SlideShare a Scribd company logo
1 of 20
1
ETHICS
Ethics, also called moral philosophy, the discipline
concerned with what is morally good and bad and morally
right and wrong. The term is also applied to any system or
theory of moral values or principles.
2
3
Risk
Any work which might lead to harm us and is not
considered safe, can be understood as a risk. According to a
popular definition, “A risk is the potential that something
unwanted and harmful may occur.” According to William D
Rowe, potential for the realization of unwanted consequences
from impending events.
4
Cont..
Risk is a broad concept covering many different types of
unwanted occurrences. When it comes to technology, it can
equally well include dangers of bodily harm, of economic loss
or of environmental degradation. These in turn can be caused
by delayed job completion, faulty products or systems or
economically or environmentally injurious solutions to
technological problems.
5
Acceptability of Risk
The acceptability of risk depends upon the types of risks
such as voluntary and involuntary risks, short term and long term
consequences, expected probability, reversible effects, threshold
levels for risk, delayed and immediate risk, etc
6
Voluntarism and Control
The person who breaks a red signal, is prone to be a victim of
an accident, but risks. A person who lives near a dumping yard
is prone to ill-health, but neglects. A boy who rides a vehicle at
a high speed cannot rely on the perfect functioning of the
brakes. But these people take voluntary risks thinking they can
control.
7
Effective information on Risk assessment
The acceptance of risks also depends on the manner in
which information necessary for decision making is presented. A
person can be motivated to violate the safety rules by explaining
the higher probability of success, whereas the same person can be
demotivated from such task, by explaining the probability of
failure and the fatal effects of it.
8
Job-related Risks
In some jobs where the workers are exposed to
chemicals, radiations and poisonous gases etc., they are not
informed about the probable risks the workers would be facing,
in doing their jobs.
These are such dangers where the toxic environments cannot
readily be seen, smelled, heard or sensed otherwise.
9
Magnitude and Proximity
It is unfortunate that most of us, realize the magnitude of risk only when
we ourselves or the person who is in our close proximity or a relative, gets
affected. A group of 20 friends including us, if gets affected or if had a
narrow escape from death, affects us more than the incident occurred to a
group of 50 strangers, in a group of a 1000. This proximity effect arises in
perceptions of risk over time as well.
A future risk is easily dismissed by various rationalizations including −
• The attitude of “out of sight, out of mind”.
• The assumption that predictions for the future must be discounted by
using lower probabilities.
• The belief that a counter-measure will be found in time.
10
Risk Analysis
Some of step wise risk analysis includes-
• Hazards identification
• Failure modes and frequencies evaluation from established sources
and best practices.
• Selection of credible scenarios and risks.
• Fault and event trees for various scenarios.
• Consequences-effect calculations with work out from models.
• Individual and societal risks.
11
Risk Benefit Analysis
As per the famous saying, “A Ship in harbor is safe. But that’s not what
ships are built for” risk is somewhat common to be accepted. The most
common risk we all take is driving an automobile in a traffic.
Though we are not sure about the perfect functionality of the brake
system and the timings of other drivers’ responses, we take risk. The
controlling factor appears to be their perception of their individual
ability to manage the risk-creating situation.
12
Types of risk
The risk to be occurred in future is completely known after it gets fully
developed. It is called as Real future risk.
If the idea of risk is developed using current data, such one is called as
Statistical risk.
The risk which is analytically based on system models structured from
historical studies is called as Projected risk.
The risk which is intuitively seen by individuals is called as Perceived
risk.
13
Example
If risks of traveling on an air-plane is considered for observation, then
the flight insurance company can observe it as a statistical risk, while
the risk the passenger faces is Perceived Risk and the Federal aviation
administration, faces a Projected risk.
Hence, the view of accepting the risk and the idea of risk to benefit
ratio motivates the individual.
14
Risk Reduction
Risk reduction is one of the four main risk management techniques to be
used in conjunction with other techniques to help an individual or
organization effectively manage the risk of loss.
Risk reduction refers to the way an insurance company or organization
can reduce its financial losses by implementing measures that reduce the
financial impacts of potential losses.
15
Some examples of common and effective risk reduction practices
include:
• Installing security systems or alarms to reduce the frequency of crime
losses.
• Installing sprinklers and smoke detectors to reduce the amount of
damage a fire loss can cause.
Risk reduction is also sometimes called loss mitigation.
16
The risks we generally face can be reduced to a great extent by proper
analysis with steps. as mentioned below −
• Define the Problem.
• Generate Several Solutions.
• Analyze each solution to determine the pros and cons of each.
• Test the solutions.
• Select the best solution.
• Implement the chosen solution.
• Analyze the risk in the chosen solution.
• Try to solve or move to next solution.
17
Examples of risk reduction are:
• medical care,
• fire departments,
• night security guards,
• sprinkler systems,
• burglar alarms
—attempts to deal with risk by preventing the loss or reducing the chance
that it will occur.
18
Risk Avoidance vs. Risk Reduction
Risk Avoidance
Risk avoidance is not performing
any activity that may carry risk. A
risk avoidance methodology
attempts to minimize vulnerabilities
that can pose a threat.
Risk avoidance is the elimination of
hazards, activities and exposures
that can negatively affect an
organization's assets.
Risk Reduction
Risk reduction is a risk
management technique that
involves reducing the financial
consequences of a loss.
This encompasses a whole range of
things including reducing the
seriousness of a loss, reducing its
frequency, or making it less likely
to occur overall.
19
20

