The document discusses project risk management over 7 days. Day 5 focuses on project risk management and includes discussions of identifying risks, qualitative and quantitative risk analysis, and planning risk responses. Key topics covered are the importance of risk management, types of risks, tools for risk identification like brainstorming, risk breakdown structures, and risk registers to document risks.
UCISA Toolkit - Effective Risk Management for Business Change and IT Projects Mark Ritchie
Risk Management is one of the most important tools available to the Project Manager to help successfully deliver complex projects. Yet, at the same time, Risk Management can be difficult to understand and, if used without insight and expertise, costly and ineffective.
This guidance has been developed to assist staff who are managing or participating in IT and business change projects. It has been developed by the UCISA Project and Change Management Group and is based on best practice guidance provided by PRINCE2 and experience of delivering major IT and business change projects at the University of Sheffield, University of Edinburgh, Lancaster University and Edinburgh Napier University.
The guidance is relevant for projects being managed and delivered using any methodology and is complementary to the UCISA Major Project Governance Assessment Toolkit.
This toolkit was published by the UCISA Project and Change Management Group in December 2015.
This document provides an overview of project risk management. It defines risk management as identifying, evaluating, and preventing or mitigating risks that have the potential to impact project outcomes. It also discusses the benefits of risk management, which include helping achieve project success with fewer obstacles by saving resources, money, and time. Additionally, the document outlines the main categories of project risk as technical, external, organizational, and project management risks. It explains the difference between risks, which can be predicted and managed, and uncertainties, which cannot be predicted or quantified.
This chapter discusses project risk management for information technology projects. It covers the importance of risk management, the risk management process which includes planning, identification, analysis, response planning, and monitoring risks. It also discusses tools for risk analysis and common risks for IT projects. The goal is to minimize negative risks and maximize opportunities to help ensure project success.
This document provides an overview of communicative risk management using the RiskChallenger tool. It begins with an introduction to communicative risk management, which emphasizes sharing thoughts and having open discussions about risks. The document then describes the role of the RiskChallenger in facilitating communicative risk management by making risk discussions more visual and interactive. It outlines how the RiskChallenger works in practice, allowing users to create risks, vote on them anonymously, and see the results visualized. The goal is to make risk management more engaging and remove dominance from discussions.
لمشاهدة ملفات الفيديو
https://www.youtube.com/watch?v=Yq3nz9YaaUU&index=23&list=PL0CTRdzzWSMuvJ9nKHzyxGAYCapJMQ8_Y
للمتابعة في جروب المذاكرة
https://www.facebook.com/groups/PMP.SG
This document provides an overview of risk management concepts as defined in PRINCE2. It defines key risk management terms and outlines the steps in the PRINCE2 risk management procedure: identify, assess, plan, implement, and communicate. The document describes the purpose and components of a risk register, risk budget, risk responses, and roles and responsibilities in the risk management process. It also provides an example of how risk management is applied to an irrigation project.
UCISA Toolkit - Effective Risk Management for Business Change and IT Projects Mark Ritchie
Risk Management is one of the most important tools available to the Project Manager to help successfully deliver complex projects. Yet, at the same time, Risk Management can be difficult to understand and, if used without insight and expertise, costly and ineffective.
This guidance has been developed to assist staff who are managing or participating in IT and business change projects. It has been developed by the UCISA Project and Change Management Group and is based on best practice guidance provided by PRINCE2 and experience of delivering major IT and business change projects at the University of Sheffield, University of Edinburgh, Lancaster University and Edinburgh Napier University.
The guidance is relevant for projects being managed and delivered using any methodology and is complementary to the UCISA Major Project Governance Assessment Toolkit.
This toolkit was published by the UCISA Project and Change Management Group in December 2015.
This document provides an overview of project risk management. It defines risk management as identifying, evaluating, and preventing or mitigating risks that have the potential to impact project outcomes. It also discusses the benefits of risk management, which include helping achieve project success with fewer obstacles by saving resources, money, and time. Additionally, the document outlines the main categories of project risk as technical, external, organizational, and project management risks. It explains the difference between risks, which can be predicted and managed, and uncertainties, which cannot be predicted or quantified.
This chapter discusses project risk management for information technology projects. It covers the importance of risk management, the risk management process which includes planning, identification, analysis, response planning, and monitoring risks. It also discusses tools for risk analysis and common risks for IT projects. The goal is to minimize negative risks and maximize opportunities to help ensure project success.
This document provides an overview of communicative risk management using the RiskChallenger tool. It begins with an introduction to communicative risk management, which emphasizes sharing thoughts and having open discussions about risks. The document then describes the role of the RiskChallenger in facilitating communicative risk management by making risk discussions more visual and interactive. It outlines how the RiskChallenger works in practice, allowing users to create risks, vote on them anonymously, and see the results visualized. The goal is to make risk management more engaging and remove dominance from discussions.
لمشاهدة ملفات الفيديو
https://www.youtube.com/watch?v=Yq3nz9YaaUU&index=23&list=PL0CTRdzzWSMuvJ9nKHzyxGAYCapJMQ8_Y
للمتابعة في جروب المذاكرة
https://www.facebook.com/groups/PMP.SG
This document provides an overview of risk management concepts as defined in PRINCE2. It defines key risk management terms and outlines the steps in the PRINCE2 risk management procedure: identify, assess, plan, implement, and communicate. The document describes the purpose and components of a risk register, risk budget, risk responses, and roles and responsibilities in the risk management process. It also provides an example of how risk management is applied to an irrigation project.
