SlideShare a Scribd company logo
Risk Identification
Risk Identification
• Introduction
Projects function in an environment that is filled with uncertainty.
Concerning project funding, the availability of necessary resources,
shifting client expectations, potential technical issues, etc., there is
uncertainty. Project risks are based on this unpredictability, which
necessitates the use of risk management.
Risk Management Stages
a)Risk Identification for EMC Web Design Project.
• Incorrect Deadlines Set by a Client
• Generic Specification
• The Client Is Not Available to the Dev Team
• The Client Requires Too Much Communication
• Working in Offshore Teams Within the Same Time Zone
• Working in Separate Time Zones
• Compromising on Design
• Lack of Developers
• Unstable Workload
• No Testing
• No Post-Go-Live Support
• Not Choosing the Right Technology
• Integration of Popular Technologies
• Integration of New, Unproven Technologies
• Working on Existing Source Code
1.Incorrect Deadlines Set by a Client
It frequently happens that a business analyst from the client's side has
established deadlines that are far harsher than the technical team from
the vendor's side anticipated. As a result, the vendor's team must put
in extra time or hire more personnel not included in the original
contract.
2. Generic Specification
There is a potential that a few features will be excluded from the project's scope if the project's specification is
too ambiguous or too limited. Because of this, additional project requirements will be introduced as the
project is being developed, deadlines will be missed, and overtime hours will accumulate, all of which will
undermine team morale.
3. The Client Is Not Available to the Dev Team
The client must ensure that the requirements are correctly understood by
the development team as a project develops and that his expectations are
met. If there is insufficient communication between the two parties, there
may be delays in both providing the outcome and notifying about obstacles.
4. The Client Requires Too Much Communication
Active communication can also backfire if it occurs too frequently. It could result in pointless conversations, lengthy
technical explanations to non-technical persons, and going nowhere.
5. Working in Offshore Teams Within the Same Time Zone
This business risk has a small effect. Both teams may have different ideas
about how the product should be used if their technical leaders are strong.
• 6. Working in Separate Time Zones
Here is where there is a significant increase in risk. Teams are expected
to work together during the brief period when their working hours
coincide. For instance, 9 AM in New York corresponds to 5 PM in
Belarus, therefore there is a two to four hour time difference between
the teams. Overtime typically results from this.
7. Compromising on Design
Frequently, teams rush into performing "real" development activities
instead of taking the necessary steps in the design phase. However, the
entire process is a waste of dev hours without sufficient planning,
prototyping, and information architecture construction.
• 8. Lack of Developers
When resources are scarce, developers occasionally have to work on
numerous projects simultaneously. Bug-fixing tasks may divert
developers if a previous project's maintenance term is also still in
progress.
9. Unstable Workload
It is challenging to switch between the context of the two projects if
our workload is less than four hours per day per employee. When
crucial problems arise on two projects at once, the risk increases.
• 10. No Testing
Some clients want to avoid paying for QA by having developers test the
project on their own.
11. No Post-Go-Live Support
Once the project is online, the vendor's team frequently stops offering support or concentrates on the most
important problems, leaving smaller problems out of scope.
12. Not Choosing the Right Technology
During the project's discovery phase, selecting the technology stack and implementation team is perhaps the
most important choice you'll make. Each team possesses core expertise or experience in particular industries,
technologies, or products. One of the most common risks associated with custom software is relying too
heavily on a certain popular technology.
• 13. Integration of Popular Technologies
Integrations with third-party systems, plugins, or content management systems pose the majority of
vulnerabilities. If your staff is familiar with and comfortable using these tools and technology, the risk is
minimal. Popular libraries frequently have a strong community behind them, making it simple to find fixes for
emerging problems.
14. Integration of New, Unproven Technologies
A new technology may significantly raise the risk. You shouldn't expect the team to handle software integration
risks as rapidly as they do known ones.
15. Working on Existing Source Code
It's quite perilous to take over a project that's already been started using the existing source code. To boost
efficiency, the team must examine the source code, evaluate its quality, and pinpoint the components that
need to be refactored. In order to comprehend the project's overall flow, the team should also grasp it from
the perspective of its users.
Risk Assessment
• Introduction-
When conducting a qualitative risk analysis, the
probability/consequence matrix approach is a well-known method of
evaluating risk severity and can evaluate risks at all levels of the firm.
The probability/consequence matrix is a useful tool for assessing
hazards according to their seriousness by estimating their probable
consequences. This enables you to identify the key contributing causes
to each potential risk in addition to helping businesses better assess
the overall severity of a risk.
Risk Response
• Risk Response
• The risk response planning involves determiningways to Eliminateor reduced any threats to the project, and also the opportunities to increase their impact. Project Team should work to eliminate the threats before they occur. Similarly, the project managers should work to ensure that opportunities occur. Likewise, the project manager is also responsible to decrease the probabilityand
impact of threats and increase the probabilityand impact of opportunities.
• For the threats that cannot be mitigated, the project manager needs to have a robust contingency plan and also a response plan if contingencies do not work.
• It is not required to eliminateall the risks of the project due to resource and time constraints. A project manager should review risk throughout the project. Planning for risks is iterative. Qualitativerisk, quantitative risk, and risk response planning do not end ones you begin work on the project.
• Risk Response Strategies
• Avoid – eliminate the threat to protect the project from the impact of the risk. An example of this is cancelling the project.
• Transfer – shifts the impact of the threat to as third party, together with ownership of the response. An example of this is insurance.
• Mitigate – act to reduce the probability of occurrence or the impact of the risk. An example of this is choosing a different supplier.
• Accept – acknowledge the risk, but do not take any action unless the risk occurs. An example of this is documenting the risk and putting aside funds in case the risk occurs.
• There are also four possible risk responses strategies for positive risks, or opportunities:
1. Exploit – eliminate the uncertainty associated with the risk to ensure it occurs. An example of this is assigning the best workers to a project to reduce time to complete.
2. Enhance – increases the probability or the positive impacts of an opportunity. An example of this adding more resources to finish early.
3. Share – allocating some or all of the ownership of the opportunity to a third party. An example of this is teams.
4. Acceptance – being willing to take advantage of the opportunity if it arises but not actively pursuing it. An example of this is documenting the opportunity and calculating benefit if the opportunity occurs.
Risk Register