More Related Content

What's hot

Unit III GE8076 Professional Ethics in Engineering by Dr.Selvaganesan
Unit III GE8076 Professional Ethics in Engineering by Dr.SelvaganesanUnit III GE8076 Professional Ethics in Engineering by Dr.Selvaganesan
Unit III GE8076 Professional Ethics in Engineering by Dr.SelvaganesanDr. SELVAGANESAN S
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Engineers are responsible experimenters
Engineers are responsible experimentersEngineers are responsible experimenters
Engineers are responsible experimentersSKS
 
Chapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETC
Chapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETCChapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETC
Chapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETCTakshil Gajjar
 
Unit 4-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING ...
Unit 4-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING                          ...Unit 4-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING                          ...
Unit 4-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING ...Mohanumar S
 
Risk Analysis
Risk AnalysisRisk Analysis
Risk AnalysisCIToolkit
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Professional Ethics Unit2
Professional Ethics Unit2Professional Ethics Unit2
Professional Ethics Unit2LovelitJose
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approachtschraider
 
Safety, Risk, Hazard and Engineer’s Role Towards Safety
Safety, Risk, Hazard and Engineer’s Role Towards SafetySafety, Risk, Hazard and Engineer’s Role Towards Safety
Safety, Risk, Hazard and Engineer’s Role Towards SafetyAli Sufyan
 
Engineers responsibility for safety and risk
Engineers responsibility for safety and riskEngineers responsibility for safety and risk
Engineers responsibility for safety and riskStudent
 
Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)
Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)
Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)Dr. SELVAGANESAN S
 
Risk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationRisk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationUsama Saeed
 

What's hot (20)

Slide set 4 safety and risk
Slide set 4  safety and riskSlide set 4  safety and risk
Slide set 4 safety and risk
 
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 2
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 2GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 2
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 2
 
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 4
GE6075 PROFESSIONAL ETHICS IN ENGINEERINGUnit 4GE6075 PROFESSIONAL ETHICS IN ENGINEERINGUnit 4
GE6075 PROFESSIONAL ETHICS IN ENGINEERING Unit 4
 
Hazard analysis
Hazard analysisHazard analysis
Hazard analysis
 
Unit III GE8076 Professional Ethics in Engineering by Dr.Selvaganesan
Unit III GE8076 Professional Ethics in Engineering by Dr.SelvaganesanUnit III GE8076 Professional Ethics in Engineering by Dr.Selvaganesan
Unit III GE8076 Professional Ethics in Engineering by Dr.Selvaganesan
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Engineers are responsible experimenters
Engineers are responsible experimentersEngineers are responsible experimenters
Engineers are responsible experimenters
 
Chapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETC
Chapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETCChapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETC
Chapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETC
 
Unit 4-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING ...
Unit 4-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING                          ...Unit 4-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING                          ...
Unit 4-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING ...
 
Risk Analysis
Risk AnalysisRisk Analysis
Risk Analysis
 
Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Professional Ethics Unit2
Professional Ethics Unit2Professional Ethics Unit2
Professional Ethics Unit2
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
Safety, Risk, Hazard and Engineer’s Role Towards Safety
Safety, Risk, Hazard and Engineer’s Role Towards SafetySafety, Risk, Hazard and Engineer’s Role Towards Safety
Safety, Risk, Hazard and Engineer’s Role Towards Safety
 
Engineers responsibility for safety and risk
Engineers responsibility for safety and riskEngineers responsibility for safety and risk
Engineers responsibility for safety and risk
 
Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)
Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)
Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)
 
Risk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationRisk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix Presentation
 