This document discusses software risk management. It defines risk and explains that risk management consists of risk assessment and risk control. Risk assessment involves identifying risks and evaluating their potential effects, while risk control involves developing and implementing plans to resolve risks. The document outlines different types of software risks like project risks, process risks, and product risks. It emphasizes that software risk management is important given current business conditions and helps avoid problems. Successful risk management requires focusing on people, process, infrastructure, and implementation. The people factor involves participation and training, while the process involves identifying, analyzing, planning, tracking, and resolving risks. Infrastructure establishes organizational support through requirements, resources, and analyzing ROI.
This document discusses project risk and risk management. It defines project risk as any uncertainty that can negatively or positively impact project objectives. It notes that risk management involves identifying, analyzing, and responding to risks throughout the project life cycle. The document outlines the major steps in developing a risk management plan, including identifying risks, assessing their probability and impact, developing response strategies, and monitoring risks dynamically. It concludes that while risks cannot be eliminated, they can be managed to help complete projects successfully.
Information Technology Project Management - part 11Rizwan Khurram
This document discusses project risk management techniques. It covers planning risk management, identifying risks, performing qualitative and quantitative risk analysis, planning risk responses, and controlling risks. Qualitative techniques include probability/impact matrices and top ten risk tracking. Quantitative techniques include decision tree analysis, simulation, and sensitivity analysis. The goal of risk management is to minimize negative risks and maximize opportunities to help improve project success.
Software Project Risk Management Practice in OmanEECJOURNAL
Oman is a member of Gulf Cooperation Council (GCC). It is located in Southwest Asia and it has strategic significant boundaries, Overlooking the Arabian Sea, Gulf of Oman, and the Persian Gulf. It is the 80th in Global Innovation Index in 2019 and 63 in E-Government Development Index in 2018. Oman is an effective member of the Greater Arab Free Trade Agreement (GAFTA) and the World Trade Organization (WTO). Furthermore, Oman's government has continued efforts to develop local and foreign investments by signing a Free Trade Agreement (FTA) with the USA. Oman plays a significant role in investments due to its strategic location connected to the markets in the Gulf, the Middle East, Asia, and Africa. Oman's vision is to involve all new technologies to be always beside the developed countries. To achieve that, Oman established The Government Innovation Initiative to encourage government entities in creativity and introduce their suggestions to enhance governmental performance and enhance the efficiency in different fields. This is realized by involving modern technologies like the Internet of Things (IoT), Artificial Intelligence (AI), Cloud Computing, Virtual Reality Applications, and Blockchain. In Oman, the risk management approach is a core technique. Three major stages are applied systematically in risk management in software projects. These stages involve a) identifying the risk; b) analyzing and assessing the risk, and c) reaction to the risk. There is no doubt that the high risk belonged to business will have negative impacts on all of its participants. Wherefore, this paper sheds the light on that knowledge area. The aim of this paper is to review the present literature on risk management processes implemented in software projects. There is a dearth in the literature which covers the risk management area knowledge in Oman's organizations. This paper target finding out the commonly used frameworks or mechanisms in risk management in software projects. It also tries to collect the responses to state the various types of risk origins in the existing profit and non-profit organizations in Oman and to recognize the coming research trends in this area.
This document discusses project risk management and was presented by Mohamed Khalifa Hassan in January 2014. It defines risk management and outlines its benefits for project management. The key risk management processes include identifying risks, performing qualitative risk analysis to prioritize risks, planning risk responses, and monitoring and controlling risks. Specific tools for risk management are also covered, such as the risk register, probability and impact matrix, and developing risk response plans.
This document summarizes key processes for project planning. It discusses planning communication management to identify stakeholders' information needs and develop an effective communication plan. It also covers planning risk management to define the risk management approach and plan, identifying risks, qualitatively and quantitatively analyzing risks, and developing risk response strategies. Finally, it discusses other key planning processes like planning procurement management and stakeholder management.
This document discusses project risk management. It states that risk management is important for project success as it helps select good projects, determine appropriate scope, and develop realistic estimates. While crisis management receives more attention, effective risk management results in fewer problems overall and more efficient resolution of issues. The goal of risk management is to minimize potential negative risks and maximize potential positive risks. Key aspects of risk management include planning, identification, analysis, response planning, and control throughout the project life cycle.
Episode 25 : Project Risk Management
Understand what risk is and the importance of good project risk management.
Discuss the elements involved in risk management planning and the contents of a risk management plan.
List common sources of risks in engineering and information technology projects.
Describe the risk identification process, tools, and techniques to help identify project risks, and the main output of risk identification, a risk register.
SAJJAD KHUDHUR ABBAS
Chemical Engineering , Al-Muthanna University, Iraq
Oil & Gas Safety and Health Professional – OSHACADEMY
Trainer of Trainers (TOT) - Canadian Center of Human
Development
Webinar - Building Team Efficiency and EffectivenessInvensis Learning
Wouldn’t it be great if you could get to better ideas faster? If you learn to master just two thinking skills, you can! Many of the PMI supported tools have origins in creativity. As such, these tools are best leveraged when you apply divergent thinking (to generate) or convergent thinking (to narrow). This session will explore the principles of divergent and convergent thinking and provide examples of techniques to maximize their power in decision making, problem solving and performance feedback.