More Related Content

Similar to Presentation-RA-R1-30-10-2022.pptx

Software risk analysis and management
Software risk analysis and managementSoftware risk analysis and management
Software risk analysis and management
ONE BCG
 
PM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.pptPM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.ppt
jonathaspereira
 
PM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.pptPM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.ppt
Scribdfamily
 
PM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.pptPM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.ppt
Adrian Yap
 
PM-Risks-and-Constraints (1).ppt
PM-Risks-and-Constraints (1).pptPM-Risks-and-Constraints (1).ppt
PM-Risks-and-Constraints (1).ppt
Madhav Murthy Nedunuri
 
Risk response planning.pptx
Risk response planning.pptxRisk response planning.pptx
Risk response planning.pptx
SaranSaravanan22
 
Risk: the Elephant in the Room
Risk: the Elephant in the RoomRisk: the Elephant in the Room
Risk: the Elephant in the Room
Last Call Media
 
Risk MAnagement PResentations .pptx
Risk MAnagement PResentations .pptxRisk MAnagement PResentations .pptx
Risk MAnagement PResentations .pptx
MukeshV22
 
Top Project Management Best Practices.pdf
Top Project Management Best Practices.pdfTop Project Management Best Practices.pdf
Top Project Management Best Practices.pdf
Orangescrum
 
9 Common Challenges in the Software Development Process
9 Common Challenges in the Software Development Process9 Common Challenges in the Software Development Process
9 Common Challenges in the Software Development Process
Sattrix Software Solutions
 
Project Management online sample (1) (1).pptx
Project Management online sample (1) (1).pptxProject Management online sample (1) (1).pptx
Project Management online sample (1) (1).pptx
StanleyChabata1
 
Lab01.pptx
Lab01.pptxLab01.pptx
Lab01.pptx
KaushikDuvvuri
 
Possible errors in projects and methods of avoiding and eliminating
Possible errors in projects and methods of avoiding and eliminatingPossible errors in projects and methods of avoiding and eliminating
Possible errors in projects and methods of avoiding and eliminating
SefaKOCAKALAY
 
Risk Management
Risk ManagementRisk Management
Risk Management
Narendra Pankaj
 
Project management (A Basic Approach)
Project management (A Basic Approach)Project management (A Basic Approach)
Project management (A Basic Approach)
Jed Concepcion
 
How to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdfHow to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdf
Vrinsoft Technology
 
Project management
Project managementProject management
Project management
satya pal
 
The art of execution
The art of executionThe art of execution
The art of execution
Crystal Taggart
 
