StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Risk as the Probability of Harmful Consequences - Essay Example

Cite this document
Summary
The paper "Risk as the Probability of Harmful Consequences" states that worldwide disaster response personnel should be trained about ICS and endorse it in their disaster management programmes. This would take a large load off government departments, especially the inexperienced ones…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
Risk as the Probability of Harmful Consequences
Read Text Preview

Extract of sample "Risk as the Probability of Harmful Consequences"

? Risk Management Question Risk is defined as the probability of harmful consequences that result from interactions between human induced or natural hazards including vulnerable conditions. These consequences include casualties, lost livelihoods, damaged properties, damage to the environment and disrupted economic activity. Risk assessment is the process that determines the kind and the extent of such a risk to a community, through analysing and evaluating the hazards and vulnerability of the existing conditions that could potentially cause harm to people, property and their environment. Assessing the risk comprehensively includes evaluating the total magnitude and likelihood of the potentiality of losses, and also offers a full understanding, of the roots and impact of these losses (Kevin, n.d.). A comprehensive risk assessment involves the following steps: 1. Setting and understanding the context. It involves articulating the objectives and the parameters of the institution considers when managing risks. This is assesses the current situation, needs gaps and evaluates what already exists, to build on the capacity and avoid duplication of efforts. This is carried out through a systematic inventory and evaluation of the already existing risk assessment studies and the available data (FIRESCOPE, 1994). 2. Hazard identification This involves finding the type, location, intensity, and likelihood of threats and risks prevalent in a given community. 3. Evaluating exposure This identifies the population and the property that is at risk and demarcates disaster prone areas. 4. Analysis of vulnerability This determines the capacity of the elements in a given community at risk to withstand the risk conditions. 5. Impact analysis This outlines the estimation of potential losses of the exposed population, property, livelihood, environment and the economy. 6. Profiling the risk This evaluates the various cost effective risk reduction options available, in terms of the ability of the community in risk reduction and its socio-economic concerns. 7. Formulation and revisions of action strategies and plans. This involves setting priorities, allocation of resources (both human and financial) and initiating relevant programmes. The all hazards approach entails inclusion of all the possible types of risk or threat in risk assessment. It aims to include all the types of risk, irrespective of the source, to give a standardized overview guided by a set of principles and steps. It’s a comprehensive and integrated means of assessing threats and risks. Assessing risks using the all hazards approach in an integrated way significantly reduces the vulnerability of people, property, environment and the economy (Service, 2010). Question 2 Business continuity refers to the ability of an organization to provide support and service to its clients and its ability to keep up its viability before, during and after a business continuity occurrence. It’s a holistic management approach that recognizes the potential impact that would threaten the firm and it offers a framework of building the capacity and resilience for an effective response so as to safeguard its interests. Although it may be more practical for large businesses, it is very important to maintain full functioning throughout a disaster crisis. Business continuity plans also outlines the basic concerns like the leadership command in an event a company leader dies or is really ill. They also address backup plans for drastic scenarios such as patent lawsuits, labour disputes, or bottlenecks distortions. This allows the leaders to review the threats and weaknesses to their organization from a detached point of view. Tight plans guarantee the teams that the leaders are aware of how to turn on a dime when in challenging times. The process can also highlight the weaknesses of an organization can correct way before facing a disaster. For a business to be successful, it has to constantly meet the needs to its customers. Failure to this the customers will go elsewhere and hence reduce profits to a great extent. Reputation is one of the best features of a business and this can be boosted by being known for distraction preparedness. Business continuity plans have become very popular especially to contractors where some may need this plan as part of the contract. Insurance providers have begun asking for business continuity plans during insurance application and this means that businesses with continuity plans will be better placed when securing competitive insurance covers for business. Relying on resources outside the company is recommended as it saves money compared to shadowing facilities. It also ensures that employees and the entire stake holders of the organization can recover effectively, based on strategy and not emotion, during the times of disaster (NETC, 2004). Question 3 An incident is an occurrence requiring action by emergency service persons. An incident command system is a standardized on-scene all-risk incident management model. It specifically designed to allow adoption of an integrated organizational structure by respondents to be equal to the complexity and demands for any incidents without barriers such as jurisdiction boundaries. It is designed to be: 1. Standardized. Everyone operates from the same structure which supersedes hierarchies the respondent teams bring to them. Every responder understands the flow of resources, assignments and information within the ICS and adopts that structure until the disaster is terminated. 2. Scalable. ICS can be applied in incidences ranging from a broken pipe that floods several homes to a hurricane that sweeps a multi-state wallop. 3. Multi-jurisdictional. ICS is designed to offer a single management structure for respondents of multiple for instance fire district, states or counties to effectively manage a response from people answerable to different bosses, possess different skills and have different equipment. 4. “On scene” use. Management of a disaster is carried out as the disaster unfolds, on the exact place or very close to it. This makes sure managers have timely information on which to base decisions, and not have to wait for issuance from bureaucrats from state capital (UNDP, 2010). Worldwide disaster response personnel should be trained about ICS and endorse it in their disaster management programmes. This would take a large load off government departments especially the inexperienced ones and leave the skilled team to effectively do their job in incidences of disaster. ICS will also minimize the barriers to access disaster sites especially caused by boundaries issues, hampering the response. References FIRESCOPE. (1994). Incident Command System. Califonia: OES FIRESCOPE OCC. Kevin. M. (N.d.). Disaster Management Program. Retrieved from US Forest Service: http://www.fs.fed.us/global/aboutus/dmp/welcome.htm NETC. (2004). Incident Command System: Introduction and Overview. New York: National Emergency Training Center. Service, T. S. (2010). National Emergency Risk Assessment Guidelines. Hobart: Commonwealth of Australia and each of its states and territories, 2010. UNDP. (2010). Disaster Risk Mangement. New York: UNDP. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Assignment 2 Essay Example | Topics and Well Written Essays - 1000 words - 2”, n.d.)
Assignment 2 Essay Example | Topics and Well Written Essays - 1000 words - 2. Retrieved from https://studentshare.org/environmental-studies/1490455-assignment
(Assignment 2 Essay Example | Topics and Well Written Essays - 1000 Words - 2)
Assignment 2 Essay Example | Topics and Well Written Essays - 1000 Words - 2. https://studentshare.org/environmental-studies/1490455-assignment.
“Assignment 2 Essay Example | Topics and Well Written Essays - 1000 Words - 2”, n.d. https://studentshare.org/environmental-studies/1490455-assignment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Risk as the Probability of Harmful Consequences