The document discusses various aspects of project risk management for information technology projects. It covers planning risk management, identifying risks, performing qualitative and quantitative risk analysis, planning risk responses, and controlling risks. Specific techniques discussed include using probability/impact matrices to prioritize risks, top ten risk item tracking to monitor key risks, decision trees to evaluate risk events, and Monte Carlo simulation to statistically model risk outcomes. The overall goal is to systematically manage risks throughout the project life cycle to help improve chances of project success.
What You Will Learn
After this one-hour session, learners will be able to:
Demonstrate to others how the risk management processes in A Guide to the Project Management Body of Knowledge (PMBOK® Guide) apply to your project’s environment
Differentiate between Project and Program Risk Management and understand how they support one another
Speaker
Keith is a Senior Consultant, Trainer and Coach with over 25 years of successful management and consulting experience and business planning. Keith is a leader in Agile training, coach and transitioning to Agile and is well known for his public speaking skills and enthusiasm and has been a welcomed facilitator at numerous fortune 500 corporations, universities, and associations worldwide. He is engaging, energetic, entertaining and informative.
The document discusses risk management for projects. It defines risk as any uncertain event or condition that could positively or negatively impact a project's objectives. It notes that through risk management, a project manager can identify potential problems, take actions to prevent or minimize risks, and stay in control of the project. The document outlines the key steps in risk management as identifying risks, analyzing them, planning responses, implementing responses, and monitoring risks. It also discusses different ways to handle risks, such as avoiding, mitigating, transferring, accepting, or escalating risks.
Risk Management is an important component of project management. it all start with the planning stage to the execution stage. There is no way a project can be implemented without strong foundations of risk management. The slides expounds the subject of risk management on sidelines of the project management like a rod and staff
MBA 6941, Managing Project Teams 1 Course Learning Ou.docxaryan532920
This document provides an overview of project risk management for a course on managing project teams. It defines project risk and describes how risks can positively or negatively impact project objectives. It then outlines the key processes in project risk management: plan risk management, identify risks, perform qualitative and quantitative risk analysis, plan risk responses, and control risks. The document explains these processes and their associated outputs. Finally, it discusses risk factors, risk attitudes, risk tolerance, and provides a suggested reading on how project risk management is helping organizations succeed.
The role of Risk Assessment and Risk Management is to continuously Identify, Analyze, Plan, Track, Control, and Communicate the risks associated with a project.
The Webster’s definition of risk is the possibility of suffering a loss. Risk in itself is not bad. Risk is essential to progress and failure is often a key part of learning. Managing risk is a key part of success.
This document describes the foundations for conducting a risk assessment of a large-scale system development project. Such a project will likely include the procurement of Commercial Off The Shelf (COTS) products as well as their integration with legacy systems.
Risk management Phase 1-5 Individual Project
Table of Contents
Introduction 3
Project Outline 3
Project risk identification 4
Project risk assessment 6
Project Risks, Responses Strategy 7
Project Risks Monitoring & Control Plan 10
Project Risks WBS & Budget Updates 11
Project Risks, Communications Plan 11
References 12
Introduction
The project that is planned by the company is to divest and move into a global perspective. Let’s ay for instance a possible expansion in the expansion of an oil refinery plant, such as a sulphur plant, my project will be to research Savage Gulf Sulphur Services. The project is supposed to ensure that the company will generate more revenue, and then it shall move into a global perspective. With the project, the company shall also increase its production due to large demand generated by the new market in the globe. Every project is faced with a certain degree of risk in the activities that it takes in an organization. It is important for organizations should carry out risk assessment procedures that are inclined in ensuring that an effective strategy shall be formulated to eliminate risk. This paper will discuss the risk management strategy and the processes that are taken in the management of risk in an organizational structure.
Project Outline
The project is it intended to increase the organized capacity and move into the global market structure. This will involve the purchase of new factors of production such as land, investors and business owners invest large amounts of capital to such investments. The project will also
Risk management justification
Risk management is identified and can be described as an assesment that has all these prioritization of risks, the management of risk could involve precise coordination and ecomonical application strategies with ereasons to minimize, control and monitor the probability and impact of unfortunate events. Risk management also helps in maximization and the act of realization of opportunities. In an organizational structure, risk management has a variety of functions which makes it an important department in an organization, based on the many roles that the risk management. This is the implementation of a strong and effective risk management and controls within securities firm, a helps in promoting stability throughout the entire firm. Risk management controls are divided into two categories. The internal and external control categories help in providing useful and effective control systems. The internal controls help in protecting the firms against market, credit, operational and legal risks. Secondly, it helps in protecting the financial industry from all the systemic risks in the organization structure (Merna, 2008)
Risk management is useful in protecting the firm's customers from enormous and large non-market related losses such as misappropriation of resources, fraud and firm failure. Such failures can result in enormous risk in the organization. R ...
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITYAshim Sharma
All types of organizations face with the some forms of risks, which may affect their chance of success. Understanding the risks and effectively managing these will greatly help the organizations in achieving the long term success. Risk management can be an important tool to eliminate potential problem in an organization. As a project manager or team member, we have to manage risk on a daily basis; it’s one of the most important things to do.
Final Class Presentation on Determining Project Stakeholders & Risks.pptxGeorgeKabongah2
“A person or group of people who have a vested interest in the success of an organization or project and the environment in which the organization/ project operates”
As per PMBOK - "The whole point of undertaking a project is to achieve or establish something new, to venture, to take chances, to risk. Risk may have positive effects or negative effects on the project “Schedule” and/or “Cost”. Positive risks are Opportunities and negative risks are losses or threats; remember both risks are uncertain “percentage of occurrence less than 80%”. Risk Management purpose is to manage (Plan and implement) these uncertainties.
