SlideShare a Scribd company logo
1 of 27
Project Risk Management
Introduction
Risk management is one of the most important aspects that
any project developer requires to understand fully. Development
of projects without the establishment of effective risk
management programs is a possible means to the failure of that
project. In order to avoid such outcomes, project developers
make the effort of establishing a solid and highly effective risk
management program to help in making sure that the project
does not in any instance fail to succeed. Risk management
programs are mainly established with reference to the project
and its nature. In order to ensure that most of the risks the
project face are mitigated, project developers evaluate the
stages of project development and then assess possible risks that
may present in those situations. In this paper, a project will be
explained, which will be used to create a risk management plan
(Gregory, 2007).
Project Description
Software development is currently one of the most
significant activity that many companies are considering
venturing into, mostly because people have attained a
significant interest in having most of their activities and daily
operations automated. Software products help people manage to
carry out a wide variety of tasks and activities in an effectively
appropriate way. Intridea is one of the largest software
development companies, which venture in providing people and
other clients with software products that they feel they need.
The organization has a large network of develop engineers, who
provide the service of developing the software products that
clients of the organization order. The process of developing any
software is considered a project by the organization, since it
requires following all the strict policy stages that the
organization has established in order to complete. The
organization aims to complete every software development
process successfully and thus the need to ensure that all
important steps to address risks is essential.
Intridea develops a large number of software products for
many clients. One of the most recent projects that the
organization is currently involving in is the development of a
trading software to implement a trading strategy from a client.
The trading strategy that the client requires implemented is the
use of three indicators to determine trend, and then using
hedging to avoid loss in any trade that might be against the
traded trend. Such a project is considered to be significantly
important, since the client has a high stake to loose in case it is
developed with flaws. Trading software products are developed
in a similar manner to all other software products. A major
difference is the fact that these software products are directly
used to trade real money in a trading platforms and thus the
need to ensure that they are developed to operate in a flawless
manner is extremely important. A large number of risks can also
occur at any stage of development and thus there is a need to
ensure that a risk mitigation program is implemented (Young,
2006).
Project Objectives
The main objective of this project is to ensure that the
trading software is developed completely and that it meets all
the expectations of the client who ordered it. Ensuring that the
process of development is successful and that all the intended
operations and capabilities of the software are implemented in
its development would help in ensuring that the product is
developed successfully. The other major development objective
for this project is ensuring that the process of development does
not exceed the intended budget. The budget constraint is a
significantly important aspect for any project. In the case of this
project, for example, there is the agreed upon amount that the
client was charged for the software product. From this amount,
the project development process should be covered and the
profit that the organization gains from this project. Since the
agreed upon amount between the organization and the client is
fixed, when the budget exceeds the earlier intended upon
amount, the profits that the organization gains from the project
decrease. To avoid this decrease, therefore, it is a major
objective for the project to complete within the initially
intended budget constraint (Lewis, 2007).
Another important objective of the project is to ensure that
it is developed within the provided time limit, by the client. A
trading software is a money managing and developing tool.
With this regard, the client that spends a large amount of money
for its development is likely to be eager to have the fully
completed product within the shortest time period possible.
Exceeding the provided and agreed upon time deadline could
thus be the reason for such a customer to consider the services
of another organization next time. In order to guarantee
customer satisfaction, therefore, it is essentially important to
ensure that this objective is met.
External Dependencies
External dependencies are the specific external factors or
input that the project requires in order to be successful. For this
project, significant trading knowledge is essential, in order to
ensure that the product works exactly in the same way that the
client requires. One of the main external dependency in this
case is thus the client, who would require to answer any form of
trading technicalities that may be required in the development
process. This is because in some occasions, a software
developer may require guidance on the aspects of operation
regarding hos the software is required to address certain issues.
The development team can also seek information and guidance
from another third party individual who is highly skilled in
treading activity. These two individuals would thus be the
external dependencies of the project (Jackson, 2006).
Stakeholder Analysis
For this project, stakeholders include the organization in
general, the project developers and the client who ordered the
development of the software product. The organization is a
major stakeholder in this project. The developers of the product
are employees to the organization. The successful completion of
the project is however considered an achievement to the
developer’s team of the organization and thus it is in their best
interest to ensure that the project completes as a success. This
group of stakeholders also play a major role in ensuring that the
project completely meets its objectives and that the client who
ordered for it is fully satisfied with their work in developing it.
The client is the main stakeholder of this project. He or she
plays a major role in determining whether the project was
successfully completed or it is considered a fail. A successful
project is the kind of a project that the client considers
successful and effective in carrying out all its intended
functions and purpose.
Project Tasks
All projects have a number of project tasks that requires to
be completed by the project developers in order to ensure that it
completes successfully. Project tasks make the project easy to
complete for a group of people and it also makes team work
possible for the developers. For this task, the main tasks which
requires to be completed by the project stakeholders include;
evaluating the scope of the project and capabilities of the
software intended for development, selecting a team that is
capable to effectively develop the intended project, drafting a
sufficient budget, delegation of the development task and the
development of the project. All the other tasks fall under these
major categories. Completion of all the project tasks in a
successful way is thus the completion of the project
successfully (Barkley, 2004).
Risk Management Plan Scope and Identification
The project’s potential risks
The project is in software development and most of the time
software development undertakings come with various
challenges. The challenges might overlap or might stand out as
single issues. It is proper that potential risks are identified early
so that mitigation can be initiated. The potential risk areas for
software development include integration challenges, software
failure, and security challenges. In the following paragraphs, I
have indicated several risk areas that might affect the trading
software development, the rollout process and the client
interaction with the software.
The organization risks developing trading software that will
become obsolete in a short time span. This is because of the fast
growth of technology. Advancement of technology is
accompanied by upgrades and advanced techniques of
developing advanced software. The organization also risks
developing inferior software compared to market levels. This
again is because of advancement of technology. Normally in
software development, there are several steps and phases that
are merged in order to develop proper working software and at
times a phase or step is missed. It might go unnoticed but has
the potential to have ripple effects in the future. The
organization is at risk of missing a step in development and as a
result is also at risk of the software failing.
Due to the direct involvement of money to the software the
organization is at risk from hacking. Since there is no
restriction on the trading market the organization is at risk of
similar software from its competitors. The project is under a
constraint budget and the budget constraint might require
developers to do away or skip processes that might risk the
quality of software. Other than budget constraints the trading
software is also under a time constraint. The time constraints
might also risk the project quality; the project is at risk of not
meeting the client’s expectations.
Failure to meet client’s time expectations exposes the
organization; the client might consider other organizations for
the development and future developments. There is external
overdependence and this brings to light the risk of leaked trade
skills and strategy; risk of trade secrets. Every organization is
at risk of employee turnover. Turnovers have the potential to
affect the project development.
Due to the high stakes involved, the organization's development
team is at risk of gold plating in order to win the affection and
business of the client. The gold plating is likely to cause a
budget exceed. All software developments have many
procedures and more often than not the risk of flaunting the
procedures or failing to follow the procedure is quite high.
There is also the probability of unavoidable risks such as
government restrictions on software more so those involved in
cash transactions. There is also the risk that the project might
not live up to its expectations as far as productivity is
concerned.
There are also positive risks that the organization is likely to
face. Due to the high stakes involved, precision and
effectiveness are encouraged and this exposes the organization
to the risks of high-profit gains, production of superior software
which might lead to the growth of customer base. Positive risks
that the organization is also likely to face include expertise
growth due to external overreliance, the risk learning from their
failures and they also risk growing the organization.
Techniques used in risk identification
In order to identify the risks I employed the use of several
techniques and they included; SWOT analysis, decision trees,
assumption analysis and reviewing of related project’s
documentation. The SWOT analysis helped in the identification
of both internal and external risks as far as the rollout of the
software and client uptake was concerned (Seth, 2015). The
decision tree helped in identifying future risks since it is
effective for analyzing many options or alternatives. The
assumption analysis was also useful in determining possible
future risks. The reviewing of already developed related
project’s documentation was particularly helpful as it provided
insight on possible risks factoring all areas i.e. internal risk
factors, external risk factors, future potential risks, development
risks, clients’ reaction and uptake risks.
Stakeholders of the risk identification process
For any risk identification, various people or groups must be
involved depending on the project type and these people or
groups can be referred to as risk stakeholders. Risk stakeholders
can include people who might be affected or perceive to be
affected should a risk come to be. The people involved in the
identification of the risks included; the employees of the
organization, the developers of the software and the client (In
Bérard & In Teyssier, 2017).
The developers were crucial in identifying potential risks
considering that they have developed prior software and hence
could come up with a list of general risks that affect software.
The client also played a role in the identification of risks since
they gave information on potential challenges that may affect
their activities such as fraud and hacks since they needed
software that handled money transactions. Employees of the
organization helped in brainstorming more so in the assumption
analysis (Virine & Trumper, 2017). This ensured that almost all
potential risks were identified.
Qualitative and quantitative risk analysis table
Risk id
Risk description
Risk type/ranking
probability
1
Developers exiting from the organization
threat
0.2
2
Risk of developing an obsolete software
weakness
0.1
3
Risk of developing an inferior software
weakness
0.3
4
Risk of missing a step in development
weakness
0.4
6
Risk of similar software from competitors
threat
0.7
7
Risk of Failure to meet all expectations of client
weakness
0.2
8
Risk of surpassing the budget
weakness
0.7
9
Risk of surpassing the time limit
weakness
0.7
10
Risk of exposure of trade secrets
threat
0.1
11
Risk of gold plating
weakness
0.4
12
Risk of not adhering to procedures
weakness
0.15
13
Risk of producing superior software
opportunity
0.3
14
Risk of organization growing due to large customer growth
opportunity
0.25
15
Risk of fraud and hacking from hackers
threat
0.6
16
Risk of surpassing client’s demands
opportunity
0.3
17
Risk of losing clients to competitors
threat
0.4
18
Risk of interference of the development process by client
threat
0.8
19
Risk of Compromise on quality of final product
weakness
0.1
20
Risk of growing the organization’s profit gain
Opportunity
0.25
Risk Response Planning
Risks can come as either a weakness, threat or an opportunity to
the organization. Therefore a company needs to perform a
thorough access to risks that are prone to affect it. According to
Kendrick, (2015), the management should ensure that all the
risks are addressed appropriately depending on their ranking
