Javascript is required
A.M.G.E.I.Khalafallah. (2002). Estimating cost contingencies of residential building project using belief networks. Master of Science Thesis . Egypt.: Cairo University Giza.
A.M.G.E.I.Khalafallah. (2002). Estimating cost contingencies of residential building project using belief networks. Master of Science Thesis, Cairo University Giza, Egypt.
B.Y.Renault, J. &. (2016). A THEORETICAL REVIEW OF RISK IDENTIFICATION: PERSPECTIVE OF CONSTRUCTION INDUSTRY. 5th Applied Research Conference in Africa, (pp. 773-782). Ghana.
CAR. Morano, C. &. (2006). Application of techniques for the identification of risk in the E & P ventures Engevista. 8 (2), 120-133.
Council), I. (. (2005). Risk Governance – Towards an Integrative Approach, White Paper no 1, Renn O. with an Annex by P. Graham, Geneva: .
D.Cleden. (2009). Managing project uncertainty. New York: John Wiley & Sons.
D.Copper, S. G. (2005). Project Risk Management Guidelines: Managing Risk in Large Projects and Complex Procurements. England: John Wiley & Sons, Ltd.
E.Gajewska, &. M. (2011). Risk management practices in construction project: a case study. Master of Science Thesis, Chalmers of Technology, Goteborg, Sweden.
G.Shang, &. L. (2014). The Last Planner System in China's construction industry — A SWOT analysis on implementation. International Journal of Project Management, 32, 1260-1272.
G.Winch. (2002). Managing construction projects, an information processing approach. Oxford: Blackwell Publishing.
G.Winch. (2003). Models of Manufacturing and the Construction Process: the genesis of re-engineering construction. Building Research and Information, 31 (2), 107-118.
Hopkin, P. (2017). Fundamentals of Risk Management (Fourth ed.). Great Britain and the United States: Kogan Page Limited.
J.Rubin. (2010). Visualizing risk management--a new approach. North America, Washington: Project Management Institute Global Congress.
J.T.Mentzer, I. M. (2008). Global Supply Chain Risk Management Strategies. International Journal of Physical & Logistic Management, 38 (3), 192-223.
kpmg.us. (2020). Retrieved from https://advisory.kpmg.us/blog/2020/top-risks-consumer-retail-2021.html
N.J.Smith, T. &. (2006). Managing Risk in Construction Projects (2nd ed.). Blackwell Publishing.
P.Hopkin. (2017). Fundamental of Risk Management. London: kogan Page Limited.
P.Hopkin. (2017). Fundamental of Risk Management. London: kogan Page Limited.
S.Campbell. (2005). Determining overall risk. Journal of Risk Research, 8, 569-581.
S.Chopra, M. (2004). Managing risk to avoid supply chain breakdown. MIT Sloan Manag , 53-62.
S.Gates, J. &. (2012). Enterprise risk management: a process for enhanced management and improved performance. Management Accounting Quarterly, 13 (3), 28-38.
Satish. (2015). Retrieved from APNA Course: https://www.apnacourse.com/blogs/expert-judgement-project-tool/
T.Aven, O. R. (2009). On risk defined as an event where the outcome is uncertain. Journal of Risk Research, 12, 1-12.
THARANGA, D. (2020). CRITICAL REVIEW OF RISK IDENTIFICATION TECHNIQUES.
V.G. Venkatesh, S. S. (2015). AnalysisonsupplychainrisksinIndian apparel retai lchains and proposal of risk prioritization model using Interpretive structural modeling. Journal ofRetailingandConsumerServices , 153-167.
W.W.Lawrence. (1976). Of Acceptable Risk. Los Altos: William Kaufman Inc.
Zhanglei, H. X. (2013). Study on Risk and Prevention of Retail Enterprise-Oriented Supply Chain. International Conference on Education Technology and Management Science (ICETMS 2013) (pp. 1320-1322). Atlantis Press.
Websites
G.Brent, &. C. (1993). MIT Sloan Management Review. Retrieved from https://sloanreview.mit.edu/article/brainstorming-electronically/
GreyCampus. (n.d.). Retrieved from greycampus.com: https://www.greycampus.com/opencampus/certified-associate-in-project-management/risk-identification-tools-and-techniques-in-capm
Koon, R. (2018, Sep 28). Audits as a tool of risk assessment. Retrieved from https://www.naturalproductsinsider.com/contract-manufacturing/audits-tool-risk-assessment
P.Bower. (2009). Risk Management Options. Retrieved from http://www.projectsmart.co.uk/risk-management-options.html
P.Veyrat. (2016, June 1).What is the definition of risk management? Retrieved from www.heflo.com: https://www.heflo.com/blog/risk-management/what-is-the-definition-of-risk-management/
Pitman, D. (2019, Feb 12). Cyber Security Risk in Retail and How to Handle It. Retrieved from https://www.forbes.com/sites/danpitman1/2019/02/12/cyber-security-risk-in-retail-and-how-to-handle-it/?sh=28cc1d3749a0
web.actuaries.ie. (n.d.). risk identification. Retrieved from https://web.actuaries.ie/sites/default/files/erm-resources/risk_identification.pdf
Why Risk Identification Is Important in Business Process Management. (2019, Oct 21). Retrieved from https://3ccontactservices.com/risk-identification-important-business-process-management/
Woods, M. (2011). Risk Management in Tesco plc. Retrieved from https://irmforum.files.wordpress.com/2011/04/margaret-woods.pdf
www.acctuaries.com. (2021). Risk Identification Techniques/Sources . Retrieved from https://web.actuaries.ie/sites/default/files/erm-resources/fact_sheet_1_-_risk_identification.pdf
www.insureon.com. (2021). Retail risk management: The top 6 threats. Retrieved from https://www.insureon.com/blog/retail-risk-management-the-top-threats
www.web.acturies.ie. (n.d.). Risk Identification. Retrieved from https://web.actuaries.ie/sites/default/files/erm-resources/risk_identification.pdf
T.Fox. (2018). Retrieved from NAVEX GLOBAL: https://www.navexglobal.com/blog/article/differentiating-root-cause-analysis-risk-assessment-internal-investigation/
Tatham, M. (2018). Russian Hackers Aren’t the Only Ones to Worry About: Online Shopping Fraud Report. https://www.experian.com/blogs/ask-experian/the-state-of-online-shopping-fraud/.
Tesco plc Annual Report and Accounts 2019. (n.d.). Retrieved from https://www.tescoplc.com/investors/reports-results-and-presentations/annual-report-2020/
tescoplc.com. (n.d.). Retrieved from https://www.tescoplc.com/about/
tescoplc.com. (n.d.). Principal risks and uncertainties. Retrieved from https://www.tescoplc.com/media/264191/tescoar16_principalrisksanduncertainties.pdf
Search
Open Access
Research article