The document discusses project management methodologies, specifically comparing traditional waterfall and agile approaches. It provides details on waterfall, including its sequential phases of requirements, design, implementation, and test. Agile methodologies are described as iterative with short development cycles. The Scrum framework is then explained in depth, covering its roles of Product Owner, Scrum Master, and team, along with artifacts like the Product Backlog, Sprint Backlog, and burndown chart. Key Scrum meetings like the Sprint Planning, daily standup, and Sprint Review meetings are also outlined.
The document provides an outline for a project management course. It includes details on the topics that will be covered each day, including project integration management, scope management, schedule management, cost management, risk management, and Scrum. The focus of the specific section summarized is on project cost management. It defines key processes involved in project cost management like planning, estimating, budgeting, controlling, and managing costs. Formulas for earned value management are also provided to measure project performance and forecast estimates.
This document discusses software risk management. It defines risk and explains that risk management consists of risk assessment and risk control. Risk assessment involves identifying risks and evaluating their potential effects, while risk control involves developing and implementing plans to resolve risks. The document outlines different types of software risks like project risks, process risks, and product risks. It emphasizes that software risk management is important given current business conditions and helps avoid problems. Successful risk management requires focusing on people, process, infrastructure, and implementation. The people factor involves participation and training, while the process involves identifying, analyzing, planning, tracking, and resolving risks. Infrastructure establishes organizational support through requirements, resources, and analyzing ROI.
This document discusses project risk and risk management. It defines project risk as any uncertainty that can negatively or positively impact project objectives. It notes that risk management involves identifying, analyzing, and responding to risks throughout the project life cycle. The document outlines the major steps in developing a risk management plan, including identifying risks, assessing their probability and impact, developing response strategies, and monitoring risks dynamically. It concludes that while risks cannot be eliminated, they can be managed to help complete projects successfully.
Information Technology Project Management - part 11Rizwan Khurram
This document discusses project risk management techniques. It covers planning risk management, identifying risks, performing qualitative and quantitative risk analysis, planning risk responses, and controlling risks. Qualitative techniques include probability/impact matrices and top ten risk tracking. Quantitative techniques include decision tree analysis, simulation, and sensitivity analysis. The goal of risk management is to minimize negative risks and maximize opportunities to help improve project success.
Software Project Risk Management Practice in OmanEECJOURNAL
Oman is a member of Gulf Cooperation Council (GCC). It is located in Southwest Asia and it has strategic significant boundaries, Overlooking the Arabian Sea, Gulf of Oman, and the Persian Gulf. It is the 80th in Global Innovation Index in 2019 and 63 in E-Government Development Index in 2018. Oman is an effective member of the Greater Arab Free Trade Agreement (GAFTA) and the World Trade Organization (WTO). Furthermore, Oman's government has continued efforts to develop local and foreign investments by signing a Free Trade Agreement (FTA) with the USA. Oman plays a significant role in investments due to its strategic location connected to the markets in the Gulf, the Middle East, Asia, and Africa. Oman's vision is to involve all new technologies to be always beside the developed countries. To achieve that, Oman established The Government Innovation Initiative to encourage government entities in creativity and introduce their suggestions to enhance governmental performance and enhance the efficiency in different fields. This is realized by involving modern technologies like the Internet of Things (IoT), Artificial Intelligence (AI), Cloud Computing, Virtual Reality Applications, and Blockchain. In Oman, the risk management approach is a core technique. Three major stages are applied systematically in risk management in software projects. These stages involve a) identifying the risk; b) analyzing and assessing the risk, and c) reaction to the risk. There is no doubt that the high risk belonged to business will have negative impacts on all of its participants. Wherefore, this paper sheds the light on that knowledge area. The aim of this paper is to review the present literature on risk management processes implemented in software projects. There is a dearth in the literature which covers the risk management area knowledge in Oman's organizations. This paper target finding out the commonly used frameworks or mechanisms in risk management in software projects. It also tries to collect the responses to state the various types of risk origins in the existing profit and non-profit organizations in Oman and to recognize the coming research trends in this area.
This document discusses project risk management and was presented by Mohamed Khalifa Hassan in January 2014. It defines risk management and outlines its benefits for project management. The key risk management processes include identifying risks, performing qualitative risk analysis to prioritize risks, planning risk responses, and monitoring and controlling risks. Specific tools for risk management are also covered, such as the risk register, probability and impact matrix, and developing risk response plans.
This document summarizes key processes for project planning. It discusses planning communication management to identify stakeholders' information needs and develop an effective communication plan. It also covers planning risk management to define the risk management approach and plan, identifying risks, qualitatively and quantitatively analyzing risks, and developing risk response strategies. Finally, it discusses other key planning processes like planning procurement management and stakeholder management.
This document discusses project risk management. It states that risk management is important for project success as it helps select good projects, determine appropriate scope, and develop realistic estimates. While crisis management receives more attention, effective risk management results in fewer problems overall and more efficient resolution of issues. The goal of risk management is to minimize potential negative risks and maximize potential positive risks. Key aspects of risk management include planning, identification, analysis, response planning, and control throughout the project life cycle.
Episode 25 : Project Risk Management
Understand what risk is and the importance of good project risk management.
Discuss the elements involved in risk management planning and the contents of a risk management plan.
