SlideShare a Scribd company logo
1 of 15
Risk Identification
Risk Identification
• Introduction
Projects function in an environment that is filled with uncertainty.
Concerning project funding, the availability of necessary resources,
shifting client expectations, potential technical issues, etc., there is
uncertainty. Project risks are based on this unpredictability, which
necessitates the use of risk management.
Risk Management Stages
a)Risk Identification for EMC Web Design Project.
• Incorrect Deadlines Set by a Client
• Generic Specification
• The Client Is Not Available to the Dev Team
• The Client Requires Too Much Communication
• Working in Offshore Teams Within the Same Time Zone
• Working in Separate Time Zones
• Compromising on Design
• Lack of Developers
• Unstable Workload
• No Testing
• No Post-Go-Live Support
• Not Choosing the Right Technology
• Integration of Popular Technologies
• Integration of New, Unproven Technologies
• Working on Existing Source Code
1.Incorrect Deadlines Set by a Client
It frequently happens that a business analyst from the client's side has
established deadlines that are far harsher than the technical team from
the vendor's side anticipated. As a result, the vendor's team must put
in extra time or hire more personnel not included in the original
contract.
2. Generic Specification
There is a potential that a few features will be excluded from the project's scope if the project's specification is
too ambiguous or too limited. Because of this, additional project requirements will be introduced as the
project is being developed, deadlines will be missed, and overtime hours will accumulate, all of which will
undermine team morale.
3. The Client Is Not Available to the Dev Team
The client must ensure that the requirements are correctly understood by
the development team as a project develops and that his expectations are
met. If there is insufficient communication between the two parties, there
may be delays in both providing the outcome and notifying about obstacles.
4. The Client Requires Too Much Communication
Active communication can also backfire if it occurs too frequently. It could result in pointless conversations, lengthy
technical explanations to non-technical persons, and going nowhere.
5. Working in Offshore Teams Within the Same Time Zone
This business risk has a small effect. Both teams may have different ideas
about how the product should be used if their technical leaders are strong.
• 6. Working in Separate Time Zones
Here is where there is a significant increase in risk. Teams are expected
to work together during the brief period when their working hours
coincide. For instance, 9 AM in New York corresponds to 5 PM in
Belarus, therefore there is a two to four hour time difference between
the teams. Overtime typically results from this.
7. Compromising on Design
Frequently, teams rush into performing "real" development activities
instead of taking the necessary steps in the design phase. However, the
entire process is a waste of dev hours without sufficient planning,
prototyping, and information architecture construction.
• 8. Lack of Developers
When resources are scarce, developers occasionally have to work on
numerous projects simultaneously. Bug-fixing tasks may divert
developers if a previous project's maintenance term is also still in
progress.
9. Unstable Workload
It is challenging to switch between the context of the two projects if
our workload is less than four hours per day per employee. When
crucial problems arise on two projects at once, the risk increases.
• 10. No Testing
Some clients want to avoid paying for QA by having developers test the
project on their own.
11. No Post-Go-Live Support
Once the project is online, the vendor's team frequently stops offering support or concentrates on the most
important problems, leaving smaller problems out of scope.
12. Not Choosing the Right Technology
During the project's discovery phase, selecting the technology stack and implementation team is perhaps the
most important choice you'll make. Each team possesses core expertise or experience in particular industries,
technologies, or products. One of the most common risks associated with custom software is relying too
heavily on a certain popular technology.
• 13. Integration of Popular Technologies
Integrations with third-party systems, plugins, or content management systems pose the majority of
vulnerabilities. If your staff is familiar with and comfortable using these tools and technology, the risk is
minimal. Popular libraries frequently have a strong community behind them, making it simple to find fixes for
emerging problems.
14. Integration of New, Unproven Technologies
A new technology may significantly raise the risk. You shouldn't expect the team to handle software integration
risks as rapidly as they do known ones.
15. Working on Existing Source Code
It's quite perilous to take over a project that's already been started using the existing source code. To boost
efficiency, the team must examine the source code, evaluate its quality, and pinpoint the components that
need to be refactored. In order to comprehend the project's overall flow, the team should also grasp it from
the perspective of its users.
Risk Assessment
• Introduction-
When conducting a qualitative risk analysis, the
probability/consequence matrix approach is a well-known method of
evaluating risk severity and can evaluate risks at all levels of the firm.
The probability/consequence matrix is a useful tool for assessing
hazards according to their seriousness by estimating their probable
consequences. This enables you to identify the key contributing causes
to each potential risk in addition to helping businesses better assess
the overall severity of a risk.
Risk Response
• Risk Response
• The risk response planning involves determiningways to Eliminateor reduced any threats to the project, and also the opportunities to increase their impact. Project Team should work to eliminate the threats before they occur. Similarly, the project managers should work to ensure that opportunities occur. Likewise, the project manager is also responsible to decrease the probabilityand
impact of threats and increase the probabilityand impact of opportunities.
• For the threats that cannot be mitigated, the project manager needs to have a robust contingency plan and also a response plan if contingencies do not work.
• It is not required to eliminateall the risks of the project due to resource and time constraints. A project manager should review risk throughout the project. Planning for risks is iterative. Qualitativerisk, quantitative risk, and risk response planning do not end ones you begin work on the project.
• Risk Response Strategies
• Avoid – eliminate the threat to protect the project from the impact of the risk. An example of this is cancelling the project.
• Transfer – shifts the impact of the threat to as third party, together with ownership of the response. An example of this is insurance.
• Mitigate – act to reduce the probability of occurrence or the impact of the risk. An example of this is choosing a different supplier.
• Accept – acknowledge the risk, but do not take any action unless the risk occurs. An example of this is documenting the risk and putting aside funds in case the risk occurs.
• There are also four possible risk responses strategies for positive risks, or opportunities:
1. Exploit – eliminate the uncertainty associated with the risk to ensure it occurs. An example of this is assigning the best workers to a project to reduce time to complete.
2. Enhance – increases the probability or the positive impacts of an opportunity. An example of this adding more resources to finish early.
3. Share – allocating some or all of the ownership of the opportunity to a third party. An example of this is teams.
4. Acceptance – being willing to take advantage of the opportunity if it arises but not actively pursuing it. An example of this is documenting the opportunity and calculating benefit if the opportunity occurs.
Risk Register

