Identifying the sources of risk is the most critical stage in your risk assessment process. You need to do this to manage the sources for pro-active risk management. The better you understand the sources, the better the outcomes of the risk assessment process, and the more meaningful and effective your management of these risks will be. The appropriate risk identification method will depend on:
(Berg, 2010)
Moreover, hazards and risks must be mapped to actual processes and activities (Domokos, et al., 2015).
Instead of moving directly into hazard and risk identification after establishing the context, your risk assessors should look more broadly at potential risk events than their knowledge and experience might suggest otherwise. It is helpful to draft a hazard or threat inventory that can be used together with the production process, such as in mining, being examined to develop a set of risk events for analysis. The scope can extend beyond safety, environment and community to include government relations or commodity price changes (Australian Government, 2016).
You will use all information you’ve obtained for understanding key risk events and their frequency and severity during risk identification in the subsequent risk analysis and evaluation. Most risk information is obtained from experienced operators and subject matter experts who jointly understand the activities that will be carried out and their potential impacts on the business and the assets in the wider environment. Information on broader community impacts from experts and external stakeholders is most often obtained during specifically convened workshops and subsequent ongoing follow-up and consultation with experienced operators, specialists and their teams (Australian Government, 2016).
There are many different ways to identify hazards, but three common and effective ways to systematically identify existing hazards are (Noth, 2012):
The most common techniques used to identify hazards include as follows (Noth, 2012):
Risk registers: Previous risk assessment outcomes, incident reports, workplace hazard inspections, observations of work tasks and activities.
Source: Pennsylvania office of administration for information technology, 2014
Pennsylvania office of administration for information technology (2014). Risk management methodology.
Source: Chrisholm&Naci, 2009