List common sources of risks in engineering and information technology projects.
Describe the risk identification process, tools, and techniques to help identify project risks, and the main output of risk identification, a risk register.
SAJJAD KHUDHUR ABBAS
Chemical Engineering , Al-Muthanna University, Iraq
Oil & Gas Safety and Health Professional – OSHACADEMY
Trainer of Trainers (TOT) - Canadian Center of Human
Development
Webinar - Building Team Efficiency and EffectivenessInvensis Learning
Wouldn’t it be great if you could get to better ideas faster? If you learn to master just two thinking skills, you can! Many of the PMI supported tools have origins in creativity. As such, these tools are best leveraged when you apply divergent thinking (to generate) or convergent thinking (to narrow). This session will explore the principles of divergent and convergent thinking and provide examples of techniques to maximize their power in decision making, problem solving and performance feedback.
The document discusses various aspects of project risk management for information technology projects. It covers planning risk management, identifying risks, performing qualitative and quantitative risk analysis, planning risk responses, and controlling risks. Specific techniques discussed include using probability/impact matrices to prioritize risks, top ten risk item tracking to monitor key risks, decision trees to evaluate risk events, and Monte Carlo simulation to statistically model risk outcomes. The overall goal is to systematically manage risks throughout the project life cycle to help improve chances of project success.
What You Will Learn
After this one-hour session, learners will be able to:
Demonstrate to others how the risk management processes in A Guide to the Project Management Body of Knowledge (PMBOK® Guide) apply to your project’s environment
Differentiate between Project and Program Risk Management and understand how they support one another
Speaker
Keith is a Senior Consultant, Trainer and Coach with over 25 years of successful management and consulting experience and business planning. Keith is a leader in Agile training, coach and transitioning to Agile and is well known for his public speaking skills and enthusiasm and has been a welcomed facilitator at numerous fortune 500 corporations, universities, and associations worldwide. He is engaging, energetic, entertaining and informative.
The document discusses risk management for projects. It defines risk as any uncertain event or condition that could positively or negatively impact a project's objectives. It notes that through risk management, a project manager can identify potential problems, take actions to prevent or minimize risks, and stay in control of the project. The document outlines the key steps in risk management as identifying risks, analyzing them, planning responses, implementing responses, and monitoring risks. It also discusses different ways to handle risks, such as avoiding, mitigating, transferring, accepting, or escalating risks.
Risk Management is an important component of project management. it all start with the planning stage to the execution stage. There is no way a project can be implemented without strong foundations of risk management. The slides expounds the subject of risk management on sidelines of the project management like a rod and staff
MBA 6941, Managing Project Teams 1 Course Learning Ou.docxaryan532920
This document provides an overview of project risk management for a course on managing project teams. It defines project risk and describes how risks can positively or negatively impact project objectives. It then outlines the key processes in project risk management: plan risk management, identify risks, perform qualitative and quantitative risk analysis, plan risk responses, and control risks. The document explains these processes and their associated outputs. Finally, it discusses risk factors, risk attitudes, risk tolerance, and provides a suggested reading on how project risk management is helping organizations succeed.
The role of Risk Assessment and Risk Management is to continuously Identify, Analyze, Plan, Track, Control, and Communicate the risks associated with a project.
The Webster’s definition of risk is the possibility of suffering a loss. Risk in itself is not bad. Risk is essential to progress and failure is often a key part of learning. Managing risk is a key part of success.
This document describes the foundations for conducting a risk assessment of a large-scale system development project. Such a project will likely include the procurement of Commercial Off The Shelf (COTS) products as well as their integration with legacy systems.
Risk management Phase 1-5 Individual Project
Table of Contents
Introduction 3
Project Outline 3
Project risk identification 4
Project risk assessment 6
Project Risks, Responses Strategy 7
Project Risks Monitoring & Control Plan 10
Project Risks WBS & Budget Updates 11
Project Risks, Communications Plan 11
References 12
Introduction
The project that is planned by the company is to divest and move into a global perspective. Let’s ay for instance a possible expansion in the expansion of an oil refinery plant, such as a sulphur plant, my project will be to research Savage Gulf Sulphur Services. The project is supposed to ensure that the company will generate more revenue, and then it shall move into a global perspective. With the project, the company shall also increase its production due to large demand generated by the new market in the globe. Every project is faced with a certain degree of risk in the activities that it takes in an organization. It is important for organizations should carry out risk assessment procedures that are inclined in ensuring that an effective strategy shall be formulated to eliminate risk. This paper will discuss the risk management strategy and the processes that are taken in the management of risk in an organizational structure.
Project Outline
The project is it intended to increase the organized capacity and move into the global market structure. This will involve the purchase of new factors of production such as land, investors and business owners invest large amounts of capital to such investments. The project will also
Risk management justification
Risk management is identified and can be described as an assesment that has all these prioritization of risks, the management of risk could involve precise coordination and ecomonical application strategies with ereasons to minimize, control and monitor the probability and impact of unfortunate events. Risk management also helps in maximization and the act of realization of opportunities. In an organizational structure, risk management has a variety of functions which makes it an important department in an organization, based on the many roles that the risk management. This is the implementation of a strong and effective risk management and controls within securities firm, a helps in promoting stability throughout the entire firm. Risk management controls are divided into two categories. The internal and external control categories help in providing useful and effective control systems. The internal controls help in protecting the firms against market, credit, operational and legal risks. Secondly, it helps in protecting the financial industry from all the systemic risks in the organization structure (Merna, 2008)
Risk management is useful in protecting the firm's customers from enormous and large non-market related losses such as misappropriation of resources, fraud and firm failure. Such failures can result in enormous risk in the organization. R ...
