{"id":53879,"date":"2026-04-03T11:45:21","date_gmt":"2026-04-03T11:45:21","guid":{"rendered":"https:\/\/certifeka-edu.com\/programs\/finance-for-strategic-managers-accounting-module-2\/lessons\/lesson-2-4-alternative-strategies-3-2\/"},"modified":"2026-04-03T11:45:21","modified_gmt":"2026-04-03T11:45:21","slug":"lesson-2-4-alternative-strategies-3-2","status":"publish","type":"lesson","link":"https:\/\/certifeka-edu.com\/ar\/programs\/executive-financial-analysis-module-ucam-university\/lessons\/lesson-2-4-alternative-strategies-3-2\/","title":{"rendered":"Lesson 2: 4 alternative strategies"},"content":{"rendered":"<p><img decoding=\"async\" width=\"96\" height=\"114\" src=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1.png\" alt=\"\" srcset=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1.png 96w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1-10x12.png 10w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1-42x50.png 42w\" sizes=\"(max-width: 96px) 100vw, 96px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<h2>Lesson 2 :Understanding Business Risk<br \/>\n<\/h2>\n<h3>4 alternative strategies<br \/>\n<\/h3>\n<h5>4 alternative strategies may be considered for dealing with threats, as follows:<\/h5>\n<details id=\"e-n-accordion-item-1970\" open>\n<summary data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1970\" >\n\t\t\t\t\t  Avoid<br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Avoid.png\" alt=\"\" srcset=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Avoid.png 128w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Avoid-12x12.png 12w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Avoid-50x50.png 50w\" sizes=\"(max-width: 128px) 100vw, 128px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<h5>Risk avoidance is when the project the team acts to eliminate the threat or protect the business from its impact.<\/h5>\n<h5>It may be appropriate for high-priority threats with a high probability of occurrence and a large negative impact<br \/>Managers should think of alternatives in order to not have to face the risk.<\/h5>\n<h5>Avoidance may involve changing some aspects of the management plan or changing the objective that is in danger in order to eliminate the threat entirely, reducing its probability of occurrence to zero.<\/h5>\n<h5>The risk owner may also take action to isolate the company from the risk&#8217;s impact if it were to occur.<br \/>Examples of avoidance actions may include removing the cause of a threat, extending the schedule, changing the business strategy, or reducing scope. Some risks can be avoided by clarifying requirements, obtaining information, improving communication, or acquiring expertise<\/h5>\n<\/details>\n<details id=\"e-n-accordion-item-1971\" >\n<summary data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1971\" >\n\t\t\t\t\t Transfer<br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Transfare.png\" alt=\"\" srcset=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Transfare.png 128w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Transfare-12x12.png 12w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Transfare-50x50.png 50w\" sizes=\"(max-width: 128px) 100vw, 128px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<h5>Transfer involves shifting ownership of a threat to a third party to manage the risk and to bear the impact of the threat occurs.<\/h5>\n<h5>Risk transfer often involves payment of a risk premium to the party taking on the threat.<br \/>Transfer can be achieved by a range of actions, which include but are not limited to the use of insurance, performance bonds, warranties, guarantees, etc.<br \/>Agreements may be used to transfer ownership and liability for specified risks to another party.<br \/>Example:<\/h5>\n<h5>At the start of the Great Depression of the 1920s, Americans rushed the banks to withdraw their life savings because they knew their financial institutions were about to collapse.<\/h5>\n<h5>Since the banks didn&#8217;t have any kind of risk transference in place, only a handful of their customers could withdraw their money before the banks ran out of capital.<br \/>Today, all respected U.S. banks are members of the Federal Deposit Insurance Corporation (FDIC), which insures each account up to $250,000.<\/h5>\n<h5>This transfer of risk allows customers to trust banks. In turn, that trust allows banks to earn people&#8217;s business and prosper.<br \/>The banks pay to be members of the FDIC.<\/h5>\n<h5>By doing so they transfer the risk of losing their clients&#8217; money to the FDIC, which is strong enough financially to avoid a repeat of 1929.<\/h5>\n<h5>If they didn&#8217;t do that, nobody would trust banks and their entire business model would fail.<\/h5>\n<\/details>\n<details id=\"e-n-accordion-item-1972\" >\n<summary data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1972\" >\n\t\t\t\t\t Mitigate<br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Mitigate.png\" alt=\"\" srcset=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Mitigate.png 128w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Mitigate-12x12.png 12w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Mitigate-50x50.png 50w\" sizes=\"(max-width: 128px) 100vw, 128px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<h5>In risk mitigation, action is taken to reduce the probability of occurrence and\/or impact of a threat.