SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Coaching material about fundraising,
managing risk, sustainability strategies
- Managing risk /sustainability strategies
JAIP – Jihočeská agentura pro podporu inovací o.p.s.
Coaching material about managing risk /sustainability strategies
Crisis management and risk assessment of social enterprises (SE)
CRISIS MANAGEMENT - A BRIEF THEORETICAL BACKGROUND
In business, risk management is defined as the process of identifying, monitoring and managing
potential risks in order to minimize the negative impact they may have on an organization. Social
enterprises need to manage risk like any other business. And while the risks that social enterpris-
es face may be similar to those of a traditional business, there might be differences due to the ac-
tivities in-hand or the service users. Risk management is a very complex and systematic process
that should be integrated into its daily activities.
Risks fall into a number of key categories that cover various aspects of business management, for
example, risks can be financial, investment, project, marketing, technological or technical.
Risk management becomes even more important if your company decides to try something new,
such as launching a new product or entering new markets. Common risks include risks associ-
ated with poorly defined objectives, risks associated with employees (their incompetence, insuf-
ficient experience or qualifications), the risk of time tracking for other projects and, last but not
least, financial risks (costs vs. income).
If the company’s management process is set up, it is desirable that its output be a proposal for a
solution to eliminate the damage, on the basis of which a key decision containing the risk man-
agement procedure should be made.
Each risk analysis is associated with several steps, which intersect in almost all the methods used
to assess the risks. These common steps are shown in the following diagram1
1	 Source: own	
2. ANALYSIS AND
EVALUATION
5. RISK
MONITORING
4. IMPLEMENTING
RISK CONTROLS
3. DESIGN OF
ITERNAL
CONTROL
1. RISK
IDENTIFICATION
3
METHODS FOR RISK ASSESSMENT
It is important to consider the degree of risk. There are a number of methods for risk assessment. The
most commonly used methods include:
RISK ASSESSMENT - HSE
This is a method that is not too complicated and is suitable for usually smaller companies with
up to 10 employees. The method is usually recommended by The Health and Safety Executive
from the Great Britain. Method is based on five basic steps:
Step 1: Identify the hazards
Step 2: Decide who might be harmed and how
Step 3: Evaluate the risks and decide on precautions
Step 4: Record your findings and implement them
Step 5: Review your assessment and update if necessary2
RISK ASSESSMENT – OSHA
This method is based on the collection of all company inputs. These inputs include, for example:
information on workplaces, employees, production facilities, accidents at work etc. Hazards are
identified using checklists.
The risk is determined according to the table.3
RISK EVENT
PROBABILITY
SERIOUSNESS OF CONSEQUENCES
Slight damage Medium damage High damage
Unlikely Low Low Medium
Probably Low Medium High
Likely Medium High High
Probability of threat
Highly unlikely – will not appear during the employee’s working career,
Probable - will appear several times during the employee’s working career,
Highly likely - may occur repeatedly during the employee’s working career.
Severity of consequences
Mild damage - injuries and diseases that do not cause long-term pain.
Moderate damage - injuries and diseases causing mild but long-lasting or periodically recurring
pain.
High damage - injuries and illness, causes deep and constant pain or death.
2	https://www.hse.gov.uk/simple-health-safety/risk/steps-needed-to-manage-risk.htm
3	 own graphic design, Source: https://www.guard7.cz/po/metody-hodnoceni-rizik
4
Risk tolerance
The high level of risk is unacceptable, small and medium acceptable.4
RISK ASSESSMENT USING THE CHECK LIST METHOD
Achecklistisaprocedurebasedonasystematiccheckofcompliancewithpredeterminedconditions
and measures. Lists of control questions are usually generated by a professional company or com-
pany management. It is very important that control questions are updated and supplemented ac-
cordingtocurrentregulationsandstandards.Inmostcases,itisacomplexandextensivedocument.
A disadvantage of the checklist is the fact that the list can lead to a mechanical approach without
creating possible alternatives.
The advantage is the identification of danger through a checklist, which is quick and easy.5
SECURITY RISK ASSESSMENT AND AUDIT
This inspection looks for potential risk factors for the company. These can be, for example, acci-
dents, operational problems and other dangerous situations. A kind of health and safety audit, in
which the controller focuses on several areas. Especially for a detailed inspection of equipment,