Risk Identification Techniques in Retail Industry: A case study of Tesco Plc

aradhana sharmaa1*,
ruchika jain2,
neena seth pajni2
1
Punjabi University, Patiala
2
Gobindgarh Public College, Alour, Khanna
Journal of Corporate Governance, Insurance, and Risk Management
|
Volume 9, Issue S1, 2022
|
Pages 201-214
Received: 12-13-2021,
Revised: 05-07-2022,
Accepted: 05-27-2022,
Available online: 08-30-2022
View Full Article|Download PDF

Abstract:

Purpose: The prime purpose of this paper is to analyze the risks associated with the retail industry and provide a overview of the risk identification techniques and tools. The paper also investigates the relationship between risk identification and risk management. Research Methodology: This paper is a conceptual paper and the methodology included a literature search. The present study is a literature review that examines available studies based on risk identification and its techniques in the retail business. Findings:Many risks have a high impact on the retail industry. Supplier uncertainty, change in the taste and preference of consumers, data security and threats, inventory risks, etc. all these types of risks are faced by the retail industry. Identifying these risks is a big challenge for the company. There are numerous risk identification techniques that companies can use to identify risks. Brainstorming, expert judgment, Delphi method, root-cause analysis, etc. techniques are discussed in this paper. Tesco plc applies the brainstorming, risk register and top-down and bottom-up approach to identify the risks. The findings of this study can be used as a case study of Tesco's retail operation, which is based in and managed primarily in this specific area. Tesco's decisions may contain some common tactics for identifying hazards, and some extremely unique ones. Practical Implications: Various corporations developed risk departments to identify and manage risks during the modernization and automation era. As a result, there is a demand for experts with specialized skills and experience in managing and assessing risk factors involved in the retail industry. These specialists' job is to identify hazards and develop methods to protect the organization from them. This study will assist the risk managers or professionals of the retail industry to use the techniques of risk identification and assess the risks appropriately.
Keywords: Risk identification, Retail industry, Risk management, Tesco plc

1. INTRODUCTION

In every business or industry risks are an inherent part and managing and identifying the risk is a crucial function of every business. Risk implies the potential earnings or outcomes obtained from expectations. In other words, risk refers to the level of risk that a shareholder is willing to take from an investment made by him. The retail sector is unique and assists the economy in employment generation and economic development. This sector is also affected by the number of risks and managing and assessing risks in the retail business has been considered an essential management process. Every retail firm that wants to thrive and exist for a long time needs to implement adequate risk management. Any risk management approach must start with identifying the risks that could have an impact on the company.