<\/h5>\n<h5>Early mitigation action is often more effective than trying to repair the damage after the threat has occurred.<br \/>Adopting less complex processes, conducting more tests, or choosing a more stable seller are examples of mitigation actions.<br \/>Mitigation may involve prototype development.<\/h5>\n<h5>Where it is not possible to reduce probability, a mitigation response might reduce the impact by targeting factors that drive the severity.<br \/>To mitigate the risk of not getting government sign-off in time for the proposed roll-out date, the company might engage the services of a consulting firm that specializes in insurance compliance in the state of California (in addition to having their lawyers scrutinize the plan, of course).<br \/>For example, designing redundancy into a the system may reduce the impact of a failure of the original component.<br \/>Example:<\/h5>\n<h5>An insurance company is planning to release a new auto insurance plan in the state of California.<\/h5>\n<h5>California has strict rules surrounding compliance, and if the plan doesn&#8217;t get approved by the state&#8217;s Insurance Commissioner, it might not launch on the roll-out date.<br \/>That could end up costing the company a a great deal of money in all sorts of ways.<\/h5>\n<h5>For example, advertisements may be cued up and ready to run on the launch date, and pulling those ads could be costly.<br \/>To mitigate the risk of not getting government sign-off in time for the proposed roll-out date, the company might engage the services of a consulting firm that specializes in insurance compliance in the state of California (in addition to having their lawyers scrutinize the plan, of course).<\/h5>\n<h5>The company might also negotiate flexible terms with advertisers, allowing them to postpone publication dates if necessary.<\/h5>\n<h5>Both are ways to potentially mitigate risk.<\/h5>\n<\/details>\n<details id=\"e-n-accordion-item-1973\" >\n<summary data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1973\" >\n\t\t\t\t\t Accept<br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t<svg aria-hidden=\"true\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Accept.png\" alt=\"\" srcset=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Accept.png 128w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Accept-12x12.png 12w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Accept-50x50.png 50w\" sizes=\"(max-width: 128px) 100vw, 128px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<h5>Risk acceptance acknowledges the existence of a threat, but no proactive action is taken.<\/h5>\n<h5>This strategy may be appropriate for low-priority threats, and it may also be adopted where it is not possible or costeffective to address a threat in any other way.<br \/>Acceptance can be either active or passive.<\/h5>\n<h5>The most common active acceptance strategy is to establish a contingency reserve, including amounts of time, money, or resources to handle the threat if it occurs.<\/h5>\n<h5>Passive acceptance involves no proactive action apart from a periodic review of the threat to ensure that it does not change significantly.<br \/>Example<\/h5>\n<h5>Airlines frequently overbook flights with the understanding that a certain number of people will cancel their flights.<\/h5>\n<h5>With thousands of flights per month, some of those flights will inevitably end up with too many passengers on the books&#8212;at which point the airlines begin offering incentives (such as flight credits) to lure people off the plane.<br \/>If that doesn&#8217;t work, the airlines are forced to kick some people off the flight. They know this will create unhappy customers, but they&#8217;ve accepted that risk.<\/h5>\n<h5>Since they&#8217;ve embraced the risk, nobody is shocked when Karen from Milwaukie tweets about the the awful experience she had on her return flight from Honolulu.<br \/>Why accept these consequences? They&#8217;ve done the math, and they know that in order to compete in a price-sensitive market, they need to pack their flights as full as possible.<\/h5>\n<h5>If they don&#8217;t fill as many seats as possible, their profits drop, and they can&#8217;t offer those low fares we all love.<\/h5>\n<h5>In short, they can&#8217;t compete without overbooking, so they&#8217;re willing to accept the occasional angry tweet in exchange for packed flights.<\/h5>\n<\/details>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Avoid.png\" alt=\"\" srcset=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Avoid.png 128w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Avoid-12x12.png 12w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Avoid-50x50.png 50w\" sizes=\"(max-width: 128px) 100vw, 128px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<h5>Risk avoidance is when the project the team acts to eliminate the threat or protect the business from its impact.<\/h5>\n<h5>It may be appropriate for high-priority threats with a high probability of occurrence and a large negative impact<br \/>Managers should think of alternatives in order to not have to face the risk.<\/h5>\n<h5>Avoidance may involve changing some aspects of the management plan or changing the objective that is in danger in order to eliminate the threat entirely, reducing its probability of occurrence to zero.