus more on their core competencies.

Risk Limitation:

Risk limitation is the most common risk management strategy used by businesses. This strategy limits a company's exposure by taking some action. It is a strategy employing a bit of risk acceptance along with a bit of risk avoidance or an average of both. An example of risk limitation would be a company accepting that a disk drive may fail and avoiding a long period of failure by having backups.

Risk Acceptance:

Risk acceptance does not reduce any effects, however, it is still considered a strategy. This strategy is a common option when the cost of other risk management options such as avoidance or limitation may outweigh the cost of the risk itself.

A company that doesn't want to spend a lot of money on avoiding risks that do not have a high possibility of occurring will use the risk acceptance strategy. Mitigation strategies taken from:

Additional Measures:

This field needs to be filled in only for those risks for which control mitigation strategies are decided.

Contingency Plan:

A contingency plan can also be added for high impact risks with a high probability of occurrence, just in case the basic measures fail to perform.

Attachment:- Project Scenario.rar

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92510884
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Management Information System

Explain the need for designing procedures for simple tasks

Explain the need for designing procedures for simple tasks such as creating or modifying access controls. Create a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can fo ...

You are a member of the human resources department of a

You are a member of the Human Resources Department of a medium-sized organization that is implementing a new interorganizational system that will impact employees, customers, and suppliers. Your manager has requested tha ...

Assignment waterfall and agileresearch agile methodologies

Assignment : Waterfall and Agile Research agile methodologies including SCRUM and extreme programming (XP). Write a three to four (3-4) page paper in which you: Explain waterfall methodologies and identify their relation ...

Assignment business rules and data modelssuppose a local

Assignment : Business Rules and Data Models Suppose a local college has tasked you to develop a database that will keep track of students and the courses that they have taken. In addition to tracking the students and cou ...

Answer the following question what are the basic reasons

Answer the following Question : What are the basic reasons that people resist change? How can this resistance be overcome? Write 300 Words. Include in-text citations and references in APA style formatting. Must have two ...

Read nist cybersecurity framework aims to improve critical

Read "NIST Cybersecurity Framework Aims to Improve Critical Infrastructure," by Mustard, from Power (2014). Read "Mapping to the NIST Cybersecurity Framework," by Durbin, from CIO Insight (2014). Briefly define enterpris ...

Question how does a sequential control process differ from

Question : How does a sequential control process differ from a combination control process? Give one example each of a sequential control process and of a combination control process in which a PLC is used.

Review the key barriers to his implementation found in

Review the key barriers to HIS implementation found in Chapter 7 of Essentials of Health Information Systems and Technology. Discuss the key benefits and value of HIS, and of technology investments and implementations. W ...

In the health care industry the topic of network topology

In the health care industry, the topic of network topology is becoming increasingly important as hospitals, clinics, and other supports consider adding more devices and equipment to existing networks or building addition ...

Descriptionrefer to this resource when completing the its

Description: Refer to this resource when completing the It's All About the HAT assignment. In this assignment, students will learn to use and identify tools that may be helpful in their navigation of security related eve ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As