and probability. There are various responses to different risks
depending on their type. In various cases organizations need to
develop a mitigation plan in cases where risks are anticipated.
For the risk response plan and the risks mentioned, below are
the responses that the organization should consider adopting.
First, the risk of developer exiting from the organization can be
mitigated in order to minimize the chances of it occurring in the
company. The company should develop a mitigation plan to
handle given a scenario. For example, the developer should
train one of the staff members who are experts in the field such
that in case of a developer leaving they should fit into their
position with ease.
Secondly, the risks of developing obsolete or inferior software
can be handled by avoiding. The risk can be avoided by the
company hiring competent IT experts. Competent IT expert will
stay up to date as well as constantly updating the software
which will, in turn, avoid the risk of developing obsolete
software. The company should respond to the risk of missing a
step in the development by reducing the risk. During the
planning, the company develops a clear plan with the help of
competent IT experts that will take into consideration every step
of the development.
The risk of similar software from competitors can be mitigated
by innovation by the company software engineers. The
engineers should always improve and develop competent
innovations that will help in mitigating the risk of competition
from other developers. The risk to meet all the expectations of
the client can be reduced. The risk might be inevitable however
an explicit analysis of the customers’ needs and expectations
should be conducted. In this case, the developer will make
software that should meet the customers’ needs and
requirements.
The risk of surpassing the budget as well as the time limit can
be reduced. This can be reduced by coming up with a well-
planned budget as well as sticking to the plan in order to
minimize miscellaneous spending. The budget will ensure that
the funds are used only for the required purpose and therefore
minimize mismanagement. The risk of exposure of state secrets
can be addressed through avoidance. The risk can be avoided by
entrusting only a few personnel with the secrets. Additionally,
the secrets could be kept in a secure place and protected by
codes or encryption. In this case, only the authorized
individuals will be able to access the information.
The company can address the risk of gold plating by reducing
the chances of it occurring. This can by accessing the
customers’ needs and requirement. This will help in that when
enhancing the software or services it will be the enhancement
that will be accepted by the clients hence minimizing the risk of
gold plating. Risk of not adhering to procedures can be reduced
by hiring and training staff members on the importance of
company procedures. In this case, the members who do not
adhere to the procedure will be held accountable for the errors
that may occur.
The organization growing due to customers’ growth and the risk
of surpassing the clients’ demands should be exploited. This can
be done by the company ensuring that all the services provided
meet or exceed the customers’ expectations and needs. The
company should take advantage of the situation and increase
their production and service delivery. This can also be done by
regularly improving their service delivery and products in order
to maintain the clients as well as attracting some more. This
will boost the company’s profit margins and enable it to
efficiently achieve its set goals.
The risk of developing superior software should be enhanced.
The enhancement will increase the chances of the company
developing another software hence customer satisfaction which
will in turn help in the growth of the company. This will be
beneficial in the company’s strategy in that it will bolster its
development and thus the achievement of its visions, goals, and
objectives (Kim, 2010). The risk of fraud and hacking from
hackers can be mitigated by putting in place firmware that
would help in preventing hacking and fraud. Additionally, It
experts from the company should supervise and monitor cyber
security on regular basis.
Supervision and monitoring will help in a case where suspicion
is detected the IT experts will respond accordingly. The risk of
losing clients to competitors can be a huge threat to the
company. Therefore the company should mitigate the risk by
improving its services as well as improving their customer
service. Risk of interference of the development process by the
client can be avoided by providing only the products or services
that meet the needs of the clients and being open t clients only
after the development is completed.
Risk of Compromise on quality of the final product can be
reduced. The project should be developed sticking to the plan,
budget and ensuring that it is delivered on time. When a project
is completed with the right procedures and measures, there is a
minimal chance of the final product getting compromised. Risk
of growing the organization’s profit gain should be shared. In
this case, as noted by Kang, & Kim (2016), the company should
consider sharing the opportunity with partners and suppliers in
order to minimize the resources and increase the profit margins
which in turn help boost the company’s growth.
Risk breakdown structure
In order to adequately understand and curb as well as
minimize the risks from occurring, there is a need for a risk
breakdown structure. A risk breakdown structure will help in
providing an insight as well as the intensity of the risk.
Technical
· Scope Definition
· Requirements Definition
· Technical processes
· design
Management Risk
· Project Management
· Organization
· Communication
· Health and Safety
Commercial Risk
· Contractual
· Procurement
· Subcontractors
· Client
External Risk
· Legislation
· Competitors
· Political
References
Kang, H. W., & Kim, Y. S. (2016). Analysis of the probabilistic
cost variation ranges according to the effect of core quantitative
risk factors for an overseas plant project: Focused on a Middle
East gas plant project. KSCE Journal of Civil Engineering,
20(2), 509-518.
Kendrick, T. (2015). Identifying and managing project risk:
essential tools for failure-proofing your project. AMACOM Div
American Mgmt Assn.
Kim, Y. S. (2010). A study on the costs variation range through
the risk factors for overseas plant projects. Journal of The
Architectural Institute of Korea, 26(7), 139-147.
In Bérard, C., & In Teyssier, C. (2017). Risk management:
Lever for SME development and stakeholder value creation.
Población, G. F. J. (2017). Financial Risk Management:
Identification, Measurement and Management.
Seth, C. (2015). Swot analysis. Namur: 50minutes.
Virine, L., & Trumper, M. (2017). Project risk analysis made
ridiculously simple.
Barkley, B. (2004). Project risk management. New York:
McGraw-Hill.
Jackson, P. (2006). Nonprofit risk management and contingency
planning : done in a day strategies. Hoboken, N.J: Wiley.
Lewis, J. (2007). Fundamentals of project management. New
York: American Management Association.
Gregory, G. (2007). Project management. Oxford: Pergamon
Flexible Learning.
Young, T. (2006). Successful project management. London
Philadelphia: Kogan Page Ltd
Project Risk Management
Introduction
Risk management is one of the most important aspects that
any project developer requires to understand fully. Development
of projects without the establishment of effective risk
management programs is a possible means to the failure of that
project. In order to avoid such outcomes, project developers
make the effort of establishing a solid and highly effective risk
management program to help in making sure that the project
does not in any instance fail to succeed. Risk management
programs are mainly established with reference to the project
and its nature. In order to ensure that most of the risks the
project face are mitigated, project developers evaluate the
stages of project development and then assess possible risks that
may present in those situations. In this paper, a project will be
explained, which will be used to create a risk management plan
(Gregory, 2007).
Project Description
Software development is currently one of the most
significant activity that many companies are considering
venturing into, mostly because people have attained a
significant interest in having most of their activities and daily
operations automated. Software products help people manage to
carry out a wide variety of tasks and activities in an effectively
appropriate way. Intridea is one of the largest software
development companies, which venture in providing people and
other clients with software products that they feel they need.
The organization has a large network of develop engineers, who
provide the service of developing the software products that
clients of the organization order. The process of developing any
software is considered a project by the organization, since it
requires following all the strict policy stages that the
organization has established in order to complete. The
organization aims to complete every software development
process successfully and thus the need to ensure that all
important steps to address risks is essential.
Intridea develops a large number of software products for
many clients. One of the most recent projects that the
organization is currently involving in is the development of a
trading software to implement a trading strategy from a client.
The trading strategy that the client requires implemented is the
use of three indicators to determine trend, and then using
hedging to avoid loss in any trade that might be against the
traded trend. Such a project is considered to be significantly
important, since the client has a high stake to loose in case it is
developed with flaws. Trading software products are developed
in a similar manner to all other software products. A major
difference is the fact that these software products are directly
used to trade real money in a trading platforms and thus the
need to ensure that they are developed to operate in a flawless
manner is extremely important. A large number of risks can also
occur at any stage of development and thus there is a need to
ensure that a risk mitigation program is implemented (Young,
2006).
Project Objectives
The main objective of this project is to ensure that the
trading software is developed completely and that it meets all
the expectations of the client who ordered it. Ensuring that the
process of development is successful and that all the intended
operations and capabilities of the software are implemented in
its development would help in ensuring that the product is
developed successfully. The other major development objective
for this project is ensuring that the process of development does
not exceed the intended budget. The budget constraint is a
significantly important aspect for any project. In the case of this
project, for example, there is the agreed upon amount that the
client was charged for the software product. From this amount,
the project development process should be covered and the
profit that the organization gains from this project. Since the
agreed upon amount between the organization and the client is
fixed, when the budget exceeds the earlier intended upon
amount, the profits that the organization gains from the project
decrease. To avoid this decrease, therefore, it is a major
objective for the project to complete within the initially
intended budget constraint (Lewis, 2007).
Another important objective of the project is to ensure that
it is developed within the provided time limit, by the client. A
trading software is a money managing and developing tool.
With this regard, the client that spends a large amount of money
for its development is likely to be eager to have the fully
completed product within the shortest time period possible.
Exceeding the provided and agreed upon time deadline could
thus be the reason for such a customer to consider the services
of another organization next time. In order to guarantee
customer satisfaction, therefore, it is essentially important to
ensure that this objective is met.
External Dependencies
External dependencies are the specific external factors or
input that the project requires in order to be successful. For this
project, significant trading knowledge is essential, in order to
ensure that the product works exactly in the same way that the
client requires. One of the main external dependency in this
case is thus the client, who would require to answer any form of
trading technicalities that may be required in the development
process. This is because in some occasions, a software
developer may require guidance on the aspects of operation
regarding hos the software is required to address certain issues.
The development team can also seek information and guidance
from another third party individual who is highly skilled in
treading activity. These two individuals would thus be the
external dependencies of the project (Jackson, 2006).
Stakeholder Analysis
For this project, stakeholders include the organization in
general, the project developers and the client who ordered the
development of the software product. The organization is a
major stakeholder in this project. The developers of the product
are employees to the organization. The successful completion of
the project is however considered an achievement to the
developer’s team of the organization and thus it is in their best
interest to ensure that the project completes as a success. This
group of stakeholders also play a major role in ensuring that the
project completely meets its objectives and that the client who
ordered for it is fully satisfied with their work in developing it.
The client is the main stakeholder of this project. He or she
plays a major role in determining whether the project was
successfully completed or it is considered a fail. A successful
project is the kind of a project that the client considers
successful and effective in carrying out all its intended
functions and purpose.
Project Tasks
All projects have a number of project tasks that requires to
be completed by the project developers in order to ensure that it
completes successfully. Project tasks make the project easy to
complete for a group of people and it also makes team work
possible for the developers. For this task, the main tasks which
requires to be completed by the project stakeholders include;
evaluating the scope of the project and capabilities of the
software intended for development, selecting a team that is