machines, tools, etc.
This audit is usually performed by an experienced employee, mostly focusing on occupational
safety. The purpose of this inspection is primarily to identify conditions and circumstances that
could potentially lead to injury or other accident. It is possible to use the prepared list of ques-
tions and the matrix for risk scoring.
WHAT-IF SENSITIVITY ANALYSIS
What-If Analysis (WFA, W-I) is a simple analytical technique used in decision-making and risk
management. Its principle is based on the search for the potential impacts of selected situations.
In essence, it is a structured brainstorming, where within the spontaneous discussion are sought.
What if analysis is usually attended by a group of experienced people who asks questions or ex-
presses the possible impacts of questions using “what if …”.
What-if analysis, on the other hand, is very flexible and can be adapted to the specific purpose.
Steps of What-If analysis:
1.	 Defining areas of interest
2.	 Defining target interests of the problems (e.g. financial risks, environmental issues,
safety at work, etc.)
3.	 Generating questions (if)
4.	 Generating answers (what happens)
5.	 Generating measures on situations (decisions, actions, etc.)6
4	https://www.guard7.cz/po/metody-hodnoceni-rizik
5	 https://m.jh.cz/filemanager/files/132160.pdf
6	 https://managementmania.com/en/what-if-analysis
5
Point method
One of the most used methods in risk assessment is the point method. The degree (sometimes
also referred to as the magnitude) of a risk is a combination of the probabilities of the risk occur-
ring and the possible severity of the consequence of the risk. Risks are always related to a specific
job position and job. The protected value is then human life and health.
Table for assessing the probability of a threat
LIKELIHOOD SCORE- L COMMENT VALUE
Very common Permanent threat 1
Frequent occurrence Very often recurrence of events, but it is not a permanent threat 2
Occasional occurrence The event occurs several times per work shift 3
Possible occurrence The event is not very likely, but it cannot be ruled out 4
Unlikely to occur The occurrence of an adverse event is quite rare 5
Almost impossible occurrence The occurrence of an event is almost impossible 6
CONSEQUENCES – C COMMENT VALUE
A - injury negligible No treatment required outside the workplace 4
B - slight injury Requiringtreatmentoutsidetheworkplace,orincapacityforworkwithin
30 days without consequences
3
C - severe injury Requiring treatment outside the workplace, or incapacity for work for
more than 30 days
2
D - critical injury Disability or death as a result of injury 1
Risk score
GROUP VALUE COMMENT
I.	 Group 1-4 Unacceptable risk - the activity must not be started or continued
until the risk is reduced.
II.	 Group 5-9 Undesirable risk - safety measures and control of their observance
are necessary. Without this, it is not possible to carry out endangered
work activities.
III.	 Group 10-16 Acceptable risk - not very significant risk. It needs to be monitored and
controlled.
IV.	 Group 18-24 Acceptable risk - no special measures required.
Calculate the risk score by multiplying the consequence by the likelihood: C (consequence) × L
(likelihood) = R (risk score)
6
LIKELIHOOD OF RISK - L CONSEQUENCES - C
A=4 B=3 C=2 D=1
1 very common 4 3 2 1
2 common occurrence 8 6 4 2
3 occasional occurrence 12 9 6 3
4 possible occurrences 16 12 8 4
5 unlikely to occur 20 15 10 5
6 almost impossible occurrence 24 18 12 6
Acceptability of risk (safety) must have at least 2 levels (acceptable, unacceptable), it can also be
multi-level. The more acceptable the degree of risk, the finer the gradation.
Resulting safety - risk assessment
According to the resulting value of risk, they are assigned to the appropriate group.7
Risk Management should be a continuous and ever-improving process integrated into the overall
strategy of the organization. It also aims to promote employee responsibility, measurement and
fair remuneration of work and, as a result, also contributes to greater work efficiency. All risk
management activities should have a proactive and positive impact. It is very desirable to lead
risk management in the company through the improvement of existing activities, rather than
through controlling and finding errors or fines.
It is not possible to say broadly which way companies should take in measuring risks. Every com-
pany is an individual in the market and should be approached in the same way in the case of risk
management. It is always good for the control mechanisms in the company to carefully consider
which method and integration of risks between the day-to-day running of the company.
At the end of this chapter, it would be good to state that risks are an everyday part of life, both
private and business. It is necessary to work with them, eliminate them and learn from them.
7	 Table: own graphic design. Text: https://www.guard7.cz/po/metody-hodnoceni-rizik

