Search

Structuring an enterprise risk assessment protocol : traditional practice and new methods

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20170012528</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20170426130156.0</controlfield>
    <controlfield tag="008">170417e20170301esp|||p      |0|||b|spa d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">7</subfield>
    </datafield>
    <datafield tag="100" ind1=" " ind2=" ">
      <subfield code="0">MAPA20170004790</subfield>
      <subfield code="a">Abkowitz, Mark</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Structuring an enterprise risk assessment protocol</subfield>
      <subfield code="b">: traditional practice and new methods</subfield>
      <subfield code="c">Mark Abkowitz, Janey Camp</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">In a world that has become increasingly complex, enterprise risk management (ERM) has emerged as a practice for identifying reasonably foreseeable hazards that pose risks to an organization, both its physical and human assets. Due to the breadth and depth of factors that can impact an organization's risk portfolio, it is incumbent that the underlying risk assessment process that supports ERM embodies a holistic and systematic approach. This is easier said than done, however, as much of the effort in self-acclaimed ERM programs remain entrenched in compartmentalized parts of the organization or ignore threats that are outside of the box of the operating environment to which management is accustomed. This environment therefore creates opportunities for key risks to go unnoticed. The authors propose a comprehensive, yet flexible framework for overcoming this challenge, an approach that can be utilized by both the public and private sector. A sample application is provided, using a free, web-based tool developed as part of the initiative.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080601522</subfield>
      <subfield code="a">Evaluación de riesgos</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20170005087</subfield>
      <subfield code="a">Camp, Janey</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077001748</subfield>
      <subfield code="t">Risk management & insurance review</subfield>
      <subfield code="d">Malden, MA : The American Risk and Insurance Association by Blackwell Publishing, 1999-</subfield>
      <subfield code="x">1098-1616</subfield>
      <subfield code="g">01/03/2017 Tomo 20 Número 1 - 2017 , p. 79-97</subfield>
    </datafield>
  </record>
</collection>