capable to effectively develop the intended project, drafting a
sufficient budget, delegation of the development task and the
development of the project. All the other tasks fall under these
major categories. Completion of all the project tasks in a
successful way is thus the completion of the project
successfully (Barkley, 2004).
Risk Management Plan Scope and Identification
The project’s potential risks
The project is in software development and most of the time
software development undertakings come with various
challenges. The challenges might overlap or might stand out as
single issues. It is proper that potential risks are identified early
so that mitigation can be initiated. The potential risk areas for
software development include integration challenges, software
failure, and security challenges. In the following paragraphs, I
have indicated several risk areas that might affect the trading
software development, the rollout process and the client
interaction with the software.
The organization risks developing trading software that will
become obsolete in a short time span. This is because of the fast
growth of technology. Advancement of technology is
accompanied by upgrades and advanced techniques of
developing advanced software. The organization also risks
developing inferior software compared to market levels. This
again is because of advancement of technology. Normally in
software development, there are several steps and phases that
are merged in order to develop proper working software and at
times a phase or step is missed. It might go unnoticed but has
the potential to have ripple effects in the future. The
organization is at risk of missing a step in development and as a
result is also at risk of the software failing.
Due to the direct involvement of money to the software the
organization is at risk from hacking. Since there is no
restriction on the trading market the organization is at risk of
similar software from its competitors. The project is under a
constraint budget and the budget constraint might require
developers to do away or skip processes that might risk the
quality of software. Other than budget constraints the trading
software is also under a time constraint. The time constraints
might also risk the project quality; the project is at risk of not
meeting the client’s expectations.
Failure to meet client’s time expectations exposes the
organization; the client might consider other organizations for
the development and future developments. There is external
overdependence and this brings to light the risk of leaked trade
skills and strategy; risk of trade secrets. Every organization is
at risk of employee turnover. Turnovers have the potential to
affect the project development.
Due to the high stakes involved, the organization's development
team is at risk of gold plating in order to win the affection and
business of the client. The gold plating is likely to cause a
budget exceed. All software developments have many
procedures and more often than not the risk of flaunting the
procedures or failing to follow the procedure is quite high.
There is also the probability of unavoidable risks such as
government restrictions on software more so those involved in
cash transactions. There is also the risk that the project might
not live up to its expectations as far as productivity is
concerned.
There are also positive risks that the organization is likely to
face. Due to the high stakes involved, precision and
effectiveness are encouraged and this exposes the organization
to the risks of high-profit gains, production of superior software
which might lead to the growth of customer base. Positive risks
that the organization is also likely to face include expertise
growth due to external overreliance, the risk learning from their
failures and they also risk growing the organization.
Techniques used in risk identification
In order to identify the risks I employed the use of several
techniques and they included; SWOT analysis, decision trees,
assumption analysis and reviewing of related project’s
documentation. The SWOT analysis helped in the identification
of both internal and external risks as far as the rollout of the
software and client uptake was concerned (Seth, 2015). The
decision tree helped in identifying future risks since it is
effective for analyzing many options or alternatives. The
assumption analysis was also useful in determining possible
future risks. The reviewing of already developed related
project’s documentation was particularly helpful as it provided
insight on possible risks factoring all areas i.e. internal risk
factors, external risk factors, future potential risks, development
risks, clients’ reaction and uptake risks.
Stakeholders of the risk identification process
For any risk identification, various people or groups must be
involved depending on the project type and these people or
groups can be referred to as risk stakeholders. Risk stakeholders
can include people who might be affected or perceive to be
affected should a risk come to be. The people involved in the
identification of the risks included; the employees of the
organization, the developers of the software and the client (In
Bérard & In Teyssier, 2017).
The developers were crucial in identifying potential risks
considering that they have developed prior software and hence
could come up with a list of general risks that affect software.
The client also played a role in the identification of risks since
they gave information on potential challenges that may affect
their activities such as fraud and hacks since they needed
software that handled money transactions. Employees of the
organization helped in brainstorming more so in the assumption
analysis (Virine & Trumper, 2017). This ensured that almost all
potential risks were identified.
Qualitative and quantitative risk analysis table
Risk id
Risk description
Risk type/ranking
probability
1
Developers exiting from the organization
threat
0.2
2
Risk of developing an obsolete software
weakness
0.1
3
Risk of developing an inferior software
weakness
0.3
4
Risk of missing a step in development
weakness
0.4
6
Risk of similar software from competitors
threat
0.7
7
Risk of Failure to meet all expectations of client
weakness
0.2
8
Risk of surpassing the budget
weakness
0.7
9
Risk of surpassing the time limit
weakness
0.7
10
Risk of exposure of trade secrets
threat
0.1
11
Risk of gold plating
weakness
0.4
12
Risk of not adhering to procedures
weakness
0.15
13
Risk of producing superior software
opportunity
0.3
14
Risk of organization growing due to large customer growth
opportunity
0.25
15
Risk of fraud and hacking from hackers
threat
0.6
16
Risk of surpassing client’s demands
opportunity
0.3
17
Risk of losing clients to competitors
threat
0.4
18
Risk of interference of the development process by client
threat
0.8
19
Risk of Compromise on quality of final product
weakness
0.1
20
Risk of growing the organization’s profit gain
Opportunity
0.25
Risk Response Planning
Risks can come as either a weakness, threat or an opportunity to
the organization. Therefore a company needs to perform a
thorough access to risks that are prone to affect it. According to
Kendrick, (2015), the management should ensure that all the
risks are addressed appropriately depending on their ranking
and probability. There are various responses to different risks
depending on their type. In various cases organizations need to
develop a mitigation plan in cases where risks are anticipated.
For the risk response plan and the risks mentioned, below are
the responses that the organization should consider adopting.
First, the risk of developer exiting from the organization can be
mitigated in order to minimize the chances of it occurring in the
company. The company should develop a mitigation plan to
handle given a scenario. For example, the developer should
train one of the staff members who are experts in the field such
that in case of a developer leaving they should fit into their
position with ease.
Secondly, the risks of developing obsolete or inferior software
can be handled by avoiding. The risk can be avoided by the
company hiring competent IT experts. Competent IT expert will
stay up to date as well as constantly updating the software
which will, in turn, avoid the risk of developing obsolete
software. The company should respond to the risk of missing a
step in the development by reducing the risk. During the
planning, the company develops a clear plan with the help of
competent IT experts that will take into consideration every step
of the development.
The risk of similar software from competitors can be mitigated
by innovation by the company software engineers. The
engineers should always improve and develop competent
innovations that will help in mitigating the risk of competition
from other developers. The risk to meet all the expectations of
the client can be reduced. The risk might be inevitable however
an explicit analysis of the customers’ needs and expectations
should be conducted. In this case, the developer will make
software that should meet the customers’ needs and
requirements.
The risk of surpassing the budget as well as the time limit can
be reduced. This can be reduced by coming up with a well-
planned budget as well as sticking to the plan in order to
minimize miscellaneous spending. The budget will ensure that
the funds are used only for the required purpose and therefore
minimize mismanagement. The risk of exposure of state secrets
can be addressed through avoidance. The risk can be avoided by
entrusting only a few personnel with the secrets. Additionally,
the secrets could be kept in a secure place and protected by
codes or encryption. In this case, only the authorized
individuals will be able to access the information.
The company can address the risk of gold plating by reducing
the chances of it occurring. This can by accessing the
customers’ needs and requirement. This will help in that when
enhancing the software or services it will be the enhancement
that will be accepted by the clients hence minimizing the risk of
gold plating. Risk of not adhering to procedures can be reduced
by hiring and training staff members on the importance of
company procedures. In this case, the members who do not
adhere to the procedure will be held accountable for the errors
that may occur.
The organization growing due to customers’ growth and the risk
of surpassing the clients’ demands should be exploited. This can
be done by the company ensuring that all the services provided
meet or exceed the customers’ expectations and needs. The
company should take advantage of the situation and increase
their production and service delivery. This can also be done by
regularly improving their service delivery and products in order
to maintain the clients as well as attracting some more. This
will boost the company’s profit margins and enable it to
efficiently achieve its set goals.
The risk of developing superior software should be enhanced.
The enhancement will increase the chances of the company
developing another software hence customer satisfaction which
will in turn help in the growth of the company. This will be
beneficial in the company’s strategy in that it will bolster its
development and thus the achievement of its visions, goals, and
objectives (Kim, 2010). The risk of fraud and hacking from
hackers can be mitigated by putting in place firmware that
would help in preventing hacking and fraud. Additionally, It
experts from the company should supervise and monitor cyber
security on regular basis.
Supervision and monitoring will help in a case where suspicion
is detected the IT experts will respond accordingly. The risk of
losing clients to competitors can be a huge threat to the
company. Therefore the company should mitigate the risk by
improving its services as well as improving their customer
service. Risk of interference of the development process by the
client can be avoided by providing only the products or services
that meet the needs of the clients and being open t clients only
after the development is completed.
Risk of Compromise on quality of the final product can be
reduced. The project should be developed sticking to the plan,
budget and ensuring that it is delivered on time. When a project
is completed with the right procedures and measures, there is a
minimal chance of the final product getting compromised. Risk
of growing the organization’s profit gain should be shared. In
this case, as noted by Kang, & Kim (2016), the company should
consider sharing the opportunity with partners and suppliers in
order to minimize the resources and increase the profit margins
which in turn help boost the company’s growth.
Risk breakdown structure
In order to adequately understand and curb as well as
minimize the risks from occurring, there is a need for a risk
breakdown structure. A risk breakdown structure will help in
providing an insight as well as the intensity of the risk.
Technical
· Scope Definition
· Requirements Definition
· Technical processes
· design
Management Risk
· Project Management
· Organization
· Communication
· Health and Safety
Commercial Risk
· Contractual
· Procurement
· Subcontractors
· Client
External Risk
· Legislation
· Competitors
· Political
References
Kang, H. W., & Kim, Y. S. (2016). Analysis of the probabilistic
cost variation ranges according to the effect of core quantitative
risk factors for an overseas plant project: Focused on a Middle
East gas plant project. KSCE Journal of Civil Engineering,
20(2), 509-518.
Kendrick, T. (2015). Identifying and managing project risk:
essential tools for failure-proofing your project. AMACOM Div
American Mgmt Assn.
Kim, Y. S. (2010). A study on the costs variation range through
the risk factors for overseas plant projects. Journal of The
Architectural Institute of Korea, 26(7), 139-147.
In Bérard, C., & In Teyssier, C. (2017). Risk management:
Lever for SME development and stakeholder value creation.
Población, G. F. J. (2017). Financial Risk Management:
Identification, Measurement and Management.
Seth, C. (2015). Swot analysis. Namur: 50minutes.
Virine, L., & Trumper, M. (2017). Project risk analysis made
ridiculously simple.
Barkley, B. (2004). Project risk management. New York:
McGraw-Hill.
Jackson, P. (2006). Nonprofit risk management and contingency
planning : done in a day strategies. Hoboken, N.J: Wiley.
Lewis, J. (2007). Fundamentals of project management. New
York: American Management Association.
Gregory, G. (2007). Project management. Oxford: Pergamon
Flexible Learning.
Young, T. (2006). Successful project management. London
Philadelphia: Kogan Page Ltd
Project Risk ManagementIntroductionRisk management is one of .docx