Weitere ähnliche Inhalte

Was ist angesagt?

Stakeholder Analysis
Stakeholder AnalysisStakeholder Analysis
Stakeholder AnalysisMurhaf Ashi
 
SocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidenceSocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidenceM S Ashok
 
SocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidenceSocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidenceMurari Thayi, PgMP, PMP
 
entrepreneurship networking module for leadership
entrepreneurship networking module for leadership entrepreneurship networking module for leadership
entrepreneurship networking module for leadership Srivas Anantharaman
 
Measuring impact and return on investment of social investments for the grant...
Measuring impact and return on investment of social investments for the grant...Measuring impact and return on investment of social investments for the grant...
Measuring impact and return on investment of social investments for the grant...Next Generation Consultants: Reana Rossouw
 
SPYWDP good practice template.docx
SPYWDP good practice template.docxSPYWDP good practice template.docx
SPYWDP good practice template.docxKerim Bouzouita
 
B-M EMEA Communicating Change
B-M EMEA Communicating Change B-M EMEA Communicating Change
B-M EMEA Communicating Change Burson-Marsteller
 
Communications processes guide
Communications processes guideCommunications processes guide
Communications processes guideleydicm
 
Checklist Communication Strategy Development
Checklist Communication Strategy DevelopmentChecklist Communication Strategy Development
Checklist Communication Strategy DevelopmentEwen Le Borgne
 

Was ist angesagt? (20)

Measuring the Impact and ROI of community/social investment programs
Measuring the Impact and ROI of community/social investment programsMeasuring the Impact and ROI of community/social investment programs
Measuring the Impact and ROI of community/social investment programs
 
2016 and 2017 Return on Investment, Development Impact
2016 and 2017 Return on Investment, Development Impact2016 and 2017 Return on Investment, Development Impact
2016 and 2017 Return on Investment, Development Impact
 
Research Report: Trends, Forecasts and Impacts
Research Report:  Trends, Forecasts and ImpactsResearch Report:  Trends, Forecasts and Impacts
Research Report: Trends, Forecasts and Impacts
 
Stakeholder Analysis
Stakeholder AnalysisStakeholder Analysis
Stakeholder Analysis
 
CSI Trends and forecasts
CSI Trends and forecastsCSI Trends and forecasts
CSI Trends and forecasts
 
2014/2015 Trends and Forecasts - Corporate Social Investment and Development
2014/2015 Trends and Forecasts - Corporate Social Investment and Development2014/2015 Trends and Forecasts - Corporate Social Investment and Development
2014/2015 Trends and Forecasts - Corporate Social Investment and Development
 
Community engagement 101
Community engagement 101Community engagement 101
Community engagement 101
 
Management Concepts
Management ConceptsManagement Concepts
Management Concepts
 
SocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidenceSocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidence
 
SocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidenceSocioEconomicProjects - ImpactWithEvidence
SocioEconomicProjects - ImpactWithEvidence
 
2016 and 2017 CSI Trends and Forecasts
2016 and 2017 CSI Trends and Forecasts2016 and 2017 CSI Trends and Forecasts
2016 and 2017 CSI Trends and Forecasts
 
entrepreneurship networking module for leadership
entrepreneurship networking module for leadership entrepreneurship networking module for leadership
entrepreneurship networking module for leadership
 
Manage Stakeholder Relations
Manage Stakeholder RelationsManage Stakeholder Relations
Manage Stakeholder Relations
 
Management Information System PL2
Management Information System PL2 Management Information System PL2
Management Information System PL2
 
Measuring impact and return on investment of social investments for the grant...
Measuring impact and return on investment of social investments for the grant...Measuring impact and return on investment of social investments for the grant...
Measuring impact and return on investment of social investments for the grant...
 