Top Ten Reasons For Project Failure - PMP Webinar
Top Ten Reasons For Project Failure - PMP WebinarTop Ten Reasons For Project Failure - PMP Webinar
Top Ten Reasons For Project Failure - PMP Webinar
Whizlabs
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project Management
Najmul Hussain
 

Similar to Presentation-RA-R1-30-10-2022.pptx (20)

Software risk analysis and management
Software risk analysis and managementSoftware risk analysis and management
Software risk analysis and management
 
PM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.pptPM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.ppt
 
PM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.pptPM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.ppt
 
PM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.pptPM-Risks-and-Constraints.ppt
PM-Risks-and-Constraints.ppt
 
PM-Risks-and-Constraints (1).ppt
PM-Risks-and-Constraints (1).pptPM-Risks-and-Constraints (1).ppt
PM-Risks-and-Constraints (1).ppt
 
Risk response planning.pptx
Risk response planning.pptxRisk response planning.pptx
Risk response planning.pptx
 
Risk: the Elephant in the Room
Risk: the Elephant in the RoomRisk: the Elephant in the Room
Risk: the Elephant in the Room
 
Risk MAnagement PResentations .pptx
Risk MAnagement PResentations .pptxRisk MAnagement PResentations .pptx
Risk MAnagement PResentations .pptx
 
Top Project Management Best Practices.pdf
Top Project Management Best Practices.pdfTop Project Management Best Practices.pdf
Top Project Management Best Practices.pdf
 
9 Common Challenges in the Software Development Process
9 Common Challenges in the Software Development Process9 Common Challenges in the Software Development Process
9 Common Challenges in the Software Development Process
 
Project Management online sample (1) (1).pptx
Project Management online sample (1) (1).pptxProject Management online sample (1) (1).pptx
Project Management online sample (1) (1).pptx
 
Lab01.pptx
Lab01.pptxLab01.pptx
Lab01.pptx
 
Possible errors in projects and methods of avoiding and eliminating
Possible errors in projects and methods of avoiding and eliminatingPossible errors in projects and methods of avoiding and eliminating
Possible errors in projects and methods of avoiding and eliminating
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Project management (A Basic Approach)
Project management (A Basic Approach)Project management (A Basic Approach)
Project management (A Basic Approach)
 
How to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdfHow to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdf
 
Project management
Project managementProject management
Project management
 
The art of execution
The art of executionThe art of execution
The art of execution
 
Top Ten Reasons For Project Failure - PMP Webinar
Top Ten Reasons For Project Failure - PMP WebinarTop Ten Reasons For Project Failure - PMP Webinar
Top Ten Reasons For Project Failure - PMP Webinar
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project Management
 

Recently uploaded

Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
narasimhamurthyh4
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Lviv Startup Club
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Boris Ziegler
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdfBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
daothibichhang1
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 

Recently uploaded (20)

Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdfBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 