1.1 Risk

"Events that could arise that would undermine the targeted incentive delivery," says Hopkin. A risk is simply defined as "an unanticipated occurrence with unforeseen effects." Risk can result in positive or bad outcomes, as well as uncertainty.Numerous definitions have been given by various authors, which are put together in the following table:

Table 1. Definition of Risk
Name of the authorDefinition of Risk
Winch (2002)At a time when there is a scarcity of data, it is possible to accurately predict the future by looking at previous experiences. The consequences of an event are known and predicted.
Lawrence, 1976Risk involves the measurement of likelihood and the ranking of unfavorable outcomes.
RIGC,2005It is the unpredictability of an activity or event involving anything of human worth.
Campbell, 2005The projected damage is the same as the risk.
Cleden, 2009At a time when there is a scarcity of data, it is possible to accurately predict the future by looking at previous experiences.
Smith et al., 2006When there is some prior knowledge of an occurrence, risks arise.
Aven & Renn, 2009Concerning everything that people value, risk refers to the uncertain type and severity of the occurrences and results of a particular action.
Source: Author's Compilation
Table 2. Hopkin described the three categories of risk:
Types of risksMeaning
1. Hazard risksSome occurrences can only result in negative effects. These dangers must be managed within the company's acceptable risk thresholds. Theft is a clear example of a hazard risk that many businesses face.
2. Control riskThere are a few more dangers that can lead to confusion about the outcome. These risks are also known as control risks, and they are directly tied to managing projects.
3. Opportunity riskOccasionally, businesses will take calculated risks in the hopes of obtaining a beneficial outcome. These are referred to as speculative hazards. These risks are emphasized for investment purposes.
Source: Author's Compilation

Before explaining the risk identification, it is necessary to explain and define the risk management as risk identification is the first stage of the risk management process.

1.2 Risk management

It is the act of planning, coordinating, guiding, and controlling a company's human and material resources. Enterprise risk management, according to Veyrat (2016), assists managers in effectively dealing with connected uncertainties, threats, and opportunities to optimize the ability to produce value. Bower, 2009 stated that risk management is the total of all preemptive management-directed efforts inside a plan that are designed to combine a program's components' tolerable risk of failure. Copper et al., 2005 explained that risk management is a process that entails applying management rules, processes, and procedures to the activities of setting the context, recognizing, evaluating, analyzing, treating, measuring, and systematically communicating risks. "Risk management is a combination of operations carried out within an organization to produce the best possible outcome while reducing the ambiguity or instability of that outcome." (Hopkin, 2017, p.46).

Hopkin described the principles of risk management (Hopkin, 2017, p. 57).

· Alignment: Coordination of ERM efforts with other operations is critical.

· Proportionate: Risk management activities should be commensurate with the corporation's risk level.

· Embedded: Risk management operations needed to be integrated into the business.

· Comprehensive: To be entirely successful, the strategy has to be systematic.

· Dynamic: Risk-related activities must be adaptable and responsive to changing conditions and uncertainty.

2. STUDY OBJECTIVES

· To analysis the risks associated with retail industry.

· To study the tools and techniques of Risk Identification.

· To study the relationship between risk identification and risk management.

· To study the tools and techniques of Risk Identification used by TESCO PLC as a retailer.

3. METHODOLOGY

The present study is a literature review that examines available studies based on risk identification and its techniques in the retail business. Structured databases are used as the most effective technique to begin a literature search for the current overview, specifically Science Direct, Google Scholar, and Emerald. The analysis used keywords: risk identification, risk management, retail industry, Tesco plc. This study was conducted by looking for similar key terms in scholarly articles and relevant studies. The prsent study is a qualitative reserach and qualitative data source are used to achieve the objectives.

In this present study, secondary data is used by having different reserach questions. Thus, secondary data set in isolation method is used. Reserach questions are:

· What types of risks are associated with retail industry?

· What are the various risk identification techniques?

· What is the relationship between risk identification and risk management?

· What types of techniques are used by TESCO as a retailer?

To achieve the answers of these research questions, secondary data set isolation is most suitable method and these questions are different from the previous studies.