SPYWDP good practice template.docx
SPYWDP good practice template.docxSPYWDP good practice template.docx
SPYWDP good practice template.docx
 
B-M EMEA Communicating Change
B-M EMEA Communicating Change B-M EMEA Communicating Change
B-M EMEA Communicating Change
 
Media management functions
Media management functionsMedia management functions
Media management functions
 
Communications processes guide
Communications processes guideCommunications processes guide
Communications processes guide
 
Checklist Communication Strategy Development
Checklist Communication Strategy DevelopmentChecklist Communication Strategy Development
Checklist Communication Strategy Development
 

Ähnlich wie Coaching material about fundraising, managing risk, sustainability strategies - managing risk_sustainability strategies.pdf

RISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxRISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxssuser107f14
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Various steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim mirazVarious steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim mirazMDAnwarIbrahimMiraz
 
Risk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptxRisk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptxBhavnaGoyat2
 
Risk-Analysis-Power-Point (2).pptx
Risk-Analysis-Power-Point (2).pptxRisk-Analysis-Power-Point (2).pptx
Risk-Analysis-Power-Point (2).pptxHilsonyusuf
 
Risk management osh
Risk management oshRisk management osh
Risk management oshjaycatubig
 
Risk Management Process.ppt
Risk Management Process.pptRisk Management Process.ppt
Risk Management Process.pptUday Nayakwadi
 
HSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptHSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptGkMechanical
 
Risk Management.docx
Risk Management.docxRisk Management.docx
Risk Management.docxCPA Australia
 
Risk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisRisk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisGaurav Singh Rajput
 
Risk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RARisk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RAGaurav Singh Rajput
 
2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptxwaleed50405
 
Safety training: Risk Assessment & Job Safety Analysis
Safety training: Risk Assessment & Job Safety AnalysisSafety training: Risk Assessment & Job Safety Analysis
Safety training: Risk Assessment & Job Safety AnalysisC.P Prasanth
 
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docxAbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docxransayo
 
Chapter2 risk management process
Chapter2  risk management processChapter2  risk management process
Chapter2 risk management processDr Riyaz Muhmmad
 
Risk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationRisk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationUsama Saeed
 

Ähnlich wie Coaching material about fundraising, managing risk, sustainability strategies - managing risk_sustainability strategies.pdf (20)

RISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxRISK MANAGEMENT.pptx
RISK MANAGEMENT.pptx
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Various steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim mirazVarious steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim miraz
 
Risk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptxRisk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptx
 
Risk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptxRisk-Analysis-Power-Point.pptx
Risk-Analysis-Power-Point.pptx
 
Risk-Analysis-Power-Point (2).pptx
Risk-Analysis-Power-Point (2).pptxRisk-Analysis-Power-Point (2).pptx
Risk-Analysis-Power-Point (2).pptx
 
Risk management osh
Risk management oshRisk management osh
Risk management osh
 
Risk Management Process.ppt
Risk Management Process.pptRisk Management Process.ppt
Risk Management Process.ppt
 
HSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptHSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.ppt
 
Risk Management.docx
Risk Management.docxRisk Management.docx
Risk Management.docx
 
Risk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisRisk Assessment and Job Safety Analysis
Risk Assessment and Job Safety Analysis
 
Risk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RARisk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RA
 
2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx
 
Safety training: Risk Assessment & Job Safety Analysis
Safety training: Risk Assessment & Job Safety AnalysisSafety training: Risk Assessment & Job Safety Analysis
Safety training: Risk Assessment & Job Safety Analysis
 
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docxAbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
 
51_operational_risk
51_operational_risk51_operational_risk
51_operational_risk
 
Chapter2 risk management process
Chapter2  risk management processChapter2  risk management process
Chapter2 risk management process
 
Risk Management in Business
Risk Management in BusinessRisk Management in Business
Risk Management in Business
 
Risk management
Risk managementRisk management
Risk management
 
Risk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationRisk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix Presentation
 

Mehr von Brodoto

Welcome_ Social Entrepreneurship Conference 2022.pptx
Welcome_ Social Entrepreneurship Conference 2022.pptxWelcome_ Social Entrepreneurship Conference 2022.pptx
Welcome_ Social Entrepreneurship Conference 2022.pptxBrodoto
 
Introduction CE responsible Anja Prislan.pptx
Introduction CE responsible Anja Prislan.pptxIntroduction CE responsible Anja Prislan.pptx
Introduction CE responsible Anja Prislan.pptxBrodoto
 
Introduction DelFin Dana Günther.pptx
Introduction DelFin Dana Günther.pptxIntroduction DelFin Dana Günther.pptx
Introduction DelFin Dana Günther.pptxBrodoto
 