More Related Content

Similar to Presentation-RA-R1-30-10-2022.pptx

Software risk analysis and management
Software risk analysis and managementSoftware risk analysis and management
Software risk analysis and managementONE BCG
 
PM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.pptPM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.pptjonathaspereira
 
PM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.pptPM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.pptScribdfamily
 
PM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.pptPM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.pptAdrian Yap
 
Risk response planning.pptx
Risk response planning.pptxRisk response planning.pptx
Risk response planning.pptxSaranSaravanan22
 
Risk: the Elephant in the Room
Risk: the Elephant in the RoomRisk: the Elephant in the Room
Risk: the Elephant in the RoomLast Call Media
 
Risk MAnagement PResentations .pptx
Risk MAnagement PResentations .pptxRisk MAnagement PResentations .pptx
Risk MAnagement PResentations .pptxMukeshV22
 
Top Project Management Best Practices.pdf
Top Project Management Best Practices.pdfTop Project Management Best Practices.pdf
Top Project Management Best Practices.pdfOrangescrum
 
9 Common Challenges in the Software Development Process
9 Common Challenges in the Software Development Process9 Common Challenges in the Software Development Process
9 Common Challenges in the Software Development ProcessSattrix Software Solutions
 
Project Management online sample (1) (1).pptx
Project Management online sample (1) (1).pptxProject Management online sample (1) (1).pptx
Project Management online sample (1) (1).pptxStanleyChabata1
 
Possible errors in projects and methods of avoiding and eliminating
Possible errors in projects and methods of avoiding and eliminatingPossible errors in projects and methods of avoiding and eliminating
Possible errors in projects and methods of avoiding and eliminatingSefaKOCAKALAY
 
Project management (A Basic Approach)
Project management (A Basic Approach)Project management (A Basic Approach)
Project management (A Basic Approach)Jed Concepcion
 
How to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdfHow to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdfVrinsoft Technology
 
Project management
Project managementProject management
Project managementsatya pal
 
Top Ten Reasons For Project Failure - PMP Webinar
Top Ten Reasons For Project Failure - PMP WebinarTop Ten Reasons For Project Failure - PMP Webinar
Top Ten Reasons For Project Failure - PMP WebinarWhizlabs
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementNajmul Hussain
 

Similar to Presentation-RA-R1-30-10-2022.pptx (20)