4. REVIEW OF LITRETURE

4.1 Risks in the Retail Industry

There is a risk of supplier uncertainty.Chopra, et al., 2004, explained that the inability of suppliers to adapt to changes in demand results in a loss of market share. The failure or insolvency of a stakeholder raises the supplier's uncertainty in meeting demand. Supplier risk is one of the risks which are faced by the retail industry. According to Husng et al., 2013long-standing tensions exist among suppliers and retailers in the retailing business. Although the retailer has authority over the display position of commodities in the retail process, the supplier influences the retail supply chain initiative. Risk issues will emerge when suppliers, such as force majeure, influence the retail company's main supply chain. Aside from the retail product purchase process, the supplier selection model is also critical. In their research, the authors further explained the inventory risk, which is closely related to the firm sales activity, since it is necessary to keep appropriate inventory to fulfill sales orders. Surplus inventory will occupy retail company finance, preventing the funds' chain from moving quickly; stock is insufficient, preventing retailers from completing their sales plans; and inventory is insufficient, preventing retailers from completing their sales plans. Furthermore, inventory security is a crucial aspect of inventory management; fire, robbery, breakage, or impregnation of such issues would enhance the retail company's leading supply chain inventory risk.Natural disasters and weather events can impact both physical shops and e-commerce businesses that keep merchandise in warehouses. Natural catastrophes not only cause physical damage to structures but also cause power outages, which lead to product losses in grocery stores and other retail outlets that sell perishable goods(www.insureon.com, 2021). Data breaches and digital theft are other risks faced by the retail industry. Cyber-attacks by hackers and professional groups pose a threat to customer and company data security.The rate of E-commerce theft and crimes are increasing day by day due to more customers now buying online. As perthe 2017 research conducted by credit agency Experian, internet retail crimes increased by 30% as compared to the previous year(Tatham, 2018). While the media has recently concentrated on cyber assaults against IT corporations, retailers remain a top target for hackers. As per Forbes, retail is among the top industries for targeted firms in almost each cyber security study produced in the last few years(Pitman, 2019).According to Manju and Mentzer, 2008, an organization's security and safety risks can be lethal. Security risk refers to unforeseen occurrences that endanger human resources, operational integrity, and information systems, resulting in incidents like freight theft, data theft, vandalism, criminality, and sabotage. Employee behavior poses a threat to an organization. Frequent worker turnover harms the organization's finances and reputation. Employee disagreements, resistance to change, and misappropriation of a company's assets are all frequent behaviors seen in most sectors, and these behaviors can operate as a barrier for an organization(V.G. Venkatesh, 2015). The next category of risk is Emerging disruptive technologiesglobal problems have rendered some digital disruptors – from buy online, pick up in-store to cashless payment solutions – into must-have investments for consumer and retail enterprises. Although CEOs may believe that the greatest technological risk is declining to innovate, a focus on the "disruptive" risks neglects other IT workhorses. A systematic, comprehensive approach to technology risk management systems can help to strike a compromise between the requirement for speed and the need to minimize business and technical risks(kpmg.us, 2020).

4.2 Risk Identification and Risk Identification Techniques

This is known as starting phase of risk management. Risk identification creates a base for the next two stages of risk analysis and risk control and assists the organization to make strategies for controlling risks. The technique of defining, measuring, and calculating probable relative unfavorable hazards is known as risk assessment. Quantitative or qualitative risk analysis is usually done using one or both tools (Koon, 2018). It requires generating a comprehensive list of risks and opportunities based on events that could aid, obstruct, degrade, expedite, or delay the achievement of your objectives (www.acctuaries.com, 2021). Regardless matter how big or small an organization is, it faces a variety of risks that might jeopardize its goals. As a result, these dangers must be detected using the right tools and approaches. The risk identification strategies used should have a significant effect on the organization's entire risk management strategy.

To measure all potential risks in the retail business various techniques are used. There are lots of techniques of risk identification in the literature that are discussedas follows:

4.2.1 Brainstorming- The term "brainstorming" is frequently applied to any sort of group discussion. Hopkin states that he gathers and discusses ideas during meetings to handle occurrences that may have an impact on priorities, fundamental processes, or key factors. According to Hopkin's (2017, p. 124) vision, brainstorming allows for the sharing of ideas concerning the company's significant risks during meetings. It is possible to achieve a shared impression of each risk as well as awareness of it. Khalafallah, 2020 mentioned that there are a variety of widely used brainstorming structures. Because it involves an open conversation with project teams and other project team members, this technique looks to be a well-organized risk detection technique. As a result, it provides an opportunity to examine the existence of dangers as well as their possible consequences. If it is not regulated, it is susceptible to being affected by stronger entities.As per Tharanga, 2020, when it comes to risk identification, the purpose of brainstorming is to come up with a comprehensive list of potential threats. To gather a complete list of risks, it is necessary to engage with the proper stakeholders for the profession.