Sonja Westphal Project Sustify.pdf
Sonja Westphal Project Sustify.pdfSonja Westphal Project Sustify.pdf
Sonja Westphal Project Sustify.pdfBrodoto
 
Project Dispense Solidali.pdf
 Project Dispense Solidali.pdf Project Dispense Solidali.pdf
Project Dispense Solidali.pdfBrodoto
 
Robert Boehm Perdix Reations.pptx
Robert Boehm Perdix Reations.pptxRobert Boehm Perdix Reations.pptx
Robert Boehm Perdix Reations.pptxBrodoto
 
Monika Tothne Almassy HospiEdu.pptx
Monika Tothne Almassy HospiEdu.pptxMonika Tothne Almassy HospiEdu.pptx
Monika Tothne Almassy HospiEdu.pptxBrodoto
 
Sustify pitch 5 min.pdf
Sustify pitch 5 min.pdfSustify pitch 5 min.pdf
Sustify pitch 5 min.pdfBrodoto
 
Social Impact Measurement – Approaches and Difficulties .pptx
Social Impact Measurement – Approaches and Difficulties .pptxSocial Impact Measurement – Approaches and Difficulties .pptx
Social Impact Measurement – Approaches and Difficulties .pptxBrodoto
 
Tools for Social Business in Rural Regions .pptx
 Tools for Social Business in Rural Regions .pptx Tools for Social Business in Rural Regions .pptx
Tools for Social Business in Rural Regions .pptxBrodoto
 
Financial Ecosystem for the promotion of Social Entrepreneurship in rural reg...
Financial Ecosystem for the promotion of Social Entrepreneurship in rural reg...Financial Ecosystem for the promotion of Social Entrepreneurship in rural reg...
Financial Ecosystem for the promotion of Social Entrepreneurship in rural reg...Brodoto
 
Framework model for support of social economy in CE regions .pptx
Framework  model for support of social economy in CE regions .pptxFramework  model for support of social economy in CE regions .pptx
Framework model for support of social economy in CE regions .pptxBrodoto
 
Sara Teglia Impronta Etica.pdf
Sara Teglia Impronta Etica.pdfSara Teglia Impronta Etica.pdf
Sara Teglia Impronta Etica.pdfBrodoto
 
Beatrix Bedo Impact Hub.pdf
Beatrix Bedo Impact Hub.pdfBeatrix Bedo Impact Hub.pdf
Beatrix Bedo Impact Hub.pdfBrodoto
 
Strategic use of ICT and communication tools, Module 1,2,3.pdf
Strategic use of ICT and communication tools, Module 1,2,3.pdfStrategic use of ICT and communication tools, Module 1,2,3.pdf
Strategic use of ICT and communication tools, Module 1,2,3.pdfBrodoto
 
Strategic use of ICT and communication tools, Module 1.pdf
Strategic use of ICT and communication tools, Module 1.pdfStrategic use of ICT and communication tools, Module 1.pdf
Strategic use of ICT and communication tools, Module 1.pdfBrodoto
 
Strategic use of ICT and communication tools, Module 2.pdf
Strategic use of ICT and communication tools, Module 2.pdfStrategic use of ICT and communication tools, Module 2.pdf
Strategic use of ICT and communication tools, Module 2.pdfBrodoto
 
Strategic use of ICT and communication tools, Module 3.pdf
Strategic use of ICT and communication tools, Module 3.pdfStrategic use of ICT and communication tools, Module 3.pdf
Strategic use of ICT and communication tools, Module 3.pdfBrodoto
 
Coaching material about strategic use of ICT and Communication Tools.pdf
Coaching material about strategic use of ICT and Communication Tools.pdfCoaching material about strategic use of ICT and Communication Tools.pdf
Coaching material about strategic use of ICT and Communication Tools.pdfBrodoto
 
Coaching material about innovation process.pdf
Coaching material about innovation process.pdfCoaching material about innovation process.pdf
Coaching material about innovation process.pdfBrodoto
 

Mehr von Brodoto (20)

Welcome_ Social Entrepreneurship Conference 2022.pptx
Welcome_ Social Entrepreneurship Conference 2022.pptxWelcome_ Social Entrepreneurship Conference 2022.pptx
Welcome_ Social Entrepreneurship Conference 2022.pptx
 
