HLT 308 CLC Educational Program on Risk Management Presentation

HLT 308 Organizational Risk Management Interview
May 24, 2022
HLT 308 Week 1 Discussion Question One
May 24, 2022

HLT 308 CLC Educational Program on Risk Management Presentation

HLT 308 CLC Educational Program on Risk Management Presentation
HLT 308 CLC Educational Program on Risk Management Presentation

Details:

This is a CLC assignment.

Create a PowerPoint presentation on one of the selected categories of risk identified in the “Educational Program on Risk Management: Outline of Topic” assignment.

The 20-25 slide presentation will consist of:

Introduction.
Objectives of the educational session.
A description of the three major elements of the selected topic.
Data to support the need for educational session.
Strategies for implementation.
How you will evaluate the educational session.
Speaker notes.
Citations from six references to support the topic.
While APA format is not required for the body of this assignment, solid academic writing is expected, and in-text citations and references should be presented using APA documentation guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a grading rubric. Instructors will be using the rubric to grade the assignment; therefore, students should review the rubric prior to beginning the assignment to become familiar with the assignment criteria and expectations for successful completion of the assignment.

Click here to ORDER an A++ paper from our Verified MASTERS and DOCTORATE WRITERS: HLT 308 CLC Educational Program on Risk Management Presentation

You are not required to submit this assignment to Turnitin, unless otherwise directed by your instructor. If so directed, refer to the Student Success Center for directions. Only Word documents can be submitted to Turnitin.

Identification[edit]
After establishing the context, the next step in the process of managing risk is to identify potential risks. Risks are about events that, when triggered, cause problems or benefits. Hence, risk identification can start with the source of problems and those of competitors (benefit), or with the problem’s consequences.

Source analysis[6] – Risk sources may be internal or external to the system that is the target of risk management (use mitigation instead of management since by its own definition risk deals with factors of decision-making that cannot be managed).
Some examples of risk sources are: stakeholders of a project, employees of a company or the weather over an airport.

Problem analysis[citation needed] – Risks are related to identified threats. For example: the threat of losing money, the threat of abuse of confidential information or the threat of human errors, accidents and casualties. The threats may exist with variousHLT 308 CLC Educational Program on Risk Management Presentation
HLT 308 CLC Educational Program on Risk Management Presentation

entities, most important with shareholders, customers and legislative bodies such as the government.

When either source or problem is known, the events that a source may trigger or the events that can lead to a problem can be investigated. For example: stakeholders withdrawing during a project may endanger funding of the project; confidential information may be stolen by employees even within a closed network; lightning striking an aircraft during takeoff may make all people on board immediate casualties.

The chosen method of identifying risks may depend on culture, industry practice and compliance. The identification methods are formed by templates or the development of templates for identifying source, problem or event. Common risk identification methods are:

Objectives-based risk identification[citation needed] – Organizations and project teams have objectives. Any event that may prevent an objective from being achieved is identified as risk.
Scenario-based risk identification – In scenario analysis different scenarios are created. The scenarios may be the alternative ways to achieve an objective, or an analysis of the interaction of forces in, for example, a market or battle. Any event that triggers an undesired scenario alternative is identified as risk – see Futures Studies for methodology used by Futurists.
Taxonomy-based risk identification – The taxonomy in taxonomy-based risk identification is a breakdown of possible risk sources. Based on the taxonomy and knowledge of best practices, a questionnaire is compiled. The answers to the questions reveal risks.[7]
Common-risk checking[8] – In several industries, lists with known risks are available. Each risk in the list can be checked for application to a particular situation.[9]
Risk charting[10] – This method combines the above approaches by listing resources at risk, threats to those resources, modifying factors which may increase or decrease the risk and consequences it is wished to avoid. Creating a matrix under these headings enables a variety of approaches. One can begin with resources and consider the threats they are exposed to and the consequences of each. Alternatively one can start with the threats and examine which resources they would affect, or one can begin with the consequences and determine which combination of threats and resources would be involved to bring them about.