Evaluation of Risk Culture Implementation in the Digital Investment Company PT XYZ
Abstract
This study aims to evaluate the risk culture at digital investment company PT XYZ using the The Institute of Risk Management (IRM) 2012 framework. The research employs a case study design with a qualitative approach. Data were collected through semi-structured interviews and surveys. At the individual level, analysis was conducted using the Risk Type Compass and Moral DNA instruments. The Risk Type Compass results indicate that employees at PT XYZ tend to exhibit a relatively balanced tolerance across most risk types. PT XYZ shows a combination of adventurous–deliberate traits (bold yet calm and stable) as well as prudent–intense tendencies (careful and conscientious). Based on the Moral DNA analysis, employees at PT XYZ demonstrate a predominant inclination toward reason ethics in their decision-making processes. At the organizational level, analysis through interviews and the Double S Model shows that PT XYZ’s culture falls into the communal category, indicating high levels of social cohesion and solidarity within the organization. Furthermore, evaluation using the eight aspects of the IRM Risk Culture Aspects Model reveals several areas that require improvement, specifically in the following aspects Risk Leadership, Responding to Bad News, Risk Governance, and Risk Resources. Meanwhile, the aspects that are already considered to be relatively strong include Risk Transparency, Risk Competence, Risk Decisions, and Rewarding Appropriate Risk Taking.
Downloads
References
Afan Faizin. (2020). Narrative research: A research design. Jurnal Disastri (Jurnal Pendidikan Bahasa dan Sastra Indonesia), 2(3), 142–148. https://doi.org/10.33752/disastri.v2i3.1139
Alsaawi, A. (2014). A critical review of qualitative interviews. European Journal of Business and Social Sciences, 3(1), 149–156. https://doi.org/10.2139/ssrn.2819536
Anderson, D. R., Sweeney, D. J., Williams, T. A., Camm, J. D., & Cochran, J. J. (2024). Statistics for business and economics.
Andjarwirawan, J., Santoso, L. W., & Gunadi, K. (2024). Cybersecurity threats through phishing attacks targeting internal staff: Mitigation and prevention. IJAREEIE, 13(12), 1–7. https://doi.org/10.15662/IJAREEIE.2024.1312001
Bryman, A. (2004). Qualitative research on leadership: A critical but appreciative review. The Leadership Quarterly, 15(6), 729–769. https://doi.org/10.1016/j.leaqua.2004.09.007
DiCicco-Bloom, B., & Crabtree, B. F. (2006). The qualitative research interview. Medical Education, 40(4), 314–321. https://doi.org/10.1111/j.1365-2929.2006.02418.x
Fisher, M. J., & Marshall, A. P. (2009). Understanding descriptive statistics. Australian Critical Care, 22(2), 93–97. https://doi.org/10.1016/j.aucc.2008.11.003
Goffee, R., & Jones, G. (1996). What holds the modern company together. Harvard Business Review.
Higbee, A. (2018). The role of crypto-currency in cybercrime. Computer Fraud & Security, 2018(7), 13–15. https://doi.org/10.1016/S1361-3723(18)30064-2
IRM. (2012). Risk culture: Resources for practitioners.
Krause, D. S. (2025). The $1.4 billion Bybit hack. International Journal of Cryptocurrency Research, 5(1), 52–62. https://doi.org/10.51483/ijccr.5.1.2025.52-62
McLeod, S. (2024). Narrative analysis in qualitative research.
Populix. (2024). 8 cara menghindari bias penelitian.
Saunders, B., Kitzinger, J., & Kitzinger, C. (2015). Anonymising interview data. Qualitative Research, 15(5), 616–632. https://doi.org/10.1177/1468794114550439
Sheedy, E., & Griffin, B. (2017). Risk governance and culture. Corporate Governance, 26(1), 4–22. https://doi.org/10.1111/corg.12200
Trickey, G. (2016). Risk type compass.
Vidiarto, A., et al. (2023). Pengaruh budaya peduli risiko. Bullet: Jurnal Multidisiplin Ilmu, 2(4), 982–991.
Xia, P., et al. (2020). Characterizing cryptocurrency exchange scams. Computers & Security, 98. https://doi.org/10.1016/j.cose.2020.101993
Zein, A. (2023). Analisa penyerangan cyber security social engineering. Jurnal Informatika Universitas Pamulang, 8(4), 642–648. https://doi.org/10.32493/informatika.v8i4.35931
Copyright (c) 2026 Fanny Wiryana, Tubagus Muhammad Yusuf Khudri

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.