4.2.2 Risk Register- It is a continual process and during the product or project life cycle it is updated at regular intervals. Mostly used in historical records for possible projects, and eventually becomes part of the total papers(GreyCampus). By providing information from documentation reviews, these risk registers assist the organization in recognizing risk. The risks that were discovered during the identification procedure are listed in the risk register. The risk register's details aid the organization in gaining a better knowledge of its hazards. The "risk register" is the principal result of a risk identification activity, and it is the document in which the hazards are listed. A risk register contains all the risks across the company or project in a systematic way. There is no set format for a risk register, and companies have a lot of leeway in how they maintain their documentation (web.actuaries.ie).

4.2.3 Delphi Technique-Tharanga, 2020 stated that this is the most widely used technique under risk identification. He future stated that the Delphi method is an iterative procedure. The goal is to get as many different ideas from the group of specialists as possible. Morano et al., 2006 considered the Delphi method as a strategy to obtain an opinion from anexpert team about future occurrences. It is supportedby a panel of expertswho have structured knowledge, experience, and creativity, with the assumption that a well-organized collective judgment is preferable to a personal view. Instead of an actual group gathering, this consensus-building method employs typed replies. It is a strategy that necessitates the systematic collection and critical comparison of decisions from anonymous participants physically isolated about a specific subject, using a set of carefully prepared questionnaires interspersed with overview information and feedback gathered from prior responses, using a set of pre-scripted questionnaires(CAR. Morano, 2006).

4.2.4 Flowchart – Hopkins, 2017 explained a flow chart as a review of the institution's processes and methods to identify key success elements. It is a graphical tool that depicts the steps in a process. This tool is used to gain an improved and better understanding of the hazards or the interrelationships between the parts(CAR. Morano, 2006). This is also known as a process flow diagram. Tharanga, 2020, stated that flowcharts aid in risk identification by allowing for a better understanding of the hazards and their interrelationships. A flowchart is a graphic representation of a series of stages in which a decision must be made to proceed to the next level. Every stage is depicted as a diagram shape, with lines or directed arrows connecting them all. Anyone can grasp the flowchart and the steps of the procedure from start to finish with this representation.

4.2.5 SWOT Analysis – it is a strategic planning tool to measure the strength, weaknesses, opportunities, and threats of the business. Shang et al, 2014 considered the SWOT a well-established tool for research and widely used in for effective planning. The internal and external factors are predicted by this tool.By examining opportunities in the external environment, the SWOT analysis has the benefit of taking into consideration the risk's upside. One of the advantages of conducting a SWOT analysis is that it can be used to make key decisions. However, because there is no standardized risk classification system in place, not all threats will probably be identified (Hopkin, 2017).

4.2.6 Cause-and-effect diagram – this is also known as Fishbone diagrams. According to Morano et al., 2006, the effect is listed on the right side of the diagram, while the causes are listed on the left. Each impact has a category, and the primary causes must be classified according to these categories.The most significant benefit of this technique is that it provides a clear visual representation of risk, which is defined as rather of maintaining a risk register table with a thousand words of text; an Ishikawa RBS can use pictures to quickly emphasize the critical risk regions (J.Rubin, 2010).

4.2.7 Questionnaires and Checklists- These strategies can be quick and simple, but they can't be comprehensive. Historical data and knowledge from previous similar endeavors, and also secondary sources, can be used to develop the checklist (E.Gajewska, 2011). Checklists are risk lists that are frequently built from personal experience. Structured questionnaires and checklists are employed in this technique to collect data that can aid in the identification of dangers (Hopkin, 2017, p. 123). According to Tharanga 2020, it is a strategy for carefully reviewing various processes using a pre-prepared list to visualize the accuracy and completeness. Analyzing the checklist will allow the company to identify the hazards in the predicted plan and project.

4.2.8 Inspections and audits - The process includes physical inspections of premises and operations, and also audits of compliance with prescribed systems and processes (Hopkin, 2017, p. 123).

4.2.9 Root cause identification- Fox 2018 stated that this analysis is carried out after an incident has occurred; therefore it is a reactive rather than proactive effort. The cause and effect diagrams aid in the discovery of all relevant facts as well as the identification of appropriate solutions. Morano et al., 2006 divided the risks into four phases: the gathering of data, causal factor, identification of root cause and execution.