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITYAshim Sharma
All types of organizations face with the some forms of risks, which may affect their chance of success. Understanding the risks and effectively managing these will greatly help the organizations in achieving the long term success. Risk management can be an important tool to eliminate potential problem in an organization. As a project manager or team member, we have to manage risk on a daily basis; it’s one of the most important things to do.
Final Class Presentation on Determining Project Stakeholders & Risks.pptxGeorgeKabongah2
“A person or group of people who have a vested interest in the success of an organization or project and the environment in which the organization/ project operates”
As per PMBOK - "The whole point of undertaking a project is to achieve or establish something new, to venture, to take chances, to risk. Risk may have positive effects or negative effects on the project “Schedule” and/or “Cost”. Positive risks are Opportunities and negative risks are losses or threats; remember both risks are uncertain “percentage of occurrence less than 80%”. Risk Management purpose is to manage (Plan and implement) these uncertainties.
Similar to Project Management Day 5 Risk R02.pdf (20)
The document discusses project management methodologies, specifically comparing traditional waterfall and agile approaches. It provides details on waterfall, including its sequential phases of requirements, design, implementation, and test. Agile methodologies are described as iterative with short development cycles. The Scrum framework is then explained in depth, covering its roles of Product Owner, Scrum Master, and team, along with artifacts like the Product Backlog, Sprint Backlog, and burndown chart. Key Scrum meetings like the Sprint Planning, daily standup, and Sprint Review meetings are also outlined.
The document provides an outline for a project management course. It includes details on the topics that will be covered each day, including project integration management, scope management, schedule management, cost management, risk management, and Scrum. The focus of the specific section summarized is on project cost management. It defines key processes involved in project cost management like planning, estimating, budgeting, controlling, and managing costs. Formulas for earned value management are also provided to measure project performance and forecast estimates.
The document discusses project schedule management processes including plan schedule management, define activities, sequence activities, estimate activity resources, and estimate activity durations. It provides details on each process, including inputs, tools and techniques, and outputs. The key steps are decomposing work into activities, defining relationships between activities, estimating resource needs and duration of each activity, and developing a project schedule network diagram.
The document outlines a 7-day project management training course. Day 1 covers an introduction to project integration management. Later days cover additional topics like scope, schedule, cost, risk management and Scrum. The course aims to help participants understand key project management principles, processes, knowledge areas and the role of the project manager. It emphasizes the importance of integrating all project efforts, balancing scope, time and cost constraints, and addressing stakeholder needs.
The document outlines the course schedule for a 7-day project management training. Day 2 focuses on project scope management. It defines key scope management terms and processes. The presentation covers planning scope management, collecting requirements, defining the scope statement, creating the work breakdown structure (WBS), and validating scope. Tools for collecting requirements and creating the WBS are also discussed.
This document provides guidance on writing a business plan. It explains that a business plan clarifies the feasibility of a business idea by evaluating the potential market, management team, and profitability. It also communicates the idea to investors and provides the basis for securing financing. The document outlines the typical sections of a business plan, including executive summary, business description, products/services, sales and marketing plan, operations plan, and financial projections. It emphasizes that a well-written business plan is important for gaining investor confidence and improving the chances of business success.
This document appears to be a presentation about cyber-physical systems and Industry 4.0. It includes definitions of cyber-physical systems and Industry 4.0, examples of companies implementing Industry 4.0 solutions, discussions of the Internet of Things, impacts of new technologies on the economy, business, society and individuals, and slides on various related topics without titles like applications, history, and use cases. The presentation touches on many aspects of emerging digital technologies and their integration with physical systems and processes.
This document discusses shear flow in aircraft structural design. It covers governing equations for shear flow calculations, case studies of shear flow in aircraft fuselages, and methods for calculating moments of inertia and shear flow. The document is a lecture on shear flow given by Dr. Mohamed Elfarran of Cairo University's Aerospace Engineering Department.
The document discusses analyzing the ultimate bending strength of an aircraft fuselage structure. It provides an example problem to calculate the ultimate bending moment of a fuselage cross section considering shear lag and inter-rivet buckling effects. The solution involves determining the effective area of structural elements through an iterative process accounting for stresses, strains, and shear lag factors. The example provides details of the fuselage geometry, materials, and step-by-step working to arrive at the ultimate bending moment and stringer forces.
This document discusses calculating the ultimate bending strength of a fuselage structure. It provides an example problem of determining stresses in the stringers and skin of a fuselage cross-section due to an applied bending moment. The solution involves iteratively calculating the neutral axis position and effective area through trial and error, starting with an initial assumption that all materials are effective in tension. The results of the first trial are then used to refine the model for a second trial. Comparing the results shows an error of 14% in the neutral axis position between the first and second trials.
The document discusses three cases of aircraft structural loading and the resulting stresses: 1) Pressurization of the fuselage shell, which induces longitudinal and circumferential stresses that depend on the material properties and geometry, 2) Torsional loading of the fuselage shell, which causes shear stresses proportional to the applied torque and cross-sectional properties, and 3) Bending loads on wing spars, which are resisted by shear stresses in the spar webs and normal stresses in the spar caps that depend on the bending moment and section properties.