Software risk analysis and management
Software risk analysis and managementSoftware risk analysis and management
Software risk analysis and management
 
PM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.pptPM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.ppt
 
PM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.pptPM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.ppt
 
PM-Risks-and-Constraints (1).ppt
PM-Risks-and-Constraints (1).pptPM-Risks-and-Constraints (1).ppt
PM-Risks-and-Constraints (1).ppt
 
PM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.pptPM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.ppt
 
Risk response planning.pptx
Risk response planning.pptxRisk response planning.pptx
Risk response planning.pptx
 
Risk: the Elephant in the Room
Risk: the Elephant in the RoomRisk: the Elephant in the Room
Risk: the Elephant in the Room
 
Risk MAnagement PResentations .pptx
Risk MAnagement PResentations .pptxRisk MAnagement PResentations .pptx
Risk MAnagement PResentations .pptx
 
Top Project Management Best Practices.pdf
Top Project Management Best Practices.pdfTop Project Management Best Practices.pdf
Top Project Management Best Practices.pdf
 
9 Common Challenges in the Software Development Process
9 Common Challenges in the Software Development Process9 Common Challenges in the Software Development Process
9 Common Challenges in the Software Development Process
 
Project Management online sample (1) (1).pptx
Project Management online sample (1) (1).pptxProject Management online sample (1) (1).pptx
Project Management online sample (1) (1).pptx
 
Lab01.pptx
Lab01.pptxLab01.pptx
Lab01.pptx
 
Possible errors in projects and methods of avoiding and eliminating
Possible errors in projects and methods of avoiding and eliminatingPossible errors in projects and methods of avoiding and eliminating
Possible errors in projects and methods of avoiding and eliminating
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Project management (A Basic Approach)
Project management (A Basic Approach)Project management (A Basic Approach)
Project management (A Basic Approach)
 
How to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdfHow to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdf
 
Project management
Project managementProject management
Project management
 
The art of execution
The art of executionThe art of execution
The art of execution
 
Top Ten Reasons For Project Failure - PMP Webinar
Top Ten Reasons For Project Failure - PMP WebinarTop Ten Reasons For Project Failure - PMP Webinar
Top Ten Reasons For Project Failure - PMP Webinar
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project Management
 

Recently uploaded

A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherPerry Belcher
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...lizamodels9
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...Khaled Al Awadi
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFOrient Homes
 

Recently uploaded (20)