UNIT III ENGINEERING AS SOCIAL EXPERIMENTATION
UNIT III ENGINEERING AS SOCIAL EXPERIMENTATIONUNIT III ENGINEERING AS SOCIAL EXPERIMENTATION
UNIT III ENGINEERING AS SOCIAL EXPERIMENTATION
 
Accident Investigation
Accident InvestigationAccident Investigation
Accident Investigation
 

Similar to Reducing risk

Personality and Individual Differences: Determinants of Personality - Major P...
Personality and Individual Differences: Determinants of Personality - Major P...Personality and Individual Differences: Determinants of Personality - Major P...
Personality and Individual Differences: Determinants of Personality - Major P...RAJESHSKR
 
Chapter1 introduction to risk management
Chapter1  introduction to risk managementChapter1  introduction to risk management
Chapter1 introduction to risk managementDr Riyaz Muhmmad
 
Logistic insurance ch1 risk concept
Logistic insurance ch1 risk conceptLogistic insurance ch1 risk concept
Logistic insurance ch1 risk conceptNarudh Cheramakara
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxchristinemaritza
 
unit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineeringunit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineeringPoornachanranKV
 
Week 3 Occupational Hazards & Risk Spring 2010!!
Week 3 Occupational Hazards & Risk Spring 2010!!Week 3 Occupational Hazards & Risk Spring 2010!!
Week 3 Occupational Hazards & Risk Spring 2010!!sewhood
 
SAFETY, RESPONSIBILITY AND RIGHTS.pptx
SAFETY, RESPONSIBILITY AND RIGHTS.pptxSAFETY, RESPONSIBILITY AND RIGHTS.pptx
SAFETY, RESPONSIBILITY AND RIGHTS.pptx05AkshithaaMP
 
PPT 1- week 1- module 1-safety engineering
PPT 1- week 1- module 1-safety engineeringPPT 1- week 1- module 1-safety engineering
PPT 1- week 1- module 1-safety engineeringlaraguler
 
Hsse safety iceberg theory gp
Hsse safety iceberg theory gpHsse safety iceberg theory gp
Hsse safety iceberg theory gpNoor Ezlina
 
HSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptHSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptGkMechanical
 
Risk Management Sir A. S. Chaubal
Risk Management Sir A. S. ChaubalRisk Management Sir A. S. Chaubal
Risk Management Sir A. S. Chaubalsameersanghani
 
Introduction to risk management and insurance
Introduction to risk management and insuranceIntroduction to risk management and insurance
Introduction to risk management and insuranceVipul Kumar
 
Risk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisRisk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisGaurav Singh Rajput
 

Similar to Reducing risk (20)

Personality and Individual Differences: Determinants of Personality - Major P...
Personality and Individual Differences: Determinants of Personality - Major P...Personality and Individual Differences: Determinants of Personality - Major P...
Personality and Individual Differences: Determinants of Personality - Major P...
 
unit-4.pptx
unit-4.pptxunit-4.pptx
unit-4.pptx
 
Chapter1 introduction to risk management
Chapter1  introduction to risk managementChapter1  introduction to risk management
Chapter1 introduction to risk management
 
Logistic insurance ch1 risk concept
Logistic insurance ch1 risk conceptLogistic insurance ch1 risk concept
Logistic insurance ch1 risk concept
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
 
Safety and risk
Safety and riskSafety and risk
Safety and risk
 
The risk from the point of view of an actuary
The risk from the point of view of an actuaryThe risk from the point of view of an actuary
The risk from the point of view of an actuary
 
unit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineeringunit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineering
 
Week 3 Occupational Hazards & Risk Spring 2010!!
Week 3 Occupational Hazards & Risk Spring 2010!!Week 3 Occupational Hazards & Risk Spring 2010!!
Week 3 Occupational Hazards & Risk Spring 2010!!
 
SAFETY, RESPONSIBILITY AND RIGHTS.pptx
SAFETY, RESPONSIBILITY AND RIGHTS.pptxSAFETY, RESPONSIBILITY AND RIGHTS.pptx
SAFETY, RESPONSIBILITY AND RIGHTS.pptx
 
S1_ INTRO TO RISK.pdf
S1_ INTRO TO RISK.pdfS1_ INTRO TO RISK.pdf
S1_ INTRO TO RISK.pdf
 
PPT 1- week 1- module 1-safety engineering
PPT 1- week 1- module 1-safety engineeringPPT 1- week 1- module 1-safety engineering
PPT 1- week 1- module 1-safety engineering
 
Hsse safety iceberg theory gp
Hsse safety iceberg theory gpHsse safety iceberg theory gp
Hsse safety iceberg theory gp
 
HSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptHSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.ppt
 
Unit 1 rmi
Unit 1 rmiUnit 1 rmi
Unit 1 rmi
 
Risk Management Sir A. S. Chaubal
Risk Management Sir A. S. ChaubalRisk Management Sir A. S. Chaubal
Risk Management Sir A. S. Chaubal
 
Risk Management - Dr.J.Mexon
Risk Management - Dr.J.MexonRisk Management - Dr.J.Mexon
Risk Management - Dr.J.Mexon
 
Introduction to risk management and insurance
Introduction to risk management and insuranceIntroduction to risk management and insurance
Introduction to risk management and insurance
 
Ethics IV.pptx
Ethics IV.pptxEthics IV.pptx
Ethics IV.pptx
 
Risk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisRisk Assessment and Job Safety Analysis
Risk Assessment and Job Safety Analysis
 

More from SKS

Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar reportSKS
 
Deep learning seminar report
Deep learning seminar reportDeep learning seminar report
Deep learning seminar reportSKS
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar reportSKS
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
Reinforcement learning
Reinforcement  learningReinforcement  learning
Reinforcement learningSKS
 
Variety of moral issues
Variety of moral issuesVariety of moral issues
Variety of moral issuesSKS
 
Research ethics
Research ethicsResearch ethics
Research ethicsSKS
 
Industrial standards
Industrial standardsIndustrial standards
Industrial standardsSKS
 
Engineering as experimentation
Engineering as experimentationEngineering as experimentation
Engineering as experimentationSKS
 
Controversy and consensus
Controversy and consensusControversy and consensus
Controversy and consensusSKS
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethicsSKS
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethicsSKS
 
A balanced outlook on the law
A balanced outlook on  the lawA balanced outlook on  the law
A balanced outlook on the lawSKS
 
Theories about the right decision
Theories about the right decision Theories about the right decision
Theories about the right decision SKS
 
Chernobyl case study
Chernobyl case studyChernobyl case study
Chernobyl case studySKS
 
Self intrest
Self intrestSelf intrest
Self intrestSKS
 
Occupational crime
Occupational crimeOccupational crime
Occupational crimeSKS
 
Weapons development
Weapons developmentWeapons development
Weapons developmentSKS
 
Theories about right decision
Theories about right decisionTheories about right decision
Theories about right decisionSKS
 
Professional ethics
Professional ethicsProfessional ethics
Professional ethicsSKS
 

More from SKS (20)

Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar report
 
Deep learning seminar report
Deep learning seminar reportDeep learning seminar report
Deep learning seminar report
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar report
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Reinforcement learning
Reinforcement  learningReinforcement  learning
Reinforcement learning
 
Variety of moral issues
Variety of moral issuesVariety of moral issues
Variety of moral issues
 
Research ethics
Research ethicsResearch ethics
Research ethics
 
Industrial standards
Industrial standardsIndustrial standards
Industrial standards
 
Engineering as experimentation
Engineering as experimentationEngineering as experimentation
Engineering as experimentation
 
Controversy and consensus
Controversy and consensusControversy and consensus
Controversy and consensus
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 
A balanced outlook on the law
A balanced outlook on  the lawA balanced outlook on  the law
A balanced outlook on the law
 
Theories about the right decision
Theories about the right decision Theories about the right decision
Theories about the right decision
 
Chernobyl case study
Chernobyl case studyChernobyl case study
Chernobyl case study
 
Self intrest
Self intrestSelf intrest
Self intrest
 
Occupational crime
Occupational crimeOccupational crime
Occupational crime
 
Weapons development
Weapons developmentWeapons development
Weapons development
 
Theories about right decision
Theories about right decisionTheories about right decision
Theories about right decision
 
Professional ethics
Professional ethicsProfessional ethics
Professional ethics
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Reducing risk