More Related Content

Similar to Project Risk ManagementIntroductionRisk management is one of .docx

Software Project Management (SPM)
Software Project Management (SPM)Software Project Management (SPM)
Software Project Management (SPM)RubySaud
 
An Ultimate Guide To Custom Software Development
An Ultimate Guide To Custom Software DevelopmentAn Ultimate Guide To Custom Software Development
An Ultimate Guide To Custom Software DevelopmentVrinsoft Technology
 
A Guide to Software Development Manager Responsibilities.pdf
A Guide to Software Development Manager Responsibilities.pdfA Guide to Software Development Manager Responsibilities.pdf
A Guide to Software Development Manager Responsibilities.pdfLaura Miller
 
Project Planning, Execution And Closure Essay
Project Planning, Execution And Closure EssayProject Planning, Execution And Closure Essay
Project Planning, Execution And Closure EssayJennifer Letterman
 
ProgrammsStrategy HQ.pdf
ProgrammsStrategy HQ.pdfProgrammsStrategy HQ.pdf
ProgrammsStrategy HQ.pdfVograce
 
best-practices-to-develop-software-applications-for-startups- cuneiform.pdf
best-practices-to-develop-software-applications-for-startups- cuneiform.pdfbest-practices-to-develop-software-applications-for-startups- cuneiform.pdf
best-practices-to-develop-software-applications-for-startups- cuneiform.pdfCuneiform Consulting Pvt Ltd.
 
Software product development tips to develop a quality software in 2021
Software product development  tips to develop a quality software in 2021Software product development  tips to develop a quality software in 2021
Software product development tips to develop a quality software in 2021SnehaDas60
 
Quality software project managementi need deep explanation for thi.pdf
Quality software project managementi need deep explanation for thi.pdfQuality software project managementi need deep explanation for thi.pdf
Quality software project managementi need deep explanation for thi.pdfalokkesh
 
New Microsoft Word Document.docx
New Microsoft Word Document.docxNew Microsoft Word Document.docx
New Microsoft Word Document.docxAbelAdisu
 
Project managment software
Project managment softwareProject managment software
Project managment softwareZilicus
 
Software project planning and monitoring
Software project planning and monitoringSoftware project planning and monitoring
Software project planning and monitoringYb Yar
 
Project_management_Amit_dubey
Project_management_Amit_dubeyProject_management_Amit_dubey
Project_management_Amit_dubeyAmit Dubey
 
Designing A Brand Market Analysis
Designing A Brand Market AnalysisDesigning A Brand Market Analysis
Designing A Brand Market AnalysisOlga Bautista
 
Custom Software Development Cost, Process and Time.pdf
Custom Software Development Cost, Process and Time.pdfCustom Software Development Cost, Process and Time.pdf
Custom Software Development Cost, Process and Time.pdfJPLoft Solutions
 

Similar to Project Risk ManagementIntroductionRisk management is one of .docx (20)

Software Project Management (SPM)
Software Project Management (SPM)Software Project Management (SPM)
Software Project Management (SPM)
 
Computing Project
Computing Project Computing Project
Computing Project
 
How to Steer Clear Of Budget Overruns in Software.pdf
How to Steer Clear Of Budget Overruns in Software.pdfHow to Steer Clear Of Budget Overruns in Software.pdf
How to Steer Clear Of Budget Overruns in Software.pdf
 
An Ultimate Guide To Custom Software Development
An Ultimate Guide To Custom Software DevelopmentAn Ultimate Guide To Custom Software Development
An Ultimate Guide To Custom Software Development
 
A Guide to Software Development Manager Responsibilities.pdf
A Guide to Software Development Manager Responsibilities.pdfA Guide to Software Development Manager Responsibilities.pdf
A Guide to Software Development Manager Responsibilities.pdf
 
Project Planning, Execution And Closure Essay
Project Planning, Execution And Closure EssayProject Planning, Execution And Closure Essay
Project Planning, Execution And Closure Essay
 
ProgrammsStrategy HQ.pdf
ProgrammsStrategy HQ.pdfProgrammsStrategy HQ.pdf
ProgrammsStrategy HQ.pdf
 
SPM.pptx
SPM.pptxSPM.pptx
SPM.pptx
 
best-practices-to-develop-software-applications-for-startups- cuneiform.pdf
best-practices-to-develop-software-applications-for-startups- cuneiform.pdfbest-practices-to-develop-software-applications-for-startups- cuneiform.pdf
best-practices-to-develop-software-applications-for-startups- cuneiform.pdf
 
Software product development tips to develop a quality software in 2021
Software product development  tips to develop a quality software in 2021Software product development  tips to develop a quality software in 2021
Software product development tips to develop a quality software in 2021
 
Pmbok
PmbokPmbok
Pmbok
 
Quality software project managementi need deep explanation for thi.pdf
Quality software project managementi need deep explanation for thi.pdfQuality software project managementi need deep explanation for thi.pdf
Quality software project managementi need deep explanation for thi.pdf
 
New Microsoft Word Document.docx
New Microsoft Word Document.docxNew Microsoft Word Document.docx
New Microsoft Word Document.docx
 
Project managment software
Project managment softwareProject managment software
Project managment software
 
Software project planning and monitoring
Software project planning and monitoringSoftware project planning and monitoring
Software project planning and monitoring
 
Project_management_Amit_dubey
Project_management_Amit_dubeyProject_management_Amit_dubey
Project_management_Amit_dubey
 
Fp Martinelli Graykowski
Fp Martinelli GraykowskiFp Martinelli Graykowski
Fp Martinelli Graykowski
 
Designing A Brand Market Analysis
Designing A Brand Market AnalysisDesigning A Brand Market Analysis
Designing A Brand Market Analysis
 
Custom Software Development Cost, Process and Time.pdf
Custom Software Development Cost, Process and Time.pdfCustom Software Development Cost, Process and Time.pdf
Custom Software Development Cost, Process and Time.pdf
 
software project management
software project managementsoftware project management
software project management
 

More from briancrawford30935

You have collected the following documents (unstructured) and pl.docx
You have collected the following documents (unstructured) and pl.docxYou have collected the following documents (unstructured) and pl.docx
You have collected the following documents (unstructured) and pl.docxbriancrawford30935
 
You have been working as a technology associate the information .docx
You have been working as a technology associate the information .docxYou have been working as a technology associate the information .docx
You have been working as a technology associate the information .docxbriancrawford30935
 
You have chosen to join WHO. They are particularly interested in.docx
You have chosen to join WHO. They are particularly interested in.docxYou have chosen to join WHO. They are particularly interested in.docx
You have chosen to join WHO. They are particularly interested in.docxbriancrawford30935
 
You have been tasked to present at a town hall meeting in your local.docx
You have been tasked to present at a town hall meeting in your local.docxYou have been tasked to present at a town hall meeting in your local.docx
You have been tasked to present at a town hall meeting in your local.docxbriancrawford30935
 