Introduction CE responsible Anja Prislan.pptx
Introduction CE responsible Anja Prislan.pptxIntroduction CE responsible Anja Prislan.pptx
Introduction CE responsible Anja Prislan.pptx
 
Introduction DelFin Dana Günther.pptx
Introduction DelFin Dana Günther.pptxIntroduction DelFin Dana Günther.pptx
Introduction DelFin Dana Günther.pptx
 
Sonja Westphal Project Sustify.pdf
Sonja Westphal Project Sustify.pdfSonja Westphal Project Sustify.pdf
Sonja Westphal Project Sustify.pdf
 
Project Dispense Solidali.pdf
 Project Dispense Solidali.pdf Project Dispense Solidali.pdf
Project Dispense Solidali.pdf
 
Robert Boehm Perdix Reations.pptx
Robert Boehm Perdix Reations.pptxRobert Boehm Perdix Reations.pptx
Robert Boehm Perdix Reations.pptx
 
Monika Tothne Almassy HospiEdu.pptx
Monika Tothne Almassy HospiEdu.pptxMonika Tothne Almassy HospiEdu.pptx
Monika Tothne Almassy HospiEdu.pptx
 
Sustify pitch 5 min.pdf
Sustify pitch 5 min.pdfSustify pitch 5 min.pdf
Sustify pitch 5 min.pdf
 
Social Impact Measurement – Approaches and Difficulties .pptx
Social Impact Measurement – Approaches and Difficulties .pptxSocial Impact Measurement – Approaches and Difficulties .pptx
Social Impact Measurement – Approaches and Difficulties .pptx
 
Tools for Social Business in Rural Regions .pptx
 Tools for Social Business in Rural Regions .pptx Tools for Social Business in Rural Regions .pptx
Tools for Social Business in Rural Regions .pptx
 
Financial Ecosystem for the promotion of Social Entrepreneurship in rural reg...
Financial Ecosystem for the promotion of Social Entrepreneurship in rural reg...Financial Ecosystem for the promotion of Social Entrepreneurship in rural reg...
Financial Ecosystem for the promotion of Social Entrepreneurship in rural reg...
 
Framework model for support of social economy in CE regions .pptx
Framework  model for support of social economy in CE regions .pptxFramework  model for support of social economy in CE regions .pptx
Framework model for support of social economy in CE regions .pptx
 
Sara Teglia Impronta Etica.pdf
Sara Teglia Impronta Etica.pdfSara Teglia Impronta Etica.pdf
Sara Teglia Impronta Etica.pdf
 
Beatrix Bedo Impact Hub.pdf
Beatrix Bedo Impact Hub.pdfBeatrix Bedo Impact Hub.pdf
Beatrix Bedo Impact Hub.pdf
 
Strategic use of ICT and communication tools, Module 1,2,3.pdf
Strategic use of ICT and communication tools, Module 1,2,3.pdfStrategic use of ICT and communication tools, Module 1,2,3.pdf
Strategic use of ICT and communication tools, Module 1,2,3.pdf
 
Strategic use of ICT and communication tools, Module 1.pdf
Strategic use of ICT and communication tools, Module 1.pdfStrategic use of ICT and communication tools, Module 1.pdf
Strategic use of ICT and communication tools, Module 1.pdf
 
Strategic use of ICT and communication tools, Module 2.pdf
Strategic use of ICT and communication tools, Module 2.pdfStrategic use of ICT and communication tools, Module 2.pdf
Strategic use of ICT and communication tools, Module 2.pdf
 
Strategic use of ICT and communication tools, Module 3.pdf
Strategic use of ICT and communication tools, Module 3.pdfStrategic use of ICT and communication tools, Module 3.pdf
Strategic use of ICT and communication tools, Module 3.pdf
 
Coaching material about strategic use of ICT and Communication Tools.pdf
Coaching material about strategic use of ICT and Communication Tools.pdfCoaching material about strategic use of ICT and Communication Tools.pdf
Coaching material about strategic use of ICT and Communication Tools.pdf
 
Coaching material about innovation process.pdf
Coaching material about innovation process.pdfCoaching material about innovation process.pdf
Coaching material about innovation process.pdf
 