A Risk Assessment on My Comrade's Suicide-Potential

All of my observations accounted to the higher probability of his suicidal attempt.... Potential Consequences Mandel (2007) defined risk as referring “to the expected loss associated with an event” (p.... These potential consequences plagued and pushed me not to leave him alone and check on accessible firearms he could use.... The impact of the probable consequences will surely ricochet to his family, to our troop, and direct head....
3 Pages (750 words) Essay

Health Risk Behaviour Among University Students

The patient may not even be a smoker but passive smoking can cause the same harmful consequences as smoking a cigarette (Bachman et al, 1981).... This dissertation "Health risk Behaviour Among University Students" is about the definition of health risk behaviour Behaviour is the main factor in determining the lifestyle that an individual leads.... The exuberance that is brought about by their youthful age combined with the influence of their peers results in a large level of risk for these students to engage in the behavior....
28 Pages (7000 words) Dissertation

Risk Management in Information System Development

The process of project risk analysis is a subjective assessment that is based on the probability of failure to realize the set project objectives within the given time framework and resources allocated (Durkovic & Rakovic, 2009).... Risk is defined as an event that has a certain probability of occurrence, and whose occurrence is likely to cause negative or harmful influence on the project (Durkovic & Rakovic, 2009) The process of developing a new information system requires a careful and in-depth risk analysis and assessment, and hence Briargrove must conduct a risk assessment and analysis before the inception of the project....
5 Pages (1250 words) Research Paper

Communication to mitigate disasters

n a 2004 report, the United Nations Development Programme defined risk as “the probability of harmful consequences or expected loss of lives, people injured, property, livelihoods, economic activity disrupted (or environment damaged) resulting from interactions between natural or...
14 Pages (3500 words) Research Paper

Fire Risk Management in Students' Hostels

These definitions reveal important factors of any risk: the probability of a risk's occurrence, which can be described or quantified, and the consequences, the harmful severity of which also can be described or quantified (e.... but it is always necessary to keep in mind that the overwhelming majority of risks occur as consequences of human decision making (Coles et al.... isk management includes various activities and control measures related to the evaluation of risks, the lowering the risks' probability and the diminishing of the harmfulness of their consequences....
10 Pages (2500 words) Research Paper

Environmental Hazards and Risk

It is the “possibility of loss or injury” and the “degree of probability of such loss” (Kaplan & Garrick 1981).... This viewpoint of risk together with that which considers risk as hazard and outrage emphasize more on metrics as opposed to the technical importance.... Viewing risk as only threat and vulnerability or as hazard and outrage does not represent sufficiently the real situation of risk.... Definition of Risk Risk has been defined as probability times consequences (Helm 1996)....
12 Pages (3000 words) Coursework

Similarities and Differences between Security Risk Management

Threat assessment identifies the possibility of adverse consequences and responses to apply to the threat that depends on probability and impact.... The paper "Similarities and Differences between Security risk Management" states that the outcome of both assessments provides recommendations that maximize the protection of confidentiality, integrity and availability while providing usability and functionality.... Security has embraced the principles and application of risk management, for instance, a probabilistic risk approach to measure risk and aid decision making (Talbot & Jakeman, 2008)....
10 Pages (2500 words) Coursework

The Issue of Environmental Risk

These efforts aimed at controlling the impacts of the effluent water should be focused on ensuring little disposal of harmful water to the water system so that aquatic life is not harmed.... This can be achieved by informing him about the benefits that are likely to be derived from controlling the number of harmful substances in the water.... A five-point scale was used to rank the risks and consequences to which the endpoints were exposed.... In terms of the consequences, the consequences were classified as 'Negligible' with a scale of 1, 'significant' with a score of 2, 'Highly significant' with a score of 3, 'disastrous' with a score of 4 and 'catastrophic' with a score of 5....
5 Pages (1250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us