You have been tasked as the health care administrator of a major hos.docx
You have been tasked as the health care administrator of a major hos.docxYou have been tasked as the health care administrator of a major hos.docx
You have been tasked as the health care administrator of a major hos.docxbriancrawford30935
 
You have been tasked to devise a program to address the needs of.docx
You have been tasked to devise a program to address the needs of.docxYou have been tasked to devise a program to address the needs of.docx
You have been tasked to devise a program to address the needs of.docxbriancrawford30935
 
You have been successful in your application for the position be.docx
You have been successful in your application for the position be.docxYou have been successful in your application for the position be.docx
You have been successful in your application for the position be.docxbriancrawford30935
 
You have been hired as a project management consultant by compan.docx
You have been hired as a project management consultant by compan.docxYou have been hired as a project management consultant by compan.docx
You have been hired as a project management consultant by compan.docxbriancrawford30935
 
You have been hired to manage a particular aspect of the new ad.docx
You have been hired to manage a particular aspect of the new ad.docxYou have been hired to manage a particular aspect of the new ad.docx
You have been hired to manage a particular aspect of the new ad.docxbriancrawford30935
 
You have been hired by Red Didgeridoo Technologies. They know th.docx
You have been hired by Red Didgeridoo Technologies. They know th.docxYou have been hired by Red Didgeridoo Technologies. They know th.docx
You have been hired by Red Didgeridoo Technologies. They know th.docxbriancrawford30935
 
You have been hired by TMI to design an application using shell scri.docx
You have been hired by TMI to design an application using shell scri.docxYou have been hired by TMI to design an application using shell scri.docx
You have been hired by TMI to design an application using shell scri.docxbriancrawford30935
 
You have been hired as the CSO (Chief Security Officer) for an org.docx
You have been hired as the CSO (Chief Security Officer) for an org.docxYou have been hired as the CSO (Chief Security Officer) for an org.docx
You have been hired as the CSO (Chief Security Officer) for an org.docxbriancrawford30935
 
You have been hired to evaluate the volcanic hazards associated .docx
You have been hired to evaluate the volcanic hazards associated .docxYou have been hired to evaluate the volcanic hazards associated .docx
You have been hired to evaluate the volcanic hazards associated .docxbriancrawford30935
 
You have been hired as an assistant to the public health officer for.docx
You have been hired as an assistant to the public health officer for.docxYou have been hired as an assistant to the public health officer for.docx
You have been hired as an assistant to the public health officer for.docxbriancrawford30935
 
You have been engaged to develop a special calculator program. T.docx
You have been engaged to develop a special calculator program. T.docxYou have been engaged to develop a special calculator program. T.docx
You have been engaged to develop a special calculator program. T.docxbriancrawford30935
 
You have now delivered the project to your customer ahead of schedul.docx
You have now delivered the project to your customer ahead of schedul.docxYou have now delivered the project to your customer ahead of schedul.docx
You have now delivered the project to your customer ahead of schedul.docxbriancrawford30935
 
You have now delivered the project to your customer. The project was.docx
You have now delivered the project to your customer. The project was.docxYou have now delivered the project to your customer. The project was.docx
You have now delivered the project to your customer. The project was.docxbriancrawford30935
 
You have now experienced the work of various scholars, artists and m.docx
You have now experienced the work of various scholars, artists and m.docxYou have now experienced the work of various scholars, artists and m.docx
You have now experienced the work of various scholars, artists and m.docxbriancrawford30935
 
You have learned that Mr. Moore does not drink alcohol in the mornin.docx
You have learned that Mr. Moore does not drink alcohol in the mornin.docxYou have learned that Mr. Moore does not drink alcohol in the mornin.docx
You have learned that Mr. Moore does not drink alcohol in the mornin.docxbriancrawford30935
 
You have been hired by a large hospitality firm (e.g., Marriot.docx
You have been hired by a large hospitality firm (e.g., Marriot.docxYou have been hired by a large hospitality firm (e.g., Marriot.docx
You have been hired by a large hospitality firm (e.g., Marriot.docxbriancrawford30935
 

More from briancrawford30935 (20)

You have collected the following documents (unstructured) and pl.docx
You have collected the following documents (unstructured) and pl.docxYou have collected the following documents (unstructured) and pl.docx
You have collected the following documents (unstructured) and pl.docx
 
You have been working as a technology associate the information .docx
You have been working as a technology associate the information .docxYou have been working as a technology associate the information .docx
You have been working as a technology associate the information .docx
 
You have chosen to join WHO. They are particularly interested in.docx
You have chosen to join WHO. They are particularly interested in.docxYou have chosen to join WHO. They are particularly interested in.docx
You have chosen to join WHO. They are particularly interested in.docx
 
You have been tasked to present at a town hall meeting in your local.docx
You have been tasked to present at a town hall meeting in your local.docxYou have been tasked to present at a town hall meeting in your local.docx
You have been tasked to present at a town hall meeting in your local.docx
 
You have been tasked as the health care administrator of a major hos.docx
You have been tasked as the health care administrator of a major hos.docxYou have been tasked as the health care administrator of a major hos.docx
You have been tasked as the health care administrator of a major hos.docx
 
You have been tasked to devise a program to address the needs of.docx
You have been tasked to devise a program to address the needs of.docxYou have been tasked to devise a program to address the needs of.docx
You have been tasked to devise a program to address the needs of.docx
 
You have been successful in your application for the position be.docx
You have been successful in your application for the position be.docxYou have been successful in your application for the position be.docx
You have been successful in your application for the position be.docx
 
You have been hired as a project management consultant by compan.docx
You have been hired as a project management consultant by compan.docxYou have been hired as a project management consultant by compan.docx
You have been hired as a project management consultant by compan.docx
 
You have been hired to manage a particular aspect of the new ad.docx
You have been hired to manage a particular aspect of the new ad.docxYou have been hired to manage a particular aspect of the new ad.docx
You have been hired to manage a particular aspect of the new ad.docx
 
You have been hired by Red Didgeridoo Technologies. They know th.docx
You have been hired by Red Didgeridoo Technologies. They know th.docxYou have been hired by Red Didgeridoo Technologies. They know th.docx
You have been hired by Red Didgeridoo Technologies. They know th.docx
 
You have been hired by TMI to design an application using shell scri.docx
You have been hired by TMI to design an application using shell scri.docxYou have been hired by TMI to design an application using shell scri.docx
You have been hired by TMI to design an application using shell scri.docx
 
You have been hired as the CSO (Chief Security Officer) for an org.docx
You have been hired as the CSO (Chief Security Officer) for an org.docxYou have been hired as the CSO (Chief Security Officer) for an org.docx
You have been hired as the CSO (Chief Security Officer) for an org.docx
 
You have been hired to evaluate the volcanic hazards associated .docx
You have been hired to evaluate the volcanic hazards associated .docxYou have been hired to evaluate the volcanic hazards associated .docx
You have been hired to evaluate the volcanic hazards associated .docx
 
You have been hired as an assistant to the public health officer for.docx
You have been hired as an assistant to the public health officer for.docxYou have been hired as an assistant to the public health officer for.docx
You have been hired as an assistant to the public health officer for.docx
 
You have been engaged to develop a special calculator program. T.docx
You have been engaged to develop a special calculator program. T.docxYou have been engaged to develop a special calculator program. T.docx
You have been engaged to develop a special calculator program. T.docx
 
You have now delivered the project to your customer ahead of schedul.docx
You have now delivered the project to your customer ahead of schedul.docxYou have now delivered the project to your customer ahead of schedul.docx
You have now delivered the project to your customer ahead of schedul.docx
 
You have now delivered the project to your customer. The project was.docx
You have now delivered the project to your customer. The project was.docxYou have now delivered the project to your customer. The project was.docx
You have now delivered the project to your customer. The project was.docx
 
You have now experienced the work of various scholars, artists and m.docx
You have now experienced the work of various scholars, artists and m.docxYou have now experienced the work of various scholars, artists and m.docx
You have now experienced the work of various scholars, artists and m.docx
 
You have learned that Mr. Moore does not drink alcohol in the mornin.docx
You have learned that Mr. Moore does not drink alcohol in the mornin.docxYou have learned that Mr. Moore does not drink alcohol in the mornin.docx
You have learned that Mr. Moore does not drink alcohol in the mornin.docx
 
You have been hired by a large hospitality firm (e.g., Marriot.docx
You have been hired by a large hospitality firm (e.g., Marriot.docxYou have been hired by a large hospitality firm (e.g., Marriot.docx
You have been hired by a large hospitality firm (e.g., Marriot.docx
 

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Project Risk ManagementIntroductionRisk management is one of .docx