4.2.10 Electronic Brainstorming - The goal of electronic brainstorming is to produce ideas through the internet using computers, so that participants may quickly access the ideas generated and develop new ones. This technique is an improved version of the traditional brainstorming technique. It allows for simultaneous communication betweenteam members, who can publish comments and add new ideas at the same time, resulting in a large number of thoughts. One more feature is record automation which permits the storing of all generated comments and thoughts(CAR. Morano, 2006). Electronic brainstorming is a more technologically advanced version of traditional brainstorming, with participants' anonymity assured.

4.2.11Expert judgment - Expert judgment is also one of the most useful instruments in risk assessment procedures. It is frequently cited as one of the most effective project management tools and strategies. Expert judgment is a time-saving strategy that indicates potential risks that may arise during the project's lifetime. It aids in the improvement of estimate quality and provides reliable projections(Satish, 2015). It is like a structured or unstructured interview with a group of specialists and expertteam members (CAR. Morano, 2006). According to Khalafallah 2002, this method uses specialists' previous experiences to detect potential risks. The problem with this method is that it tends to dismiss any risk that has previously been overlooked, relying solely on information.

4.3 Relationship between Risk Identification and Risk Management

Hopkins 2017, stated that the risk assessment component of the risk management process is made up of risk recognition and risk scoring. Risk assessment entails identifying and rating potential threats to an organization, project, or strategy. A report by 3ccs-Seo, 2019 revealed that in the long term, taking a proactive approach to risk identification, evaluation, and administration can save a significant amount of time, cost, labor, and other critical resources. According to Winch 2003, risk management is focused not only on anticipating and solving problems but also on being ready for uncertain future challenges. Dealing with potential threats isn't only a method to avoid losing money; it's also a way to turn challenges into opportunities that can lead to increased profits, ecological benefits, and other benefits. The prime aim of risk management is to compile a list of various losses and risks and this can be only possible with risk identification (RI). Renault et al., 2016 stated that to conduct RI, the RM plan, as well as the organizational environment, must be recognized. These provide the context in which the risks will be assessed. As part of the organization's risk culture, the RM strategy may also designate certain RI practices that are either preferred or prohibited. Firstly, companies should develop a toolkit that enables the company to manage the risks and in the second phase, companies can apply specific techniques to assess and classify the potential risks. Thus, risk identification implies not only identifying potential risks but also assisting in implementing appropriate techniques (S.Gates, 2012).

4.4 Risk Identification Techniques in TESCO PLC. as a Retailer
Figure 1. Risk management Model of TESCO
Source: Source: Author's Compilation adapted from (Woods, 2011)

5. Results and discussion

This section discusses the research's most important results. The findings are addressed using secondary data gathered from the relevant literature in this field. The retail business is exposed to several dangers. The retail business faces a variety of risks, including supplier uncertainties, changes in customer taste and preferences, data security and threats, inventory risks, and so on. The corporation faces a significant task in identifying these risks. Companies can use a variety of risk identification strategies to detect hazards. The risks are discovered using approaches such as brainstorming, expert judgement, Delphi method, root-cause analysis, and so on. The current study looked into the various risk identification methods and approaches employed by Tesco retail. To identify risks, Tesco plc uses brainstorming, a risk register, and a top-down and bottom-up strategy. The conclusions of this research may be applied to Tesco's retail business, which is situated in and operated predominantly in this area. Tesco's selections could include both typical and unusual strategies for spotting dangers.

6. FUTURE SCOPE

This is qualitative research; there is more scope for the researchers to conduct quantitative research to find out the implementation of risk identification techniques in the retail industry.

7. LIMITATION OF THE STUDY

This study was restricted by some factors, including:

• The most significant problem was locating relevant literature for this investigation.

• Collecting suitable data for the study was demanding and time-consuming.

• For the sake of analyzing the dissertation's aims, only secondary data is collected.

8. CONCULSION

Most of the studies in the literature focused on risk identification and management in the construction industry. This paper investigated the literature regarding the risk identification techniques for the retail industry and the types of risks faced by the retail industry. According to the objectives of this paper, the concept of risk, risk management and identification, and techniques of risk identification were elaborated according to the literature. Accordingly, this study concludes that risk identification is a very crucial stage of risk management and it should be considered the most crucial activity of risk management and an organization as a whole. So, it should be tackled systematically.

Tesco Plc's proof demonstrates how a single corporation has established its unique system and a comprehensive risk management strategy. Tesco uses a variety of risk-identification methodologies, including Group Register, Brainstorming, and top-down and bottom-up approaches.

9. ACKNOWLEDGEMENT

· We hereby declare that this research work titles Risk Identification Techniques in Retail Industry: A case study of Tesco Plc is original work of Mrs. Aradhana Sharma, Dr. Ruchika Jain and. Dr. Neena Seth Pajni. This paper has not been submitted earlier in anywhere for publication.