A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
 

Presentation-RA-R1-30-10-2022.pptx

  • 2. Risk Identification • Introduction Projects function in an environment that is filled with uncertainty. Concerning project funding, the availability of necessary resources, shifting client expectations, potential technical issues, etc., there is uncertainty. Project risks are based on this unpredictability, which necessitates the use of risk management.
  • 3. Risk Management Stages a)Risk Identification for EMC Web Design Project. • Incorrect Deadlines Set by a Client • Generic Specification • The Client Is Not Available to the Dev Team • The Client Requires Too Much Communication • Working in Offshore Teams Within the Same Time Zone • Working in Separate Time Zones • Compromising on Design • Lack of Developers • Unstable Workload • No Testing • No Post-Go-Live Support • Not Choosing the Right Technology • Integration of Popular Technologies • Integration of New, Unproven Technologies • Working on Existing Source Code
  • 4. 1.Incorrect Deadlines Set by a Client It frequently happens that a business analyst from the client's side has established deadlines that are far harsher than the technical team from the vendor's side anticipated. As a result, the vendor's team must put in extra time or hire more personnel not included in the original contract. 2. Generic Specification There is a potential that a few features will be excluded from the project's scope if the project's specification is too ambiguous or too limited. Because of this, additional project requirements will be introduced as the project is being developed, deadlines will be missed, and overtime hours will accumulate, all of which will undermine team morale.
  • 5. 3. The Client Is Not Available to the Dev Team The client must ensure that the requirements are correctly understood by the development team as a project develops and that his expectations are met. If there is insufficient communication between the two parties, there may be delays in both providing the outcome and notifying about obstacles. 4. The Client Requires Too Much Communication Active communication can also backfire if it occurs too frequently. It could result in pointless conversations, lengthy technical explanations to non-technical persons, and going nowhere. 5. Working in Offshore Teams Within the Same Time Zone This business risk has a small effect. Both teams may have different ideas about how the product should be used if their technical leaders are strong.
  • 6. • 6. Working in Separate Time Zones Here is where there is a significant increase in risk. Teams are expected to work together during the brief period when their working hours coincide. For instance, 9 AM in New York corresponds to 5 PM in Belarus, therefore there is a two to four hour time difference between the teams. Overtime typically results from this. 7. Compromising on Design Frequently, teams rush into performing "real" development activities instead of taking the necessary steps in the design phase. However, the entire process is a waste of dev hours without sufficient planning, prototyping, and information architecture construction.
  • 7. • 8. Lack of Developers When resources are scarce, developers occasionally have to work on numerous projects simultaneously. Bug-fixing tasks may divert developers if a previous project's maintenance term is also still in progress. 9. Unstable Workload It is challenging to switch between the context of the two projects if our workload is less than four hours per day per employee. When crucial problems arise on two projects at once, the risk increases.
  • 8. • 10. No Testing Some clients want to avoid paying for QA by having developers test the project on their own. 11. No Post-Go-Live Support Once the project is online, the vendor's team frequently stops offering support or concentrates on the most important problems, leaving smaller problems out of scope. 12. Not Choosing the Right Technology During the project's discovery phase, selecting the technology stack and implementation team is perhaps the most important choice you'll make. Each team possesses core expertise or experience in particular industries, technologies, or products. One of the most common risks associated with custom software is relying too heavily on a certain popular technology.
  • 9. • 13. Integration of Popular Technologies Integrations with third-party systems, plugins, or content management systems pose the majority of vulnerabilities. If your staff is familiar with and comfortable using these tools and technology, the risk is minimal. Popular libraries frequently have a strong community behind them, making it simple to find fixes for emerging problems. 14. Integration of New, Unproven Technologies A new technology may significantly raise the risk. You shouldn't expect the team to handle software integration risks as rapidly as they do known ones. 15. Working on Existing Source Code It's quite perilous to take over a project that's already been started using the existing source code. To boost efficiency, the team must examine the source code, evaluate its quality, and pinpoint the components that need to be refactored. In order to comprehend the project's overall flow, the team should also grasp it from the perspective of its users.
  • 10. Risk Assessment • Introduction- When conducting a qualitative risk analysis, the probability/consequence matrix approach is a well-known method of evaluating risk severity and can evaluate risks at all levels of the firm. The probability/consequence matrix is a useful tool for assessing hazards according to their seriousness by estimating their probable consequences. This enables you to identify the key contributing causes to each potential risk in addition to helping businesses better assess the overall severity of a risk.
  • 11.
  • 12. Risk Response • Risk Response • The risk response planning involves determiningways to Eliminateor reduced any threats to the project, and also the opportunities to increase their impact. Project Team should work to eliminate the threats before they occur. Similarly, the project managers should work to ensure that opportunities occur. Likewise, the project manager is also responsible to decrease the probabilityand impact of threats and increase the probabilityand impact of opportunities. • For the threats that cannot be mitigated, the project manager needs to have a robust contingency plan and also a response plan if contingencies do not work. • It is not required to eliminateall the risks of the project due to resource and time constraints. A project manager should review risk throughout the project. Planning for risks is iterative. Qualitativerisk, quantitative risk, and risk response planning do not end ones you begin work on the project. • Risk Response Strategies • Avoid – eliminate the threat to protect the project from the impact of the risk. An example of this is cancelling the project. • Transfer – shifts the impact of the threat to as third party, together with ownership of the response. An example of this is insurance. • Mitigate – act to reduce the probability of occurrence or the impact of the risk. An example of this is choosing a different supplier. • Accept – acknowledge the risk, but do not take any action unless the risk occurs. An example of this is documenting the risk and putting aside funds in case the risk occurs. • There are also four possible risk responses strategies for positive risks, or opportunities: 1. Exploit – eliminate the uncertainty associated with the risk to ensure it occurs. An example of this is assigning the best workers to a project to reduce time to complete. 2. Enhance – increases the probability or the positive impacts of an opportunity. An example of this adding more resources to finish early. 3. Share – allocating some or all of the ownership of the opportunity to a third party. An example of this is teams. 4. Acceptance – being willing to take advantage of the opportunity if it arises but not actively pursuing it. An example of this is documenting the opportunity and calculating benefit if the opportunity occurs.
  • 13.
  • 14.