  • 1. Project Risk Management Introduction Risk management is one of the most important aspects that any project developer requires to understand fully. Development of projects without the establishment of effective risk management programs is a possible means to the failure of that project. In order to avoid such outcomes, project developers make the effort of establishing a solid and highly effective risk management program to help in making sure that the project does not in any instance fail to succeed. Risk management programs are mainly established with reference to the project and its nature. In order to ensure that most of the risks the project face are mitigated, project developers evaluate the stages of project development and then assess possible risks that may present in those situations. In this paper, a project will be explained, which will be used to create a risk management plan (Gregory, 2007). Project Description Software development is currently one of the most significant activity that many companies are considering venturing into, mostly because people have attained a significant interest in having most of their activities and daily operations automated. Software products help people manage to carry out a wide variety of tasks and activities in an effectively appropriate way. Intridea is one of the largest software development companies, which venture in providing people and other clients with software products that they feel they need. The organization has a large network of develop engineers, who provide the service of developing the software products that clients of the organization order. The process of developing any software is considered a project by the organization, since it requires following all the strict policy stages that the organization has established in order to complete. The organization aims to complete every software development
  • 2. process successfully and thus the need to ensure that all important steps to address risks is essential. Intridea develops a large number of software products for many clients. One of the most recent projects that the organization is currently involving in is the development of a trading software to implement a trading strategy from a client. The trading strategy that the client requires implemented is the use of three indicators to determine trend, and then using hedging to avoid loss in any trade that might be against the traded trend. Such a project is considered to be significantly important, since the client has a high stake to loose in case it is developed with flaws. Trading software products are developed in a similar manner to all other software products. A major difference is the fact that these software products are directly used to trade real money in a trading platforms and thus the need to ensure that they are developed to operate in a flawless manner is extremely important. A large number of risks can also occur at any stage of development and thus there is a need to ensure that a risk mitigation program is implemented (Young, 2006). Project Objectives The main objective of this project is to ensure that the trading software is developed completely and that it meets all the expectations of the client who ordered it. Ensuring that the process of development is successful and that all the intended operations and capabilities of the software are implemented in its development would help in ensuring that the product is developed successfully. The other major development objective for this project is ensuring that the process of development does not exceed the intended budget. The budget constraint is a significantly important aspect for any project. In the case of this project, for example, there is the agreed upon amount that the client was charged for the software product. From this amount, the project development process should be covered and the profit that the organization gains from this project. Since the agreed upon amount between the organization and the client is
  • 3. fixed, when the budget exceeds the earlier intended upon amount, the profits that the organization gains from the project decrease. To avoid this decrease, therefore, it is a major objective for the project to complete within the initially intended budget constraint (Lewis, 2007). Another important objective of the project is to ensure that it is developed within the provided time limit, by the client. A trading software is a money managing and developing tool. With this regard, the client that spends a large amount of money for its development is likely to be eager to have the fully completed product within the shortest time period possible. Exceeding the provided and agreed upon time deadline could thus be the reason for such a customer to consider the services of another organization next time. In order to guarantee customer satisfaction, therefore, it is essentially important to ensure that this objective is met. External Dependencies External dependencies are the specific external factors or input that the project requires in order to be successful. For this project, significant trading knowledge is essential, in order to ensure that the product works exactly in the same way that the client requires. One of the main external dependency in this case is thus the client, who would require to answer any form of trading technicalities that may be required in the development process. This is because in some occasions, a software developer may require guidance on the aspects of operation regarding hos the software is required to address certain issues. The development team can also seek information and guidance from another third party individual who is highly skilled in treading activity. These two individuals would thus be the external dependencies of the project (Jackson, 2006). Stakeholder Analysis For this project, stakeholders include the organization in general, the project developers and the client who ordered the development of the software product. The organization is a major stakeholder in this project. The developers of the product
  • 4. are employees to the organization. The successful completion of the project is however considered an achievement to the developer’s team of the organization and thus it is in their best interest to ensure that the project completes as a success. This group of stakeholders also play a major role in ensuring that the project completely meets its objectives and that the client who ordered for it is fully satisfied with their work in developing it. The client is the main stakeholder of this project. He or she plays a major role in determining whether the project was successfully completed or it is considered a fail. A successful project is the kind of a project that the client considers successful and effective in carrying out all its intended functions and purpose. Project Tasks All projects have a number of project tasks that requires to be completed by the project developers in order to ensure that it completes successfully. Project tasks make the project easy to complete for a group of people and it also makes team work possible for the developers. For this task, the main tasks which requires to be completed by the project stakeholders include; evaluating the scope of the project and capabilities of the software intended for development, selecting a team that is capable to effectively develop the intended project, drafting a sufficient budget, delegation of the development task and the development of the project. All the other tasks fall under these major categories. Completion of all the project tasks in a successful way is thus the completion of the project successfully (Barkley, 2004). Risk Management Plan Scope and Identification The project’s potential risks The project is in software development and most of the time software development undertakings come with various challenges. The challenges might overlap or might stand out as single issues. It is proper that potential risks are identified early so that mitigation can be initiated. The potential risk areas for
  • 5. software development include integration challenges, software failure, and security challenges. In the following paragraphs, I have indicated several risk areas that might affect the trading software development, the rollout process and the client interaction with the software. The organization risks developing trading software that will become obsolete in a short time span. This is because of the fast growth of technology. Advancement of technology is accompanied by upgrades and advanced techniques of developing advanced software. The organization also risks developing inferior software compared to market levels. This again is because of advancement of technology. Normally in software development, there are several steps and phases that are merged in order to develop proper working software and at times a phase or step is missed. It might go unnoticed but has the potential to have ripple effects in the future. The organization is at risk of missing a step in development and as a result is also at risk of the software failing. Due to the direct involvement of money to the software the organization is at risk from hacking. Since there is no restriction on the trading market the organization is at risk of similar software from its competitors. The project is under a constraint budget and the budget constraint might require developers to do away or skip processes that might risk the quality of software. Other than budget constraints the trading software is also under a time constraint. The time constraints might also risk the project quality; the project is at risk of not meeting the client’s expectations. Failure to meet client’s time expectations exposes the organization; the client might consider other organizations for the development and future developments. There is external overdependence and this brings to light the risk of leaked trade skills and strategy; risk of trade secrets. Every organization is at risk of employee turnover. Turnovers have the potential to affect the project development. Due to the high stakes involved, the organization's development
  • 6. team is at risk of gold plating in order to win the affection and business of the client. The gold plating is likely to cause a budget exceed. All software developments have many procedures and more often than not the risk of flaunting the procedures or failing to follow the procedure is quite high. There is also the probability of unavoidable risks such as government restrictions on software more so those involved in cash transactions. There is also the risk that the project might not live up to its expectations as far as productivity is concerned. There are also positive risks that the organization is likely to face. Due to the high stakes involved, precision and effectiveness are encouraged and this exposes the organization to the risks of high-profit gains, production of superior software which might lead to the growth of customer base. Positive risks that the organization is also likely to face include expertise growth due to external overreliance, the risk learning from their failures and they also risk growing the organization. Techniques used in risk identification In order to identify the risks I employed the use of several techniques and they included; SWOT analysis, decision trees, assumption analysis and reviewing of related project’s documentation. The SWOT analysis helped in the identification of both internal and external risks as far as the rollout of the software and client uptake was concerned (Seth, 2015). The decision tree helped in identifying future risks since it is effective for analyzing many options or alternatives. The assumption analysis was also useful in determining possible future risks. The reviewing of already developed related project’s documentation was particularly helpful as it provided insight on possible risks factoring all areas i.e. internal risk factors, external risk factors, future potential risks, development risks, clients’ reaction and uptake risks. Stakeholders of the risk identification process For any risk identification, various people or groups must be involved depending on the project type and these people or
  • 7. groups can be referred to as risk stakeholders. Risk stakeholders can include people who might be affected or perceive to be affected should a risk come to be. The people involved in the identification of the risks included; the employees of the organization, the developers of the software and the client (In Bérard & In Teyssier, 2017). The developers were crucial in identifying potential risks considering that they have developed prior software and hence could come up with a list of general risks that affect software. The client also played a role in the identification of risks since they gave information on potential challenges that may affect their activities such as fraud and hacks since they needed software that handled money transactions. Employees of the organization helped in brainstorming more so in the assumption analysis (Virine & Trumper, 2017). This ensured that almost all potential risks were identified. Qualitative and quantitative risk analysis table Risk id Risk description Risk type/ranking probability 1 Developers exiting from the organization threat 0.2 2 Risk of developing an obsolete software weakness 0.1 3 Risk of developing an inferior software weakness 0.3 4 Risk of missing a step in development weakness
  • 8. 0.4 6 Risk of similar software from competitors threat 0.7 7 Risk of Failure to meet all expectations of client weakness 0.2 8 Risk of surpassing the budget weakness 0.7 9 Risk of surpassing the time limit weakness 0.7 10 Risk of exposure of trade secrets threat 0.1 11 Risk of gold plating weakness 0.4 12 Risk of not adhering to procedures weakness 0.15 13 Risk of producing superior software opportunity 0.3 14 Risk of organization growing due to large customer growth opportunity
  • 9. 0.25 15 Risk of fraud and hacking from hackers threat 0.6 16 Risk of surpassing client’s demands opportunity 0.3 17 Risk of losing clients to competitors threat 0.4 18 Risk of interference of the development process by client threat 0.8 19 Risk of Compromise on quality of final product weakness 0.1 20 Risk of growing the organization’s profit gain Opportunity 0.25 Risk Response Planning Risks can come as either a weakness, threat or an opportunity to the organization. Therefore a company needs to perform a thorough access to risks that are prone to affect it. According to Kendrick, (2015), the management should ensure that all the risks are addressed appropriately depending on their ranking and probability. There are various responses to different risks depending on their type. In various cases organizations need to develop a mitigation plan in cases where risks are anticipated. For the risk response plan and the risks mentioned, below are the responses that the organization should consider adopting.