<\/h5>\n<h5>The risk owner may also take action to isolate the company from the risk&#8217;s impact if it were to occur.<br \/>Examples of avoidance actions may include removing the cause of a threat, extending the schedule, changing the business strategy, or reducing scope. Some risks can be avoided by clarifying requirements, obtaining information, improving communication, or acquiring expertise<\/h5>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Transfare.png\" alt=\"\" srcset=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Transfare.png 128w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Transfare-12x12.png 12w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Transfare-50x50.png 50w\" sizes=\"(max-width: 128px) 100vw, 128px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<h5>Transfer involves shifting ownership of a threat to a third party to manage the risk and to bear the impact of the threat occurs.<\/h5>\n<h5>Risk transfer often involves payment of a risk premium to the party taking on the threat.<br \/>Transfer can be achieved by a range of actions, which include but are not limited to the use of insurance, performance bonds, warranties, guarantees, etc.<br \/>Agreements may be used to transfer ownership and liability for specified risks to another party.<br \/>Example:<\/h5>\n<h5>At the start of the Great Depression of the 1920s, Americans rushed the banks to withdraw their life savings because they knew their financial institutions were about to collapse.<\/h5>\n<h5>Since the banks didn&#8217;t have any kind of risk transference in place, only a handful of their customers could withdraw their money before the banks ran out of capital.<br \/>Today, all respected U.S. banks are members of the Federal Deposit Insurance Corporation (FDIC), which insures each account up to $250,000.<\/h5>\n<h5>This transfer of risk allows customers to trust banks. In turn, that trust allows banks to earn people&#8217;s business and prosper.<br \/>The banks pay to be members of the FDIC.<\/h5>\n<h5>By doing so they transfer the risk of losing their clients&#8217; money to the FDIC, which is strong enough financially to avoid a repeat of 1929.<\/h5>\n<h5>If they didn&#8217;t do that, nobody would trust banks and their entire business model would fail.<\/h5>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Mitigate.png\" alt=\"\" srcset=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Mitigate.png 128w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Mitigate-12x12.png 12w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Mitigate-50x50.png 50w\" sizes=\"(max-width: 128px) 100vw, 128px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<h5>In risk mitigation, action is taken to reduce the probability of occurrence and\/or impact of a threat.<\/h5>\n<h5>Early mitigation action is often more effective than trying to repair the damage after the threat has occurred.<br \/>Adopting less complex processes, conducting more tests, or choosing a more stable seller are examples of mitigation actions.<br \/>Mitigation may involve prototype development.<\/h5>\n<h5>Where it is not possible to reduce probability, a mitigation response might reduce the impact by targeting factors that drive the severity.<br \/>To mitigate the risk of not getting government sign-off in time for the proposed roll-out date, the company might engage the services of a consulting firm that specializes in insurance compliance in the state of California (in addition to having their lawyers scrutinize the plan, of course).<br \/>For example, designing redundancy into a the system may reduce the impact of a failure of the original component.<br \/>Example:<\/h5>\n<h5>An insurance company is planning to release a new auto insurance plan in the state of California.<\/h5>\n<h5>California has strict rules surrounding compliance, and if the plan doesn&#8217;t get approved by the state&#8217;s Insurance Commissioner, it might not launch on the roll-out date.<br \/>That could end up costing the company a a great deal of money in all sorts of ways.<\/h5>\n<h5>For example, advertisements may be cued up and ready to run on the launch date, and pulling those ads could be costly.<br \/>To mitigate the risk of not getting government sign-off in time for the proposed roll-out date, the company might engage the services of a consulting firm that specializes in insurance compliance in the state of California (in addition to having their lawyers scrutinize the plan, of course).<\/h5>\n<h5>The company might also negotiate flexible terms with advertisers, allowing them to postpone publication dates if necessary.<\/h5>\n<h5>Both are ways to potentially mitigate risk.<\/h5>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Accept.png\" alt=\"\" srcset=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Accept.png 128w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Accept-12x12.png 12w, https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/08\/Accept-50x50.png 50w\" sizes=\"(max-width: 128px) 100vw, 128px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<h5>Risk acceptance acknowledges the existence of a threat, but no proactive action is taken.