Kürzlich hochgeladen

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 

Kürzlich hochgeladen (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

Coaching material about fundraising, managing risk, sustainability strategies - managing risk_sustainability strategies.pdf

  • 1. Coaching material about fundraising, managing risk, sustainability strategies - Managing risk /sustainability strategies JAIP – Jihočeská agentura pro podporu inovací o.p.s.
  • 2. Coaching material about managing risk /sustainability strategies Crisis management and risk assessment of social enterprises (SE) CRISIS MANAGEMENT - A BRIEF THEORETICAL BACKGROUND In business, risk management is defined as the process of identifying, monitoring and managing potential risks in order to minimize the negative impact they may have on an organization. Social enterprises need to manage risk like any other business. And while the risks that social enterpris- es face may be similar to those of a traditional business, there might be differences due to the ac- tivities in-hand or the service users. Risk management is a very complex and systematic process that should be integrated into its daily activities. Risks fall into a number of key categories that cover various aspects of business management, for example, risks can be financial, investment, project, marketing, technological or technical. Risk management becomes even more important if your company decides to try something new, such as launching a new product or entering new markets. Common risks include risks associ- ated with poorly defined objectives, risks associated with employees (their incompetence, insuf- ficient experience or qualifications), the risk of time tracking for other projects and, last but not least, financial risks (costs vs. income). If the company’s management process is set up, it is desirable that its output be a proposal for a solution to eliminate the damage, on the basis of which a key decision containing the risk man- agement procedure should be made. Each risk analysis is associated with several steps, which intersect in almost all the methods used to assess the risks. These common steps are shown in the following diagram1 1 Source: own 2. ANALYSIS AND EVALUATION 5. RISK MONITORING 4. IMPLEMENTING RISK CONTROLS 3. DESIGN OF ITERNAL CONTROL 1. RISK IDENTIFICATION
  • 3. 3 METHODS FOR RISK ASSESSMENT It is important to consider the degree of risk. There are a number of methods for risk assessment. The most commonly used methods include: RISK ASSESSMENT - HSE This is a method that is not too complicated and is suitable for usually smaller companies with up to 10 employees. The method is usually recommended by The Health and Safety Executive from the Great Britain. Method is based on five basic steps: Step 1: Identify the hazards Step 2: Decide who might be harmed and how Step 3: Evaluate the risks and decide on precautions Step 4: Record your findings and implement them Step 5: Review your assessment and update if necessary2 RISK ASSESSMENT – OSHA This method is based on the collection of all company inputs. These inputs include, for example: information on workplaces, employees, production facilities, accidents at work etc. Hazards are identified using checklists. The risk is determined according to the table.3 RISK EVENT PROBABILITY SERIOUSNESS OF CONSEQUENCES Slight damage Medium damage High damage Unlikely Low Low Medium Probably Low Medium High Likely Medium High High Probability of threat Highly unlikely – will not appear during the employee’s working career, Probable - will appear several times during the employee’s working career, Highly likely - may occur repeatedly during the employee’s working career. Severity of consequences Mild damage - injuries and diseases that do not cause long-term pain. Moderate damage - injuries and diseases causing mild but long-lasting or periodically recurring pain. High damage - injuries and illness, causes deep and constant pain or death. 2 https://www.hse.gov.uk/simple-health-safety/risk/steps-needed-to-manage-risk.htm 3 own graphic design, Source: https://www.guard7.cz/po/metody-hodnoceni-rizik
  • 4. 4 Risk tolerance The high level of risk is unacceptable, small and medium acceptable.4 RISK ASSESSMENT USING THE CHECK LIST METHOD Achecklistisaprocedurebasedonasystematiccheckofcompliancewithpredeterminedconditions and measures. Lists of control questions are usually generated by a professional company or com- pany management. It is very important that control questions are updated and supplemented ac- cordingtocurrentregulationsandstandards.Inmostcases,itisacomplexandextensivedocument. A disadvantage of the checklist is the fact that the list can lead to a mechanical approach without creating possible alternatives. The advantage is the identification of danger through a checklist, which is quick and easy.5 SECURITY RISK ASSESSMENT AND AUDIT This inspection looks for potential risk factors for the company. These can be, for example, acci- dents, operational problems and other dangerous situations. A kind of