Navigating Risk in the Modern Business Landscape: Strategies and Insights for Enterprise Risk Management Implementation
Oluwaseun Oladeji Olaniyi *
University of the Cumberlands, 104 Maple Drive, Williamsburg, KY 40769, United States of America.
Samuel Oladiipo Olabanji
Midcontinent Independent System Operator (MISO Energy), 720 City Center Drive, Carmel, Indiana 46032, USA.
Anthony Idoko Abalaka
Ashland University, 401 College Avenue, Ashland OH, 44805, United States of America.
*Author to whom correspondence should be addressed.
Abstract
As businesses actively seek ways to safeguard their valuable data and resources, efficient defense techniques are paramount [1]. The surge in cyber threats, driven by malicious attacks and cybercrime fueled by internet technology and mobile apps, emphasizes the urgency for comprehensive risk management strategies [2]. Effective risk management strategies have become indispensable for competitive businesses [1]. ERM entangles determining, evaluating, and thwarting potential hazards that endanger business objectives [3].
Successful ERM implementation faces challenges like corporate culture, board knowledge, excessive risk lists, undefined timeframes, and engagement barriers [4]. Solutions include fostering transparency, improving board education, focusing on crucial risks, defining timeframes, and making ERM engaging for employees [4]. Key components of effective ERM include governance, strategy, performance assessment, communication, and information sharing [5]. For future research, exploring the integration of emerging technologies in ERM and studying the long-term impacts of successful ERM implementations holds promise [6]. A strong risk culture, defined roles, and transparent communication are essential for sustainable ERM success [7]. To thrive in a dynamic business landscape, organizations must build a robust risk culture that permeates every level of their operations [7].
Keywords: Corporate culture, governance, strategy, performance assessment, communication, information sharing, technology, challenges, solutions
How to Cite
References
Paananen H, Lapke M, Siponen M. State of the art in information security policy development. Computers & Security. 2020;88:101608. Available:https://doi.org/10.1016/j.cose.2019.101608
Olaniyi OO, Omubo DS. The importance of coso framework compliance in information technology auditing and enterprise resource management. The International Journal of Innovative Research & Development; 2023. Available:https://doi.org/10.24940/ijird/2023/v12/i5/MAY23001
Tucci L. What is risk management, and why is it important? TechTarget; 2023. Available:https://www.techtarget.com/searchsecurity/definition/What-is-risk-management-and-why-is-it-important#:~:text=Risk%20management%20is%20the%20process,errors%2C%20accidents%20and%20natural%20disasters.
Fraser JRS, Simkins BJ. The challenges of and solutions for implementing enterprise risk management. Business Horizons. 2016;59(6):689-698. Available:https://doi.org/10.1016/j.bushor.2016.06.007
COSO. Enterprise risk management integrating with strategy and performance. Committee of Sponsoring Organizations of the Treadway Commission; 2017. Available:https://www.coso.org/Shared%20Documents/2017-COSO-ERM-Integrating-with-Strategy-and-Performance-Executive-Summary.pdf
Olaniyi OO, Olaoye OO, Okunleye OJ. Effects of information governance (IG) on profitability in the Nigerian banking sector. Asian Journal of Economics. Business and Accounting. 2023;23(18):22–35. Available:https://doi.org/10.9734/ajeba/2023/v23i181055
Thackeray J. Seven key elements of effective enterprise risk management. CFO University; 2023. Available:https://cfo.university/library/article/7-key-elements-of-effective-enterprise-risk-managementthackeray#:~:text=Culture%2C%20Governance%20and%20Taxonomy&text=These%20three%20factors%20help%20an,must%20for%20successful%20ERM%20implementation
Li L, He W, Xu L, Ash I, Anwar M, Yuan X. Investigating the impact of cybersecurity policy awareness on employees cybersecurity behavior. International Journal of Information Management. 2019;45:13–24. Available:https://doi.org/10.1016/j.ijinfomgt.2018.10.017
Oracle. What is enterprise risk management (ERM)?; 2023. Available:https://www.oracle.com/erp/risk-management/what-is-enterprise-risk-management
Vincent NE, Barkhi R. Evaluating Blockchain Using COSO. Current Issues in Auditing. 2021;15(1):A57–A71.
Available:https://doi.org/10.2308/CIIA-2019-509
Vollmer S. Companies shape enterprise risk management to fit their culture. Financial Management (FM); 2012. Available:https://www.fm-magazine.com/news/2012/apr/companies-shape-enterprise-risk-management.html
Al-Dhaqm A, Razak SA, Ikuesan RA, Kebande VR, Siddique K. A review of mobile forensic investigation process models. IEEE Access. 2020;8: 173359–173375. Available:https://doi.org/10.1109/ACCESS.2020.3014615
Olagbaju OO, Babalola RO, Olaniyi OO. Code alternation in english as second language classroom: A communication and learning strategy. Nova Science; 2023. Available:https://doi.org/10.52305/YLHJ5878
Olagbaju OO, Olaniyi OO. Explicit and differentiated phonics instruction on pupils literacy skills in gambian lower basic schools. Asian Journal of Education and Social Studies. 2023;44(2):20–30. Available:https://doi.org/10.9734/ajess/2023/v44i2958
Olaniyi OO, Okunleye OJ, Olabanji SO. Advancing data-driven decision- making in smart cities through big data analytics: A comprehensive review of existing literature. Current Journal of Applied Science and Technology. 2023;42(25):10–18. Available:https://doi.org/10.9734/cjast/2023/v42i254181
Olaniyi OO, Omubo DS. WhatsApp Data Policy, Data Security, And Users Vulnerability. The International Journal of Innovative Research & Development; 2023. Available:https://doi.org/10.24940/ijird/2023/v12/i4/APR23021