References
A.M.G.E.I.Khalafallah. (2002). Estimating cost contingencies of residential building project using belief networks. Master of Science Thesis . Egypt.: Cairo University Giza.
A.M.G.E.I.Khalafallah. (2002). Estimating cost contingencies of residential building project using belief networks. Master of Science Thesis, Cairo University Giza, Egypt.
B.Y.Renault, J. &. (2016). A THEORETICAL REVIEW OF RISK IDENTIFICATION: PERSPECTIVE OF CONSTRUCTION INDUSTRY. 5th Applied Research Conference in Africa, (pp. 773-782). Ghana.
CAR. Morano, C. &. (2006). Application of techniques for the identification of risk in the E & P ventures Engevista. 8 (2), 120-133.
Council), I. (. (2005). Risk Governance – Towards an Integrative Approach, White Paper no 1, Renn O. with an Annex by P. Graham, Geneva: .
D.Cleden. (2009). Managing project uncertainty. New York: John Wiley & Sons.
D.Copper, S. G. (2005). Project Risk Management Guidelines: Managing Risk in Large Projects and Complex Procurements. England: John Wiley & Sons, Ltd.
E.Gajewska, &. M. (2011). Risk management practices in construction project: a case study. Master of Science Thesis, Chalmers of Technology, Goteborg, Sweden.
G.Shang, &. L. (2014). The Last Planner System in China's construction industry — A SWOT analysis on implementation. International Journal of Project Management, 32, 1260-1272.
G.Winch. (2002). Managing construction projects, an information processing approach. Oxford: Blackwell Publishing.
G.Winch. (2003). Models of Manufacturing and the Construction Process: the genesis of re-engineering construction. Building Research and Information, 31 (2), 107-118.
Hopkin, P. (2017). Fundamentals of Risk Management (Fourth ed.). Great Britain and the United States: Kogan Page Limited.
J.Rubin. (2010). Visualizing risk management--a new approach. North America, Washington: Project Management Institute Global Congress.
J.T.Mentzer, I. M. (2008). Global Supply Chain Risk Management Strategies. International Journal of Physical & Logistic Management, 38 (3), 192-223.
kpmg.us. (2020). Retrieved from https://advisory.kpmg.us/blog/2020/top-risks-consumer-retail-2021.html
N.J.Smith, T. &. (2006). Managing Risk in Construction Projects (2nd ed.). Blackwell Publishing.
P.Hopkin. (2017). Fundamental of Risk Management. London: kogan Page Limited.
P.Hopkin. (2017). Fundamental of Risk Management. London: kogan Page Limited.
S.Campbell. (2005). Determining overall risk. Journal of Risk Research, 8, 569-581.
S.Chopra, M. (2004). Managing risk to avoid supply chain breakdown. MIT Sloan Manag , 53-62.
S.Gates, J. &. (2012). Enterprise risk management: a process for enhanced management and improved performance. Management Accounting Quarterly, 13 (3), 28-38.
Satish. (2015). Retrieved from APNA Course: https://www.apnacourse.com/blogs/expert-judgement-project-tool/
T.Aven, O. R. (2009). On risk defined as an event where the outcome is uncertain. Journal of Risk Research, 12, 1-12.
THARANGA, D. (2020). CRITICAL REVIEW OF RISK IDENTIFICATION TECHNIQUES.
V.G. Venkatesh, S. S. (2015). AnalysisonsupplychainrisksinIndian apparel retai lchains and proposal of risk prioritization model using Interpretive structural modeling. Journal ofRetailingandConsumerServices , 153-167.
W.W.Lawrence. (1976). Of Acceptable Risk. Los Altos: William Kaufman Inc.
Zhanglei, H. X. (2013). Study on Risk and Prevention of Retail Enterprise-Oriented Supply Chain. International Conference on Education Technology and Management Science (ICETMS 2013) (pp. 1320-1322). Atlantis Press.
Websites
G.Brent, &. C. (1993). MIT Sloan Management Review. Retrieved from https://sloanreview.mit.edu/article/brainstorming-electronically/
GreyCampus. (n.d.). Retrieved from greycampus.com: https://www.greycampus.com/opencampus/certified-associate-in-project-management/risk-identification-tools-and-techniques-in-capm
Koon, R. (2018, Sep 28). Audits as a tool of risk assessment. Retrieved from https://www.naturalproductsinsider.com/contract-manufacturing/audits-tool-risk-assessment
P.Bower. (2009). Risk Management Options. Retrieved from http://www.projectsmart.co.uk/risk-management-options.html
P.Veyrat. (2016, June 1).What is the definition of risk management? Retrieved from www.heflo.com: https://www.heflo.com/blog/risk-management/what-is-the-definition-of-risk-management/
Pitman, D. (2019, Feb 12). Cyber Security Risk in Retail and How to Handle It. Retrieved from https://www.forbes.com/sites/danpitman1/2019/02/12/cyber-security-risk-in-retail-and-how-to-handle-it/?sh=28cc1d3749a0
web.actuaries.ie. (n.d.). risk identification. Retrieved from https://web.actuaries.ie/sites/default/files/erm-resources/risk_identification.pdf
Why Risk Identification Is Important in Business Process Management. (2019, Oct 21). Retrieved from https://3ccontactservices.com/risk-identification-important-business-process-management/
Woods, M. (2011). Risk Management in Tesco plc. Retrieved from https://irmforum.files.wordpress.com/2011/04/margaret-woods.pdf
www.acctuaries.com. (2021). Risk Identification Techniques/Sources . Retrieved from https://web.actuaries.ie/sites/default/files/erm-resources/fact_sheet_1_-_risk_identification.pdf
www.insureon.com. (2021). Retail risk management: The top 6 threats. Retrieved from https://www.insureon.com/blog/retail-risk-management-the-top-threats
www.web.acturies.ie. (n.d.). Risk Identification. Retrieved from https://web.actuaries.ie/sites/default/files/erm-resources/risk_identification.pdf
T.Fox. (2018). Retrieved from NAVEX GLOBAL: https://www.navexglobal.com/blog/article/differentiating-root-cause-analysis-risk-assessment-internal-investigation/
Tatham, M. (2018). Russian Hackers Aren’t the Only Ones to Worry About: Online Shopping Fraud Report. https://www.experian.com/blogs/ask-experian/the-state-of-online-shopping-fraud/.
Tesco plc Annual Report and Accounts 2019. (n.d.). Retrieved from https://www.tescoplc.com/investors/reports-results-and-presentations/annual-report-2020/
tescoplc.com. (n.d.). Retrieved from https://www.tescoplc.com/about/
tescoplc.com. (n.d.). Principal risks and uncertainties. Retrieved from https://www.tescoplc.com/media/264191/tescoar16_principalrisksanduncertainties.pdf

