scholarly journals Risk Analysis Using HOR and SWOT on Spice Importers Based on Organization and Industrial Taxonomy

Tibuana ◽  
2021 ◽  
Vol 4 (02) ◽  
pp. 125-130
Author(s):  
Moh Fuad Firdaus ◽  
Hana Catur Wahyuni

Abstract — CV. 777 is a spice import company that has problems in mitigating events that are quite detrimental to the company. Starting from late arrival until over stock in the warehouse. The method used is the House Of Risk and SWOT methods, where with these methods the highest risk can be known and mitigation actions will be taken. This research resulted in 14 Risk Events and 27 Risk Agents where the Risk Agent with the highest ARP value will be followed up using the SWOT method. In the study, one Risk Agent with the highest ARP value or the one with the strongest influence was found, namely Risk Agent A12 with an ARP value of 255 (fluctuations in demand for goods by customers), while the Risk Agent with the weakest influence was A4 with an ARP value of 3 (imported goods). excessive) and A26 with an ARP value of 3 (miscommunication between employees). The risk agent with the highest ARP then continued using the SWOT method and resulted in four strategies, namely SO strategy, ST strategy, WO strategy, and WT strategy. With the mitigation strategy produced by the company, it will be able to minimize the risks that can occur to the company.

2019 ◽  
Vol 11 (2) ◽  
pp. 100-115
Author(s):  
Idzhar Jaya Nugraha ◽  
Akhmad Riyadi Wastra ◽  
Lilis Imamah Ichdayati

Tea is an Indonesian excellent product that has been recognized worldwide. Indonesia is the seventh best tea producer which have international market potential.Therefore Tea Indonesia is expected to take advantage on existing opportunities from downstream industry of tea. The one of stated-owned plantation company who have downstream industry of tea is PT Perkebunan Nusantara VIII. Walini’s tea is a one famous brand product for this company. The development downstream industry of tea PTPN VIII is faced with yet achieved the expected sales. Amount of cost operational marketing and sales are indicated of operational risk. The objective of this study is strategy handling of marketing operational risk Walini Green tea bag product in downstream industry of tea PTPN VIII. Identification risk is first step to know the problem of marketing operational in downstream industry of tea PTPN VIII. By using Z-Score and Value at Risk (VAR) metode, it be showed the result of probability and impact of marketing operational risk. Preventif and mitigation strategy can be handling this company to growth up the expected sales.


2015 ◽  
Vol 3 (2) ◽  
pp. 248
Author(s):  
Grasiano Warakano Lailossa

The differences In cold chain system, Risk analysis and Hazard Analysis and Critical Crisis Point(HACCP) is a procedure for the identification, assessment and control of hazards in, and indirectly risks from, food. HACCP procedures focus on chemical, physical and microbiological hazards, Yellow Fin Tuna is the one of the most superior export fishery product of Moluccas, based on paper review and field observation in Molucass, this paper is a preliminary study to development HACCP framework of frozen Yellow Fin Tuna in Moluccas.


2013 ◽  
Vol 16 ◽  
pp. 863-869
Author(s):  
Chandru Mirchandani

Author(s):  
Miguel Torrealba S. ◽  
Mireya Morales P. ◽  
José M. Campos ◽  
Marina Meza S.

This chapter proposes a software prototype called 2thecloud, programmed in HTML and PHP under free software guidelines, whose main objective is to allow end users to be aware of imminent cloud dangers. To do this, the user must undergo a metacognitive process of basic risk analysis, which suggested result would be to what cloud the object should go. Through the use of this tool is expected that he / she can develop a risk analysis capability, so that in this way he/she is the one who makes the final decision about selecting between different cloud models (public, private, hybrid, and community) where the object will be placed. An important aspect is that the user has to understand that different cloud models provide different levels of security and this will allow him/her to question safety in other settings, given that it is a work that goes beyond simply encrypting and filtering information. It also presented 2thecloud functions and a description of each step that indicate how it operates. Finally, the authors propose four alternatives in risk analysis calculation, which are plausibly adapted to 2thecloud and if they are implemented they will provide different advantages.


Author(s):  
Miguel Torrealba S. ◽  
Mireya Morales P. ◽  
José M. Campos ◽  
Marina Meza S.

This chapter proposes a software prototype called 2thecloud, programmed in HTML and PHP under free software guidelines, whose main objective is to allow end users to be aware of imminent cloud dangers. To do this, the user must undergo a metacognitive process of basic risk analysis, which suggested result would be to what cloud the object should go. Through the use of this tool is expected that he / she can develop a risk analysis capability, so that in this way he/she is the one who makes the final decision about selecting between different cloud models (public, private, hybrid, and community) where the object will be placed. An important aspect is that the user has to understand that different cloud models provide different levels of security and this will allow him/her to question safety in other settings, given that it is a work that goes beyond simply encrypting and filtering information. It also presented 2thecloud functions and a description of each step that indicate how it operates. Finally, the authors propose four alternatives in risk analysis calculation, which are plausibly adapted to 2thecloud and if they are implemented they will provide different advantages.


2012 ◽  
Vol 8 ◽  
pp. 437-442
Author(s):  
Chandru Mirchandani

2011 ◽  
Vol 9 ◽  
pp. 297-302 ◽  
Author(s):  
E. Genender ◽  
M. Mleczko ◽  
O. Döring ◽  
H. Garbe ◽  
S. Potthast

Abstract. The complexity of modern systems on the one hand and the rising threat of intentional electromagnetic interference (IEMI) on the other hand increase the necessity for systematical risk analysis. Most of the problems can not be treated deterministically since slight changes in the configuration (source, position, polarization, ...) can dramatically change the outcome of an event. For that purpose, methods known from probabilistic risk analysis can be applied. One of the most common approaches is the fault tree analysis (FTA). The FTA is used to determine the system failure probability and also the main contributors to its failure. In this paper the fault tree analysis is introduced and a possible application of that method is shown using a small computer network as an example. The constraints of this methods are explained and conclusions for further research are drawn.


2019 ◽  
Vol 623 ◽  
pp. A94 ◽  
Author(s):  
Sandra Unruh ◽  
Peter Schneider ◽  
Stefan Hilbert

Using the same lens galaxies, the ratios of tangential shears for different source galaxy redshifts is equal to the ratios of their corresponding angular-diameter distances. This is the so-called shear-ratio test (SRT) and it is valid when effects induced by the intervening large-scale structure (LSS) can be neglected. The dominant LSS effect is magnification bias which, on the one hand, induces an additional shear, and on the other hand, causes a magnification of the lens population. Our objective is to quantify the magnification bias for the SRT and show an easy-to-apply mitigation strategy that does not rely on additional observations. We use ray-tracing data through the Millennium simulation to measure the influence of magnification on the SRT and test our mitigation strategy. Using the SRT as a null-test we find deviations from zero up to 10% for a flux-limited sample of lens galaxies, which is a strong function of lens redshift and the lens-source line-of-sight separation. Using our mitigation strategy we can improve the null-test by a factor of ∼100.


Sign in / Sign up

Export Citation Format

Share Document