  • 10. First, the risk of developer exiting from the organization can be mitigated in order to minimize the chances of it occurring in the company. The company should develop a mitigation plan to handle given a scenario. For example, the developer should train one of the staff members who are experts in the field such that in case of a developer leaving they should fit into their position with ease. Secondly, the risks of developing obsolete or inferior software can be handled by avoiding. The risk can be avoided by the company hiring competent IT experts. Competent IT expert will stay up to date as well as constantly updating the software which will, in turn, avoid the risk of developing obsolete software. The company should respond to the risk of missing a step in the development by reducing the risk. During the planning, the company develops a clear plan with the help of competent IT experts that will take into consideration every step of the development. The risk of similar software from competitors can be mitigated by innovation by the company software engineers. The engineers should always improve and develop competent innovations that will help in mitigating the risk of competition from other developers. The risk to meet all the expectations of the client can be reduced. The risk might be inevitable however an explicit analysis of the customers’ needs and expectations should be conducted. In this case, the developer will make software that should meet the customers’ needs and requirements. The risk of surpassing the budget as well as the time limit can be reduced. This can be reduced by coming up with a well- planned budget as well as sticking to the plan in order to minimize miscellaneous spending. The budget will ensure that the funds are used only for the required purpose and therefore minimize mismanagement. The risk of exposure of state secrets can be addressed through avoidance. The risk can be avoided by entrusting only a few personnel with the secrets. Additionally, the secrets could be kept in a secure place and protected by
  • 11. codes or encryption. In this case, only the authorized individuals will be able to access the information. The company can address the risk of gold plating by reducing the chances of it occurring. This can by accessing the customers’ needs and requirement. This will help in that when enhancing the software or services it will be the enhancement that will be accepted by the clients hence minimizing the risk of gold plating. Risk of not adhering to procedures can be reduced by hiring and training staff members on the importance of company procedures. In this case, the members who do not adhere to the procedure will be held accountable for the errors that may occur. The organization growing due to customers’ growth and the risk of surpassing the clients’ demands should be exploited. This can be done by the company ensuring that all the services provided meet or exceed the customers’ expectations and needs. The company should take advantage of the situation and increase their production and service delivery. This can also be done by regularly improving their service delivery and products in order to maintain the clients as well as attracting some more. This will boost the company’s profit margins and enable it to efficiently achieve its set goals. The risk of developing superior software should be enhanced. The enhancement will increase the chances of the company developing another software hence customer satisfaction which will in turn help in the growth of the company. This will be beneficial in the company’s strategy in that it will bolster its development and thus the achievement of its visions, goals, and objectives (Kim, 2010). The risk of fraud and hacking from hackers can be mitigated by putting in place firmware that would help in preventing hacking and fraud. Additionally, It experts from the company should supervise and monitor cyber security on regular basis. Supervision and monitoring will help in a case where suspicion is detected the IT experts will respond accordingly. The risk of losing clients to competitors can be a huge threat to the
  • 12. company. Therefore the company should mitigate the risk by improving its services as well as improving their customer service. Risk of interference of the development process by the client can be avoided by providing only the products or services that meet the needs of the clients and being open t clients only after the development is completed. Risk of Compromise on quality of the final product can be reduced. The project should be developed sticking to the plan, budget and ensuring that it is delivered on time. When a project is completed with the right procedures and measures, there is a minimal chance of the final product getting compromised. Risk of growing the organization’s profit gain should be shared. In this case, as noted by Kang, & Kim (2016), the company should consider sharing the opportunity with partners and suppliers in order to minimize the resources and increase the profit margins which in turn help boost the company’s growth. Risk breakdown structure In order to adequately understand and curb as well as minimize the risks from occurring, there is a need for a risk breakdown structure. A risk breakdown structure will help in providing an insight as well as the intensity of the risk. Technical · Scope Definition · Requirements Definition · Technical processes · design Management Risk · Project Management · Organization · Communication · Health and Safety Commercial Risk · Contractual · Procurement
  • 13. · Subcontractors · Client External Risk · Legislation · Competitors · Political References Kang, H. W., & Kim, Y. S. (2016). Analysis of the probabilistic cost variation ranges according to the effect of core quantitative risk factors for an overseas plant project: Focused on a Middle East gas plant project. KSCE Journal of Civil Engineering, 20(2), 509-518. Kendrick, T. (2015). Identifying and managing project risk: essential tools for failure-proofing your project. AMACOM Div American Mgmt Assn. Kim, Y. S. (2010). A study on the costs variation range through the risk factors for overseas plant projects. Journal of The Architectural Institute of Korea, 26(7), 139-147. In Bérard, C., & In Teyssier, C. (2017). Risk management: Lever for SME development and stakeholder value creation. Población, G. F. J. (2017). Financial Risk Management: Identification, Measurement and Management. Seth, C. (2015). Swot analysis. Namur: 50minutes. Virine, L., & Trumper, M. (2017). Project risk analysis made ridiculously simple. Barkley, B. (2004). Project risk management. New York: McGraw-Hill. Jackson, P. (2006). Nonprofit risk management and contingency planning : done in a day strategies. Hoboken, N.J: Wiley. Lewis, J. (2007). Fundamentals of project management. New York: American Management Association. Gregory, G. (2007). Project management. Oxford: Pergamon Flexible Learning. Young, T. (2006). Successful project management. London Philadelphia: Kogan Page Ltd
  • 14. Project Risk Management Introduction Risk management is one of the most important aspects that any project developer requires to understand fully. Development of projects without the establishment of effective risk management programs is a possible means to the failure of that project. In order to avoid such outcomes, project developers make the effort of establishing a solid and highly effective risk management program to help in making sure that the project does not in any instance fail to succeed. Risk management programs are mainly established with reference to the project and its nature. In order to ensure that most of the risks the project face are mitigated, project developers evaluate the stages of project development and then assess possible risks that may present in those situations. In this paper, a project will be explained, which will be used to create a risk management plan (Gregory, 2007). Project Description Software development is currently one of the most significant activity that many companies are considering venturing into, mostly because people have attained a significant interest in having most of their activities and daily operations automated. Software products help people manage to carry out a wide variety of tasks and activities in an effectively appropriate way. Intridea is one of the largest software development companies, which venture in providing people and other clients with software products that they feel they need. The organization has a large network of develop engineers, who provide the service of developing the software products that clients of the organization order. The process of developing any software is considered a project by the organization, since it requires following all the strict policy stages that the organization has established in order to complete. The organization aims to complete every software development
  • 15. process successfully and thus the need to ensure that all important steps to address risks is essential. Intridea develops a large number of software products for many clients. One of the most recent projects that the organization is currently involving in is the development of a trading software to implement a trading strategy from a client. The trading strategy that the client requires implemented is the use of three indicators to determine trend, and then using hedging to avoid loss in any trade that might be against the traded trend. Such a project is considered to be significantly important, since the client has a high stake to loose in case it is developed with flaws. Trading software products are developed in a similar manner to all other software products. A major difference is the fact that these software products are directly used to trade real money in a trading platforms and thus the need to ensure that they are developed to operate in a flawless manner is extremely important. A large number of risks can also occur at any stage of development and thus there is a need to ensure that a risk mitigation program is implemented (Young, 2006). Project Objectives The main objective of this project is to ensure that the trading software is developed completely and that it meets all the expectations of the client who ordered it. Ensuring that the process of development is successful and that all the intended operations and capabilities of the software are implemented in its development would help in ensuring that the product is developed successfully. The other major development objective for this project is ensuring that the process of development does not exceed the intended budget. The budget constraint is a significantly important aspect for any project. In the case of this project, for example, there is the agreed upon amount that the client was charged for the software product. From this amount, the project development process should be covered and the profit that the organization gains from this project. Since the agreed upon amount between the organization and the client is
  • 16. fixed, when the budget exceeds the earlier intended upon amount, the profits that the organization gains from the project decrease. To avoid this decrease, therefore, it is a major objective for the project to complete within the initially intended budget constraint (Lewis, 2007). Another important objective of the project is to ensure that it is developed within the provided time limit, by the client. A trading software is a money managing and developing tool. With this regard, the client that spends a large amount of money for its development is likely to be eager to have the fully completed product within the shortest time period possible. Exceeding the provided and agreed upon time deadline could thus be the reason for such a customer to consider the services of another organization next time. In order to guarantee customer satisfaction, therefore, it is essentially important to ensure that this objective is met. External Dependencies External dependencies are the specific external factors or input that the project requires in order to be successful. For this project, significant trading knowledge is essential, in order to ensure that the product works exactly in the same way that the client requires. One of the main external dependency in this case is thus the client, who would require to answer any form of trading technicalities that may be required in the development process. This is because in some occasions, a software developer may require guidance on the aspects of operation regarding hos the software is required to address certain issues. The development team can also seek information and guidance from another third party individual who is highly skilled in treading activity. These two individuals would thus be the external dependencies of the project (Jackson, 2006). Stakeholder Analysis For this project, stakeholders include the organization in general, the project developers and the client who ordered the development of the software product. The organization is a major stakeholder in this project. The developers of the product
  • 17. are employees to the organization. The successful completion of the project is however considered an achievement to the developer’s team of the organization and thus it is in their best interest to ensure that the project completes as a success. This group of stakeholders also play a major role in ensuring that the project completely meets its objectives and that the client who ordered for it is fully satisfied with their work in developing it. The client is the main stakeholder of this project. He or she plays a major role in determining whether the project was successfully completed or it is considered a fail. A successful project is the kind of a project that the client considers successful and effective in carrying out all its intended functions and purpose. Project Tasks All projects have a number of project tasks that requires to be completed by the project developers in order to ensure that it completes successfully. Project tasks make the project easy to complete for a group of people and it also makes team work possible for the developers. For this task, the main tasks which requires to be completed by the project stakeholders include; evaluating the scope of the project and capabilities of the software intended for development, selecting a team that is capable to effectively develop the intended project, drafting a sufficient budget, delegation of the development task and the development of the project. All the other tasks fall under these major categories. Completion of all the project tasks in a successful way is thus the completion of the project successfully (Barkley, 2004). Risk Management Plan Scope and Identification The project’s potential risks The project is in software development and most of the time software development undertakings come with various challenges. The challenges might overlap or might stand out as single issues. It is proper that potential risks are identified early so that mitigation can be initiated. The potential risk areas for