health and safety audit, in which the controller focuses on several areas. Especially for a detailed inspection of equipment, machines, tools, etc. This audit is usually performed by an experienced employee, mostly focusing on occupational safety. The purpose of this inspection is primarily to identify conditions and circumstances that could potentially lead to injury or other accident. It is possible to use the prepared list of ques- tions and the matrix for risk scoring. WHAT-IF SENSITIVITY ANALYSIS What-If Analysis (WFA, W-I) is a simple analytical technique used in decision-making and risk management. Its principle is based on the search for the potential impacts of selected situations. In essence, it is a structured brainstorming, where within the spontaneous discussion are sought. What if analysis is usually attended by a group of experienced people who asks questions or ex- presses the possible impacts of questions using “what if …”. What-if analysis, on the other hand, is very flexible and can be adapted to the specific purpose. Steps of What-If analysis: 1. Defining areas of interest 2. Defining target interests of the problems (e.g. financial risks, environmental issues, safety at work, etc.) 3. Generating questions (if) 4. Generating answers (what happens) 5. Generating measures on situations (decisions, actions, etc.)6 4 https://www.guard7.cz/po/metody-hodnoceni-rizik 5 https://m.jh.cz/filemanager/files/132160.pdf 6 https://managementmania.com/en/what-if-analysis
  • 5. 5 Point method One of the most used methods in risk assessment is the point method. The degree (sometimes also referred to as the magnitude) of a risk is a combination of the probabilities of the risk occur- ring and the possible severity of the consequence of the risk. Risks are always related to a specific job position and job. The protected value is then human life and health. Table for assessing the probability of a threat LIKELIHOOD SCORE- L COMMENT VALUE Very common Permanent threat 1 Frequent occurrence Very often recurrence of events, but it is not a permanent threat 2 Occasional occurrence The event occurs several times per work shift 3 Possible occurrence The event is not very likely, but it cannot be ruled out 4 Unlikely to occur The occurrence of an adverse event is quite rare 5 Almost impossible occurrence The occurrence of an event is almost impossible 6 CONSEQUENCES – C COMMENT VALUE A - injury negligible No treatment required outside the workplace 4 B - slight injury Requiringtreatmentoutsidetheworkplace,orincapacityforworkwithin 30 days without consequences 3 C - severe injury Requiring treatment outside the workplace, or incapacity for work for more than 30 days 2 D - critical injury Disability or death as a result of injury 1 Risk score GROUP VALUE COMMENT I. Group 1-4 Unacceptable risk - the activity must not be started or continued until the risk is reduced. II. Group 5-9 Undesirable risk - safety measures and control of their observance are necessary. Without this, it is not possible to carry out endangered work activities. III. Group 10-16 Acceptable risk - not very significant risk. It needs to be monitored and controlled. IV. Group 18-24 Acceptable risk - no special measures required. Calculate the risk score by multiplying the consequence by the likelihood: C (consequence) × L (likelihood) = R (risk score)
  • 6. 6 LIKELIHOOD OF RISK - L CONSEQUENCES - C A=4 B=3 C=2 D=1 1 very common 4 3 2 1 2 common occurrence 8 6 4 2 3 occasional occurrence 12 9 6 3 4 possible occurrences 16 12 8 4 5 unlikely to occur 20 15 10 5 6 almost impossible occurrence 24 18 12 6 Acceptability of risk (safety) must have at least 2 levels (acceptable, unacceptable), it can also be multi-level. The more acceptable the degree of risk, the finer the gradation. Resulting safety - risk assessment According to the resulting value of risk, they are assigned to the appropriate group.7 Risk Management should be a continuous and ever-improving process integrated into the overall strategy of the organization. It also aims to promote employee responsibility, measurement and fair remuneration of work and, as a result, also contributes to greater work efficiency. All risk management activities should have a proactive and positive impact. It is very desirable to lead risk management in the company through the improvement of existing activities, rather than through controlling and finding errors or fines. It is not possible to say broadly which way companies should take in measuring risks. Every com- pany is an individual in the market and should be approached in the same way in the case of risk management. It is always good for the control mechanisms in the company to carefully consider which method and integration of risks between the day-to-day running of the company. At the end of this chapter, it would be good to state that risks are an everyday part of life, both private and business. It is necessary to work with them, eliminate them and learn from them. 7 Table: own graphic design. Text: https://www.guard7.cz/po/metody-hodnoceni-rizik