This document discusses analyzing stresses on an unsymmetrical tapered fuselage structure due to applied loads. It provides an example problem to determine stringer stresses and forces at two stations, section 0 and section 30, given loads applied at station 150. The solution strategy is outlined, which involves using the general bending stresses equation and calculating the centroid position with respect to the Z and Y axes. Steps are shown for calculating stresses at each section.
This document discusses material properties and bending stresses. It defines key terms like modulus of elasticity, Poisson's ratio, yield stress, and ultimate tensile stress. It explains that plane sections remain plane after bending but rotate, and that the neutral axis experiences no deformation or stress. The location of the neutral axis depends on the material properties and loading conditions. Equations are provided to calculate bending stresses based on the neutral axis location and applied moment. An example problem calculates bending stresses at different points on an airplanes wing. The document also notes that for very high loads above the elastic range, stresses become nonlinear and the neutral axis must be determined through trial and error.
The document outlines a lecture on fuselage structural design. It discusses iterative methods for calculating effective width and radius of gyration of thin-walled structures. It also covers loads acting on the fuselage, fuselage structure components like stringers and frames, and examples of analyzing stresses in circular fuselage sections. The document concludes by mentioning that stress analysis of wings will be covered next.
This document discusses effective sheet width and inter-rivet buckling in aerospace structures. It explains that stringers stiffen wing and fuselage skins, and skins provide stiffness to stringers even when buckling. An effective width calculation accounts for this effect. The document also describes how inter-rivet buckling can occur if rivet spacing is too long, and provides equations to calculate the effective rivet spacing to prevent this issue.
The document discusses the design of aircraft fuselages. It notes that fuselages must house passengers and luggage with proper strength and light weight. Fuselages experience both distributed and concentrated loads from various sources. A circular cross-section is commonly used as it efficiently handles these loads. Fuselage structures typically consist of a thin-walled tube with transverse frames, stringers, and cutouts. The document provides an example problem calculating the ultimate bending strength of a circular fuselage cross-section made of aluminum with stringers of different sizes. It considers linear and nonlinear stress distributions to determine the maximum moment the fuselage can withstand before failure.
- The fuselage skin consists of curved sheet panels that can buckle if no stiffeners are present. Stiffener elements are needed to calculate and compare the buckling loads to the aircraft's ultimate loads.
- Buckling of aircraft structures like fuselage skins must be analyzed and prevented. Curved sheets and cylinders can buckle under compression, bending, shear, torsion and combined loads. Internal pressure increases the buckling strength.
- Design examples are provided to calculate buckling loads of circular cylinders and curved-stiffened sheets under various loading conditions and determine if panels would buckle. Buckling analysis ensures the structure can withstand required loads.
1. The document discusses stresses in thin-walled and thick-walled cylinders. For thin-walled cylinders, the stress is assumed to be uniform throughout the wall. For thick-walled cylinders, the stresses depend on the radius and include circumferential (hoop), radial, and longitudinal stresses.
2. Internally pressurized thick-walled cylinders experience maximum hoop stress and compressive radial stress at the inner surface. The hoop stress decreases and radial stress increases towards zero at the outer surface. Longitudinal stress is uniform across the wall.
3. Externally pressurized thick-walled cylinders experience minimum hoop stress and compressive radial stress at the outer surface
This document provides an overview of various gear types and gear terminology. It discusses spur gears, helical gears, bevel gears, worm gears, and compares their basic configurations. Key gear concepts covered include involute tooth profiles, conjugate action, pressure angle, pitch circle, circular pitch, diametral pitch, addendum, dedendum, interference, contact ratio, and gear forming/cutting methods. Standard tooth systems and proportions are also presented in tables.
This document provides an overview of helical spring design and analysis. It discusses stresses in helical springs, deflection calculations, compression spring types, stability, materials selection, static design considerations, critical frequencies, and examples. The chapters cover key topics like curvature effects, stresses from torsion and shear, deflection-force relationships, buckling analysis, material properties, recommended design ranges, and the wave equation for vibrational frequency.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
2. Dr Mohamed Elfarran
Course Outline
Day 1: Introduction + Project Integration Management.
Day 2: Project Scope Management.
Day 3: Project Schedule Management.
Day 4: Project Cost Management.
Day 5: Project Risk Management.
Day 6: Scrum.
Day 7: Final Presentation Day!
4. Dr Mohamed Elfarran
The Importance of Project Risk Management
Project risk management is the art and science of identifying, analyzing, and
responding to risk throughout the life of a project and in the best interests of
meeting project objectives
5
Information
Technology
5. Dr Mohamed Elfarran
Project Risk Management
Project Risk Management includes the process of conducting risk management plan,
identification, analysis, response planning, response implementation, and monitoring
risk on the project. The objectives of project risk management:
○ Increase the probability and/or impact of positive (opportunities) risks and
decrease the probability and/or impact of negative risks (threats), in order
to optimize the chance of Project success.
6
Project Management Institute, A Guide to the Project Management Body of Knowledge, (PMBOK® Guide) –
Sixth Edition, Project Management Institute, Inc., 2017, Page 395.
7. Dr Mohamed Elfarran
Integrating Risk with other project management functions
8
Project Risk
Scope
Communication
Time Procurement
Quality
Recourses
Cost
Integration
Life cycle
Enviro. Variables
Cost
Objectives
Availability
Productivity
Requirements
Standards
Time
Objectives
Services
Performance
Expectation Data
Exchange
Accuracy
8. Dr Mohamed Elfarran
Risk
● An uncertain event or condition that, if it occurs, has a Positive or
Negative effect on a project objective.