Presentation-RA-R1-30-10-2022.pptx

  • 2. Risk Identification • Introduction Projects function in an environment that is filled with uncertainty. Concerning project funding, the availability of necessary resources, shifting client expectations, potential technical issues, etc., there is uncertainty. Project risks are based on this unpredictability, which necessitates the use of risk management.
  • 3. Risk Management Stages a)Risk Identification for EMC Web Design Project. • Incorrect Deadlines Set by a Client • Generic Specification • The Client Is Not Available to the Dev Team • The Client Requires Too Much Communication • Working in Offshore Teams Within the Same Time Zone • Working in Separate Time Zones • Compromising on Design • Lack of Developers • Unstable Workload • No Testing • No Post-Go-Live Support • Not Choosing the Right Technology • Integration of Popular Technologies • Integration of New, Unproven Technologies • Working on Existing Source Code
  • 4. 1.Incorrect Deadlines Set by a Client It frequently happens that a business analyst from the client's side has established deadlines that are far harsher than the technical team from the vendor's side anticipated. As a result, the vendor's team must put in extra time or hire more personnel not included in the original contract. 2. Generic Specification There is a potential that a few features will be excluded from the project's scope if the project's specification is too ambiguous or too limited. Because of this, additional project requirements will be introduced as the project is being developed, deadlines will be missed, and overtime hours will accumulate, all of which will undermine team morale.
  • 5. 3. The Client Is Not Available to the Dev Team The client must ensure that the requirements are correctly understood by the development team as a project develops and that his expectations are met. If there is insufficient communication between the two parties, there may be delays in both providing the outcome and notifying about obstacles. 4. The Client Requires Too Much Communication Active communication can also backfire if it occurs too frequently. It could result in pointless conversations, lengthy technical explanations to non-technical persons, and going nowhere. 5. Working in Offshore Teams Within the Same Time Zone This business risk has a small effect. Both teams may have different ideas about how the product should be used if their technical leaders are strong.
  • 6. • 6. Working in Separate Time Zones Here is where there is a significant increase in risk. Teams are expected to work together during the brief period when their working hours coincide. For instance, 9 AM in New York corresponds to 5 PM in Belarus, therefore there is a two to four hour time difference between the teams. Overtime typically results from this. 7. Compromising on Design Frequently, teams rush into performing "real" development activities instead of taking the necessary steps in the design phase. However, the entire process is a waste of dev hours without sufficient planning, prototyping, and information architecture construction.
  • 7. • 8. Lack of Developers When resources are scarce, developers occasionally have to work on numerous projects simultaneously. Bug-fixing tasks may divert developers if a previous project's maintenance term is also still in progress. 9. Unstable Workload It is challenging to switch between the context of the two projects if our workload is less than four hours per day per employee. When crucial problems arise on two projects at once, the risk increases.
  • 8. • 10. No Testing Some clients want to avoid paying for QA by having developers test the project on their own. 11. No Post-Go-Live Support Once the project is online, the vendor's team frequently stops offering support or concentrates on the most important problems, leaving smaller problems out of scope. 12. Not Choosing the Right Technology During the project's discovery phase, selecting the technology stack and implementation team is perhaps the most important choice you'll make. Each team possesses core expertise or experience in particular industries, technologies, or products. One of the most common risks associated with custom software is relying too heavily on a certain popular technology.
  • 9. • 13. Integration of Popular Technologies Integrations with third-party systems, plugins, or content management systems pose the majority of vulnerabilities. If your staff is familiar with and comfortable using these tools and technology, the risk is minimal. Popular libraries frequently have a strong community behind them, making it simple to find fixes for emerging problems. 14. Integration of New, Unproven Technologies A new technology may significantly raise the risk. You shouldn't expect the team to handle software integration risks as rapidly as they do known ones. 15. Working on Existing Source Code It's quite perilous to take over a project that's already been started using the existing source code. To boost efficiency, the team must examine the source code, evaluate its quality, and pinpoint the components that need to be refactored. In order to comprehend the project's overall flow, the team should also grasp it from the perspective of its users.
  • 10. Risk Assessment • Introduction- When conducting a qualitative risk analysis, the probability/consequence matrix approach is a well-known method of evaluating risk severity and can evaluate risks at all levels of the firm. The probability/consequence matrix is a useful tool for assessing hazards according to their seriousness by estimating their probable consequences. This enables you to identify the key contributing causes to each potential risk in addition to helping businesses better assess the overall severity of a risk.
  • 11.
  • 12. Risk Response • Risk Response • The risk response planning involves determiningways to Eliminateor reduced any threats to the project, and also the opportunities to increase their impact. Project Team should work to eliminate the threats before they occur. Similarly, the project managers should work to ensure that opportunities occur. Likewise, the project manager is also responsible to decrease the probabilityand impact of threats and increase the probabilityand impact of opportunities. • For the threats that cannot be mitigated, the project manager needs to have a robust contingency plan and also a response plan if contingencies do not work. • It is not required to eliminateall the risks of the project due to resource and time constraints. A project manager should review risk throughout the project. Planning for risks is iterative. Qualitativerisk, quantitative risk, and risk response planning do not end ones you begin work on the project. • Risk Response Strategies • Avoid – eliminate the threat to protect the project from the impact of the risk. An example of this is cancelling the project. • Transfer – shifts the impact of the threat to as third party, together with ownership of the response. An example of this is insurance. • Mitigate – act to reduce the probability of occurrence or the impact of the risk. An example of this is choosing a different supplier. • Accept – acknowledge the risk, but do not take any action unless the risk occurs. An example of this is documenting the risk and putting aside funds in case the risk occurs. • There are also four possible risk responses strategies for positive risks, or opportunities: 1. Exploit – eliminate the uncertainty associated with the risk to ensure it occurs. An example of this is assigning the best workers to a project to reduce time to complete. 2. Enhance – increases the probability or the positive impacts of an opportunity. An example of this adding more resources to finish early. 3. Share – allocating some or all of the ownership of the opportunity to a third party. An example of this is teams. 4. Acceptance – being willing to take advantage of the opportunity if it arises but not actively pursuing it. An example of this is documenting the opportunity and calculating benefit if the opportunity occurs.
  • 13.
  • 14.