<\/h5>\n<h5>This strategy may be appropriate for low-priority threats, and it may also be adopted where it is not possible or costeffective to address a threat in any other way.<br \/>Acceptance can be either active or passive.<\/h5>\n<h5>The most common active acceptance strategy is to establish a contingency reserve, including amounts of time, money, or resources to handle the threat if it occurs.<\/h5>\n<h5>Passive acceptance involves no proactive action apart from a periodic review of the threat to ensure that it does not change significantly.<br \/>Example<\/h5>\n<h5>Airlines frequently overbook flights with the understanding that a certain number of people will cancel their flights.<\/h5>\n<h5>With thousands of flights per month, some of those flights will inevitably end up with too many passengers on the books&#8212;at which point the airlines begin offering incentives (such as flight credits) to lure people off the plane.<br \/>If that doesn&#8217;t work, the airlines are forced to kick some people off the flight. They know this will create unhappy customers, but they&#8217;ve accepted that risk.<\/h5>\n<h5>Since they&#8217;ve embraced the risk, nobody is shocked when Karen from Milwaukie tweets about the the awful experience she had on her return flight from Honolulu.<br \/>Why accept these consequences? They&#8217;ve done the math, and they know that in order to compete in a price-sensitive market, they need to pack their flights as full as possible.<\/h5>\n<h5>If they don&#8217;t fill as many seats as possible, their profits drop, and they can&#8217;t offer those low fares we all love.<\/h5>\n<h5>In short, they can&#8217;t compete without overbooking, so they&#8217;re willing to accept the occasional angry tweet in exchange for packed flights.<\/h5>","protected":false},"comment_status":"open","ping_status":"closed","template":"","class_list":["post-53879","lesson","type-lesson","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lesson 2: 4 alternative strategies - Certifeka-edu<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/certifeka-edu.com\/ar\/programs\/executive-financial-analysis-module-ucam-university\/lessons\/lesson-2-4-alternative-strategies-3-2\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lesson 2: 4 alternative strategies - Certifeka-edu\" \/>\n<meta property=\"og:description\" content=\"Lesson 2 :Understanding Business Risk 4 alternative strategies 4 alternative strategies may be considered for dealing with threats, as follows: Avoid Risk avoidance is when the project the team acts to eliminate the threat or protect the business from its impact. It may be appropriate for high-priority threats with a high probability of occurrence and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/certifeka-edu.com\/ar\/programs\/executive-financial-analysis-module-ucam-university\/lessons\/lesson-2-4-alternative-strategies-3-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Certifeka-edu\" \/>\n<meta property=\"og:image\" content=\"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 \u062f\u0642\u064a\u0642\u0629\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"WebPage\",\"webpage\"],\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/executive-financial-analysis-module-ucam-university\\\/lessons\\\/lesson-2-4-alternative-strategies-3-2\\\/\",\"url\":\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/executive-financial-analysis-module-ucam-university\\\/lessons\\\/lesson-2-4-alternative-strategies-3-2\\\/\",\"name\":\"Lesson 2: 4 alternative strategies - Certifeka-edu\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/executive-financial-analysis-module-ucam-university\\\/lessons\\\/lesson-2-4-alternative-strategies-3-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/executive-financial-analysis-module-ucam-university\\\/lessons\\\/lesson-2-4-alternative-strategies-3-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/certifeka-edu.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/logos-png-01-296x57-1.png\",\"datePublished\":\"2026-04-03T11:45:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/executive-financial-analysis-module-ucam-university\\\/lessons\\\/lesson-2-4-alternative-strategies-3-2\\\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/executive-financial-analysis-module-ucam-university\\\/lessons\\\/lesson-2-4-alternative-strategies-3-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/executive-financial-analysis-module-ucam-university\\\/lessons\\\/lesson-2-4-alternative-strategies-3-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/certifeka-edu.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/logos-png-01-296x57-1.png\",\"contentUrl\":\"https:\\\/\\\/certifeka-edu.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/logos-png-01-296x57-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/programs\\\/executive-financial-analysis-module-ucam-university\\\/lessons\\\/lesson-2-4-alternative-strategies-3-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"home\",\"item\":\"https:\\\/\\\/certifeka-edu.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lessons\",\"item\":\"https:\\\/\\\/certifeka-edu.com\\\/lesson\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Lesson 2: 4 alternative strategies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/#website\",\"url\":\"https:\\\/\\\/certifeka-edu.com\\\/\",\"name\":\"certifeka\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/certifeka-edu.