Verified Document

Corporate Risk Management: Terrorist Attack Term Paper

When the risk is acceptable, stringent measures, including organizational arrangements, engineering control, and research and development, need to be taken. Research and development are particularly important, as mitigation measures can then be implemented that are particularly targeted towards the measure of possible terrorist attack for the country involved. Reducing the likelihood of terrorist attack can in certain cases be a better response to terrorist threat than avoidance, as it mitigates many of the additional risks involved in the latter. Thirdly, reducing the consequences of terrorist attacks is a retrospective approach. This is done by measures such as contingency planning, recovery plans, design features, surveillance, and the like. Such measures are best implemented by learning from the past experiences of terrorist attacks on the company involved, or indeed from other companies. Research and development are also important in this response. The past should be investigated thoroughly during the planning stage of expansion in this regard.

Finally, transferring the risk of terrorism is also a measure that can be taken by globally expanding...

There are several ways in which this measure can be handled. Contracts, insurance, partnerships and consortia, or combinations of these are options that a company can use. Specifically, when expanding to a country where the risk is high, a company may wish to create a partnership with a local company, so that the risk is in effect shared, mitigating the risk to the parent company.
With regard to the above-mentioned measures, it should also be kept in mind that they are not necessarily mutually exclusive, and can be used in combination for optimal benefit.

Sources

Campion, Kevin. 2002, Nov. 15. Integrating Terrorism Risk Management with the Federal Terrorism Program. Benfield Blanch, Inc. http://www.benfieldgroup.com/NR/rdonlyres/2319B84C-7C18-4280-B057-839E6F0243D5/0/11_02BB.pdf

Gould, Nathan C. 2004, July. Managing Terrorism Risk. ABS Consulting. http://www.irmi.com/Expert/Articles/2004/Gould07.aspx

Parachini, John. 2000, Jul. 26. Combating Terrorism: Assessing Threats, Risk Management, and Establishing Priorities. Center for Nonproliferation Studies. http://cns.miis.edu/pubs/reports/paraterr.htm

Sources used in this document:
Sources

Campion, Kevin. 2002, Nov. 15. Integrating Terrorism Risk Management with the Federal Terrorism Program. Benfield Blanch, Inc. http://www.benfieldgroup.com/NR/rdonlyres/2319B84C-7C18-4280-B057-839E6F0243D5/0/11_02BB.pdf

Gould, Nathan C. 2004, July. Managing Terrorism Risk. ABS Consulting. http://www.irmi.com/Expert/Articles/2004/Gould07.aspx

Parachini, John. 2000, Jul. 26. Combating Terrorism: Assessing Threats, Risk Management, and Establishing Priorities. Center for Nonproliferation Studies. http://cns.miis.edu/pubs/reports/paraterr.htm
Cite this Document:
Copy Bibliography Citation

Related Documents

Corporate Risk Management: Terrorist Attack
Words: 617 Length: 2 Document Type: Term Paper

By examining existing occurrences of terrorist attacks, some of the unknown factor can be removed from the threat. Furthermore, the exact nature of terrorism can be quantified in terms of definitions and key terms. This also mitigates much of the uncertainty surrounding the issue. Terrorism can for example be understood by the definition of threat and/or violence in order to achieve an end. Terrorists generally want to force the

Corporate Risk Management: New Horizons
Words: 620 Length: 2 Document Type: Term Paper

All personnel need to be fully informed regarding risk management, particularly in terms of disaster, terrorism, or other unknown factors. Employees and employers therefore need to maintain an open communication system, through which risk management occurs as a dynamic rather than static system. Management should for example provide workers with the opportunity to offer suggestions relating to the current risk management manual. These can be communicated via spoken or

Criminal Justice - Risk Management
Words: 892 Length: 3 Document Type: Thesis

Other specific risks to patrol officers, including those operating in pairs, include standard procedures suggested by past studies of the circumstances in which attacks on officers have occurred. For example, interviews with prisoners who assaulted officers during their arrests disclosed that many such attacks were initiated by the subject upon realization that their arrest was imminent. In many cases, it was the radio transmission alerting the officers of the subject's

Security Risk Management Process -
Words: 3314 Length: 13 Document Type: Term Paper

Microsoft proposes six steps to enable proper reactive management of security risks which include: protecting safety and life, containing and assessing the damage, determining the cause of and repairing damage, reviewing risk response and updating procedures in the hopes of preventing risk in the future (Microsoft, 2004). A proactive approach is much more advantageous however as it enables corporations to prevent threats or minimize risks before negative occurrences happen within an

Risk and Insurance: Aramark Risk
Words: 2953 Length: 10 Document Type: Term Paper

They were just so intense, so focused, so transaction-driven, there literally wasn't time for people to put ideas out and discuss and debate them." These constraints to effective management oversight and innovation were further exacerbated when the company went private in 2001. According to Stopper, "ARAMARK went from a leveraged buyout situation in 1984, with only some 50 people having equity in the company, to an initial public offering (IPO)

Terrorist Groups Use of Cloud Technology
Words: 4606 Length: 15 Document Type: Dissertation or Thesis complete

Terrorist Group's Use Of Cloud Technology After the 1980s there have been changes on a global scale that included post cold war developments. The changes in Eastern Europe and the Soviet Union coupled with the technological change on the nations of the East caused structural and perceptional changes that were needed to make them competitive in high technology; which included everything from military to the service sector. There was advance of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now