  • 1. 1
  • 2. ETHICS Ethics, also called moral philosophy, the discipline concerned with what is morally good and bad and morally right and wrong. The term is also applied to any system or theory of moral values or principles. 2
  • 3. 3
  • 4. Risk Any work which might lead to harm us and is not considered safe, can be understood as a risk. According to a popular definition, “A risk is the potential that something unwanted and harmful may occur.” According to William D Rowe, potential for the realization of unwanted consequences from impending events. 4
  • 5. Cont.. Risk is a broad concept covering many different types of unwanted occurrences. When it comes to technology, it can equally well include dangers of bodily harm, of economic loss or of environmental degradation. These in turn can be caused by delayed job completion, faulty products or systems or economically or environmentally injurious solutions to technological problems. 5
  • 6. Acceptability of Risk The acceptability of risk depends upon the types of risks such as voluntary and involuntary risks, short term and long term consequences, expected probability, reversible effects, threshold levels for risk, delayed and immediate risk, etc 6
  • 7. Voluntarism and Control The person who breaks a red signal, is prone to be a victim of an accident, but risks. A person who lives near a dumping yard is prone to ill-health, but neglects. A boy who rides a vehicle at a high speed cannot rely on the perfect functioning of the brakes. But these people take voluntary risks thinking they can control. 7
  • 8. Effective information on Risk assessment The acceptance of risks also depends on the manner in which information necessary for decision making is presented. A person can be motivated to violate the safety rules by explaining the higher probability of success, whereas the same person can be demotivated from such task, by explaining the probability of failure and the fatal effects of it. 8
  • 9. Job-related Risks In some jobs where the workers are exposed to chemicals, radiations and poisonous gases etc., they are not informed about the probable risks the workers would be facing, in doing their jobs. These are such dangers where the toxic environments cannot readily be seen, smelled, heard or sensed otherwise. 9
  • 10. Magnitude and Proximity It is unfortunate that most of us, realize the magnitude of risk only when we ourselves or the person who is in our close proximity or a relative, gets affected. A group of 20 friends including us, if gets affected or if had a narrow escape from death, affects us more than the incident occurred to a group of 50 strangers, in a group of a 1000. This proximity effect arises in perceptions of risk over time as well. A future risk is easily dismissed by various rationalizations including − • The attitude of “out of sight, out of mind”. • The assumption that predictions for the future must be discounted by using lower probabilities. • The belief that a counter-measure will be found in time. 10
  • 11. Risk Analysis Some of step wise risk analysis includes- • Hazards identification • Failure modes and frequencies evaluation from established sources and best practices. • Selection of credible scenarios and risks. • Fault and event trees for various scenarios. • Consequences-effect calculations with work out from models. • Individual and societal risks. 11
  • 12. Risk Benefit Analysis As per the famous saying, “A Ship in harbor is safe. But that’s not what ships are built for” risk is somewhat common to be accepted. The most common risk we all take is driving an automobile in a traffic. Though we are not sure about the perfect functionality of the brake system and the timings of other drivers’ responses, we take risk. The controlling factor appears to be their perception of their individual ability to manage the risk-creating situation. 12
  • 13. Types of risk The risk to be occurred in future is completely known after it gets fully developed. It is called as Real future risk. If the idea of risk is developed using current data, such one is called as Statistical risk. The risk which is analytically based on system models structured from historical studies is called as Projected risk. The risk which is intuitively seen by individuals is called as Perceived risk. 13
  • 14. Example If risks of traveling on an air-plane is considered for observation, then the flight insurance company can observe it as a statistical risk, while the risk the passenger faces is Perceived Risk and the Federal aviation administration, faces a Projected risk. Hence, the view of accepting the risk and the idea of risk to benefit ratio motivates the individual. 14
  • 15. Risk Reduction Risk reduction is one of the four main risk management techniques to be used in conjunction with other techniques to help an individual or organization effectively manage the risk of loss. Risk reduction refers to the way an insurance company or organization can reduce its financial losses by implementing measures that reduce the financial impacts of potential losses. 15
  • 16. Some examples of common and effective risk reduction practices include: • Installing security systems or alarms to reduce the frequency of crime losses. • Installing sprinklers and smoke detectors to reduce the amount of damage a fire loss can cause. Risk reduction is also sometimes called loss mitigation. 16
  • 17. The risks we generally face can be reduced to a great extent by proper analysis with steps. as mentioned below − • Define the Problem. • Generate Several Solutions. • Analyze each solution to determine the pros and cons of each. • Test the solutions. • Select the best solution. • Implement the chosen solution. • Analyze the risk in the chosen solution. • Try to solve or move to next solution. 17
  • 18. Examples of risk reduction are: • medical care, • fire departments, • night security guards, • sprinkler systems, • burglar alarms —attempts to deal with risk by preventing the loss or reducing the chance that it will occur. 18
  • 19. Risk Avoidance vs. Risk Reduction Risk Avoidance Risk avoidance is not performing any activity that may carry risk. A risk avoidance methodology attempts to minimize vulnerabilities that can pose a threat. Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization's assets. Risk Reduction Risk reduction is a risk management technique that involves reducing the financial consequences of a loss. This encompasses a whole range of things including reducing the seriousness of a loss, reducing its frequency, or making it less likely to occur overall. 19
  • 20. 20