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/#organization\",\"name\":\"certifeka\",\"url\":\"https:\\\/\\\/certifeka-edu.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/certifeka-edu.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cropped-certifeka-removebg-preview.png\",\"contentUrl\":\"https:\\\/\\\/certifeka-edu.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cropped-certifeka-removebg-preview.png\",\"width\":366,\"height\":104,\"caption\":\"certifeka\"},\"image\":{\"@id\":\"https:\\\/\\\/certifeka-edu.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lesson 2: 4 alternative strategies - Certifeka-edu","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/certifeka-edu.com\/ar\/programs\/executive-financial-analysis-module-ucam-university\/lessons\/lesson-2-4-alternative-strategies-3-2\/","og_locale":"ar_AR","og_type":"article","og_title":"Lesson 2: 4 alternative strategies - Certifeka-edu","og_description":"Lesson 2 :Understanding Business Risk 4 alternative strategies 4 alternative strategies may be considered for dealing with threats, as follows: Avoid Risk avoidance is when the project the team acts to eliminate the threat or protect the business from its impact. It may be appropriate for high-priority threats with a high probability of occurrence and [&hellip;]","og_url":"https:\/\/certifeka-edu.com\/ar\/programs\/executive-financial-analysis-module-ucam-university\/lessons\/lesson-2-4-alternative-strategies-3-2\/","og_site_name":"Certifeka-edu","og_image":[{"url":"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"11 \u062f\u0642\u064a\u0642\u0629"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["WebPage","webpage"],"@id":"https:\/\/certifeka-edu.com\/programs\/executive-financial-analysis-module-ucam-university\/lessons\/lesson-2-4-alternative-strategies-3-2\/","url":"https:\/\/certifeka-edu.com\/programs\/executive-financial-analysis-module-ucam-university\/lessons\/lesson-2-4-alternative-strategies-3-2\/","name":"Lesson 2: 4 alternative strategies - Certifeka-edu","isPartOf":{"@id":"https:\/\/certifeka-edu.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/certifeka-edu.com\/programs\/executive-financial-analysis-module-ucam-university\/lessons\/lesson-2-4-alternative-strategies-3-2\/#primaryimage"},"image":{"@id":"https:\/\/certifeka-edu.com\/programs\/executive-financial-analysis-module-ucam-university\/lessons\/lesson-2-4-alternative-strategies-3-2\/#primaryimage"},"thumbnailUrl":"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1.png","datePublished":"2026-04-03T11:45:21+00:00","breadcrumb":{"@id":"https:\/\/certifeka-edu.com\/programs\/executive-financial-analysis-module-ucam-university\/lessons\/lesson-2-4-alternative-strategies-3-2\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/certifeka-edu.com\/programs\/executive-financial-analysis-module-ucam-university\/lessons\/lesson-2-4-alternative-strategies-3-2\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/certifeka-edu.com\/programs\/executive-financial-analysis-module-ucam-university\/lessons\/lesson-2-4-alternative-strategies-3-2\/#primaryimage","url":"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1.png","contentUrl":"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/04\/logos-png-01-296x57-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/certifeka-edu.com\/programs\/executive-financial-analysis-module-ucam-university\/lessons\/lesson-2-4-alternative-strategies-3-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"home","item":"https:\/\/certifeka-edu.com\/"},{"@type":"ListItem","position":2,"name":"Lessons","item":"https:\/\/certifeka-edu.com\/lesson\/"},{"@type":"ListItem","position":3,"name":"Lesson 2: 4 alternative strategies"}]},{"@type":"WebSite","@id":"https:\/\/certifeka-edu.com\/#website","url":"https:\/\/certifeka-edu.com\/","name":"certifeka","description":"","publisher":{"@id":"https:\/\/certifeka-edu.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/certifeka-edu.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/certifeka-edu.com\/#organization","name":"certifeka","url":"https:\/\/certifeka-edu.com\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/certifeka-edu.com\/#\/schema\/logo\/image\/","url":"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/03\/cropped-certifeka-removebg-preview.png","contentUrl":"https:\/\/certifeka-edu.com\/wp-content\/uploads\/2025\/03\/cropped-certifeka-removebg-preview.png","width":366,"height":104,"caption":"certifeka"},"image":{"@id":"https:\/\/certifeka-edu.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/certifeka-edu.com\/ar\/wp-json\/wp\/v2\/lesson\/53879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certifeka-edu.com\/ar\/wp-json\/wp\/v2\/lesson"}],"about":[{"href":"https:\/\/certifeka-edu.com\/ar\/wp-json\/wp\/v2\/types\/lesson"}],"replies":[{"embeddable":true,"href":"https:\/\/certifeka-edu.com\/ar\/wp-json\/wp\/v2\/comments?post=53879"}],"version-history":[{"count":0,"href":"https:\/\/certifeka-edu.com\/ar\/wp-json\/wp\/v2\/lesson\/53879\/revisions"}],"wp:attachment":[{"href":"https:\/\/certifeka-edu.com\/ar\/wp-json\/wp\/v2\/media?parent=53879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}