  • 18. software development include integration challenges, software failure, and security challenges. In the following paragraphs, I have indicated several risk areas that might affect the trading software development, the rollout process and the client interaction with the software. The organization risks developing trading software that will become obsolete in a short time span. This is because of the fast growth of technology. Advancement of technology is accompanied by upgrades and advanced techniques of developing advanced software. The organization also risks developing inferior software compared to market levels. This again is because of advancement of technology. Normally in software development, there are several steps and phases that are merged in order to develop proper working software and at times a phase or step is missed. It might go unnoticed but has the potential to have ripple effects in the future. The organization is at risk of missing a step in development and as a result is also at risk of the software failing. Due to the direct involvement of money to the software the organization is at risk from hacking. Since there is no restriction on the trading market the organization is at risk of similar software from its competitors. The project is under a constraint budget and the budget constraint might require developers to do away or skip processes that might risk the quality of software. Other than budget constraints the trading software is also under a time constraint. The time constraints might also risk the project quality; the project is at risk of not meeting the client’s expectations. Failure to meet client’s time expectations exposes the organization; the client might consider other organizations for the development and future developments. There is external overdependence and this brings to light the risk of leaked trade skills and strategy; risk of trade secrets. Every organization is at risk of employee turnover. Turnovers have the potential to affect the project development. Due to the high stakes involved, the organization's development
  • 19. team is at risk of gold plating in order to win the affection and business of the client. The gold plating is likely to cause a budget exceed. All software developments have many procedures and more often than not the risk of flaunting the procedures or failing to follow the procedure is quite high. There is also the probability of unavoidable risks such as government restrictions on software more so those involved in cash transactions. There is also the risk that the project might not live up to its expectations as far as productivity is concerned. There are also positive risks that the organization is likely to face. Due to the high stakes involved, precision and effectiveness are encouraged and this exposes the organization to the risks of high-profit gains, production of superior software which might lead to the growth of customer base. Positive risks that the organization is also likely to face include expertise growth due to external overreliance, the risk learning from their failures and they also risk growing the organization. Techniques used in risk identification In order to identify the risks I employed the use of several techniques and they included; SWOT analysis, decision trees, assumption analysis and reviewing of related project’s documentation. The SWOT analysis helped in the identification of both internal and external risks as far as the rollout of the software and client uptake was concerned (Seth, 2015). The decision tree helped in identifying future risks since it is effective for analyzing many options or alternatives. The assumption analysis was also useful in determining possible future risks. The reviewing of already developed related project’s documentation was particularly helpful as it provided insight on possible risks factoring all areas i.e. internal risk factors, external risk factors, future potential risks, development risks, clients’ reaction and uptake risks. Stakeholders of the risk identification process For any risk identification, various people or groups must be involved depending on the project type and these people or
  • 20. groups can be referred to as risk stakeholders. Risk stakeholders can include people who might be affected or perceive to be affected should a risk come to be. The people involved in the identification of the risks included; the employees of the organization, the developers of the software and the client (In Bérard & In Teyssier, 2017). The developers were crucial in identifying potential risks considering that they have developed prior software and hence could come up with a list of general risks that affect software. The client also played a role in the identification of risks since they gave information on potential challenges that may affect their activities such as fraud and hacks since they needed software that handled money transactions. Employees of the organization helped in brainstorming more so in the assumption analysis (Virine & Trumper, 2017). This ensured that almost all potential risks were identified. Qualitative and quantitative risk analysis table Risk id Risk description Risk type/ranking probability 1 Developers exiting from the organization threat 0.2 2 Risk of developing an obsolete software weakness 0.1 3 Risk of developing an inferior software weakness 0.3 4 Risk of missing a step in development weakness
  • 21. 0.4 6 Risk of similar software from competitors threat 0.7 7 Risk of Failure to meet all expectations of client weakness 0.2 8 Risk of surpassing the budget weakness 0.7 9 Risk of surpassing the time limit weakness 0.7 10 Risk of exposure of trade secrets threat 0.1 11 Risk of gold plating weakness 0.4 12 Risk of not adhering to procedures weakness 0.15 13 Risk of producing superior software opportunity 0.3 14 Risk of organization growing due to large customer growth opportunity
  • 22. 0.25 15 Risk of fraud and hacking from hackers threat 0.6 16 Risk of surpassing client’s demands opportunity 0.3 17 Risk of losing clients to competitors threat 0.4 18 Risk of interference of the development process by client threat 0.8 19 Risk of Compromise on quality of final product weakness 0.1 20 Risk of growing the organization’s profit gain Opportunity 0.25 Risk Response Planning Risks can come as either a weakness, threat or an opportunity to the organization. Therefore a company needs to perform a thorough access to risks that are prone to affect it. According to Kendrick, (2015), the management should ensure that all the risks are addressed appropriately depending on their ranking and probability. There are various responses to different risks depending on their type. In various cases organizations need to develop a mitigation plan in cases where risks are anticipated. For the risk response plan and the risks mentioned, below are the responses that the organization should consider adopting.
  • 23. First, the risk of developer exiting from the organization can be mitigated in order to minimize the chances of it occurring in the company. The company should develop a mitigation plan to handle given a scenario. For example, the developer should train one of the staff members who are experts in the field such that in case of a developer leaving they should fit into their position with ease. Secondly, the risks of developing obsolete or inferior software can be handled by avoiding. The risk can be avoided by the company hiring competent IT experts. Competent IT expert will stay up to date as well as constantly updating the software which will, in turn, avoid the risk of developing obsolete software. The company should respond to the risk of missing a step in the development by reducing the risk. During the planning, the company develops a clear plan with the help of competent IT experts that will take into consideration every step of the development. The risk of similar software from competitors can be mitigated by innovation by the company software engineers. The engineers should always improve and develop competent innovations that will help in mitigating the risk of competition from other developers. The risk to meet all the expectations of the client can be reduced. The risk might be inevitable however an explicit analysis of the customers’ needs and expectations should be conducted. In this case, the developer will make software that should meet the customers’ needs and requirements. The risk of surpassing the budget as well as the time limit can be reduced. This can be reduced by coming up with a well- planned budget as well as sticking to the plan in order to minimize miscellaneous spending. The budget will ensure that the funds are used only for the required purpose and therefore minimize mismanagement. The risk of exposure of state secrets can be addressed through avoidance. The risk can be avoided by entrusting only a few personnel with the secrets. Additionally, the secrets could be kept in a secure place and protected by
  • 24. codes or encryption. In this case, only the authorized individuals will be able to access the information. The company can address the risk of gold plating by reducing the chances of it occurring. This can by accessing the customers’ needs and requirement. This will help in that when enhancing the software or services it will be the enhancement that will be accepted by the clients hence minimizing the risk of gold plating. Risk of not adhering to procedures can be reduced by hiring and training staff members on the importance of company procedures. In this case, the members who do not adhere to the procedure will be held accountable for the errors that may occur. The organization growing due to customers’ growth and the risk of surpassing the clients’ demands should be exploited. This can be done by the company ensuring that all the services provided meet or exceed the customers’ expectations and needs. The company should take advantage of the situation and increase their production and service delivery. This can also be done by regularly improving their service delivery and products in order to maintain the clients as well as attracting some more. This will boost the company’s profit margins and enable it to efficiently achieve its set goals. The risk of developing superior software should be enhanced. The enhancement will increase the chances of the company developing another software hence customer satisfaction which will in turn help in the growth of the company. This will be beneficial in the company’s strategy in that it will bolster its development and thus the achievement of its visions, goals, and objectives (Kim, 2010). The risk of fraud and hacking from hackers can be mitigated by putting in place firmware that would help in preventing hacking and fraud. Additionally, It experts from the company should supervise and monitor cyber security on regular basis. Supervision and monitoring will help in a case where suspicion is detected the IT experts will respond accordingly. The risk of losing clients to competitors can be a huge threat to the
  • 25. company. Therefore the company should mitigate the risk by improving its services as well as improving their customer service. Risk of interference of the development process by the client can be avoided by providing only the products or services that meet the needs of the clients and being open t clients only after the development is completed. Risk of Compromise on quality of the final product can be reduced. The project should be developed sticking to the plan, budget and ensuring that it is delivered on time. When a project is completed with the right procedures and measures, there is a minimal chance of the final product getting compromised. Risk of growing the organization’s profit gain should be shared. In this case, as noted by Kang, & Kim (2016), the company should consider sharing the opportunity with partners and suppliers in order to minimize the resources and increase the profit margins which in turn help boost the company’s growth. Risk breakdown structure In order to adequately understand and curb as well as minimize the risks from occurring, there is a need for a risk breakdown structure. A risk breakdown structure will help in providing an insight as well as the intensity of the risk. Technical · Scope Definition · Requirements Definition · Technical processes · design Management Risk · Project Management · Organization · Communication · Health and Safety Commercial Risk · Contractual · Procurement
  • 26. · Subcontractors · Client External Risk · Legislation · Competitors · Political References Kang, H. W., & Kim, Y. S. (2016). Analysis of the probabilistic cost variation ranges according to the effect of core quantitative risk factors for an overseas plant project: Focused on a Middle East gas plant project. KSCE Journal of Civil Engineering, 20(2), 509-518. Kendrick, T. (2015). Identifying and managing project risk: essential tools for failure-proofing your project. AMACOM Div American Mgmt Assn. Kim, Y. S. (2010). A study on the costs variation range through the risk factors for overseas plant projects. Journal of The Architectural Institute of Korea, 26(7), 139-147. In Bérard, C., & In Teyssier, C. (2017). Risk management: Lever for SME development and stakeholder value creation. Población, G. F. J. (2017). Financial Risk Management: Identification, Measurement and Management. Seth, C. (2015). Swot analysis. Namur: 50minutes. Virine, L., & Trumper, M. (2017). Project risk analysis made ridiculously simple. Barkley, B. (2004). Project risk management. New York: McGraw-Hill. Jackson, P. (2006). Nonprofit risk management and contingency planning : done in a day strategies. Hoboken, N.J: Wiley. Lewis, J. (2007). Fundamentals of project management. New York: American Management Association. Gregory, G. (2007). Project management. Oxford: Pergamon Flexible Learning. Young, T. (2006). Successful project management. London Philadelphia: Kogan Page Ltd