Cite this:
APA Style
IEEE Style
BibTex Style
MLA Style
Chicago Style
GB-T-7714-2015
Sharmaa, A., Jain, R., & Pajni, N. S. (2022). Risk Identification Techniques in Retail Industry: A case study of Tesco Plc. J. Corp. Gov. Insur. Risk Manag., 9(S1), 201-214. https://doi.org/10.51410/jcgirm.9.1.13
A. Sharmaa, R. Jain, and N. S. Pajni, "Risk Identification Techniques in Retail Industry: A case study of Tesco Plc," J. Corp. Gov. Insur. Risk Manag., vol. 9, no. S1, pp. 201-214, 2022. https://doi.org/10.51410/jcgirm.9.1.13
@research-article{Sharmaa2022RiskIT,
title={Risk Identification Techniques in Retail Industry: A case study of Tesco Plc},
author={Aradhana Sharmaa and Ruchika Jain and Neena Seth Pajni},
journal={Journal of Corporate Governance, Insurance, and Risk Management},
year={2022},
page={201-214},
doi={https://doi.org/10.51410/jcgirm.9.1.13}
}
Aradhana Sharmaa, et al. "Risk Identification Techniques in Retail Industry: A case study of Tesco Plc." Journal of Corporate Governance, Insurance, and Risk Management, v 9, pp 201-214. doi: https://doi.org/10.51410/jcgirm.9.1.13
Aradhana Sharmaa, Ruchika Jain and Neena Seth Pajni. "Risk Identification Techniques in Retail Industry: A case study of Tesco Plc." Journal of Corporate Governance, Insurance, and Risk Management, 9, (2022): 201-214. doi: https://doi.org/10.51410/jcgirm.9.1.13
Sharmaa A., Jain R., Pajni N. S.. Risk Identification Techniques in Retail Industry: A case study of Tesco Plc[J]. Journal of Corporate Governance, Insurance, and Risk Management, 2022, 9(S1): 201-214. https://doi.org/10.51410/jcgirm.9.1.13
cc
©2022 by the author(s). Published by Acadlore Publishing Services Limited, Hong Kong. This article is available for free download and can be reused and cited, provided that the original published version is credited, under the CC BY 4.0 license.