○ The severity of any risk can be defined in terms of two quantities:
■ Likelihood: The extent to which the risk effects are likely to
occur.
■ Impact (Consequence): The effect that a risk will have on
the project if it occurs.
9
10. Dr Mohamed Elfarran
Risk Levels
Risk exists at two levels within every project.
Each project contains individual risks that can affect the achievement of
project objectives.
It is also important to consider the riskiness of the overall project, which arises
from the combination of individual project risks and other sources of
uncertainty.
○ Individual Project Risk
○ Overall Project Risk
11
11. Dr Mohamed Elfarran
Risk Levels
● Individual Project Risk
○ Is an uncertain event or condition that, if it occurs, has a Positive or
Negative effect on one or more a project objective.
● Overall Project Risk
○ Is the effect of uncertainty on the project as a whole, arising from all
sources of uncertainty including individual risks, representing the
exposure of stakeholders to the implications of variations in project
outcome, both positive and negative.
12
12. Dr Mohamed Elfarran
Negative Risk
● A dictionary definition of risk is “the possibility of loss or
injury”
● Negative risk involves understanding potential problems
that might occur in the project and how they might impede
project success
13
Information
Technology
Negative risk Positive risk
13. Dr Mohamed Elfarran
Risk Can Be Positive
● Positive risks are risks that result in good things
happening; sometimes called opportunities
● A general definition of project risk is an uncertainty that
can have a negative or positive effect on meeting project
objectives
● The goal of project risk management is to minimize
potential negative risks while maximizing potential
positive risks
14
Information
Technology
14. Dr Mohamed Elfarran
Trends and emerging practices
● Project resilience (Flexibility)
○ Right level of budget and schedule contingency
○ Flexible project process
○ Empowered project team that has clear objective
○ Frequent review of early warning sign
○ Clear input from stakeholders
○ Integrated risk management
○ Program and portfolio
15
17. Dr Mohamed Elfarran
Plan Risk Management
Plan Risk Management
is the process of defining how to conduct risk management
activities for the project.
The key benefit of this process is that it ensures that the degree, type, and
visibility of risk management are proportionate to both risks and the
importance of the project to the organization and other stakeholders.
18
Project Management Institute, A Guide to the Project Management Body of Knowledge, (PMBOK® Guide) –
Sixth Edition, Project Management Institute, Inc., 2017, Page 401.
18. Dr Mohamed Elfarran
Plan Risk Management, Outputs
● Risk Management Plan
Describes how risk management activities will be structured and
performed, and it may include the following elements:
■ Risk strategy
Describes the general approached to mange the risk
■ Methodology
Defines the specific approaches, tools, and data sources that will be
used to perform risk management on the project. 19
19. Dr Mohamed Elfarran
Plan Risk Management, Outputs
■ Roles & Responsibilities
Defines the lead, support, and risk management team member for
each type of activities described in the risk management plan, and
clarifies their responsibility.
■ Funding
Identifies the funds needed to perform activities related to the project
risk management. Establishes protocols for the application of
contingency and management reserves. 20
20. Dr Mohamed Elfarran
Plan Risk Management, Outputs
■ Timing
Defines when and how often the risk management process will be
performed throughout the project life cycle
■ Risk categories
Provides a means for grouping individual project risk. A common way to
structure risk categories is a risk breakdown structure (RBS)
21
21. Dr Mohamed Elfarran
Plan Risk Management, Outputs
◼ Risk categories
Risks that may affect the project for better or worse can be identified and
organized into categories
22
Macro
Financial
Political
Market
Environment Target
Managerial
Project
Job Site
Procurement
Design
Act of God
Social
Technical
Funding
Control
Team
Contractual
23. Dr Mohamed Elfarran
Identify Risk
Identify Risk Is The Process of identifying individual project risks as well
as sources of overall project risk, and documenting their characteristics.
The key benefit of this process is the documentation of existing individual
project risks and the sources of overall project risk. It also bring
information so the project team can appropriately to identified risk.
24
Project Management Institute, A Guide to the Project Management Body of Knowledge, (PMBOK® Guide) –
Sixth Edition, Project Management Institute, Inc., 2017, Page 409.
24. Dr Mohamed Elfarran
Identify Risk
● Risk is doing business
25
External
Environment
project
Organization
Environment Significant
Factors
Location
of the
site Client Wars
25. Dr Mohamed Elfarran
Identify Risk, Tools & Tech
● Brainstorming is a technique by which a group attempts to generate ideas or
find a solution for a specific problem by amassing ideas spontaneously and
without judgment
● An experienced facilitator should run the brainstorming session
● Be careful not to overuse or misuse brainstorming.
○ Psychology literature shows that individuals produce a greater number of ideas working alone
than they do through brainstorming in small, face-to-face groups
○ Group effects often inhibit idea generation
26
Information
Technology
26. Dr Mohamed Elfarran
Risk Breakdown Structure
● A risk breakdown structure is a hierarchy of potential risk categories for a
project
● Similar to a work breakdown structure but used to identify and categorize
risks
27
27. Dr Mohamed Elfarran
Figure 11-4. Sample Risk Breakdown Structure
28
Information Technology Project Management, Sixth Edition
28. Dr Mohamed Elfarran
Figure 11-4. Sample Risk Breakdown Structure
29
Information Technology Project Management, Sixth Edition
29. Dr Mohamed Elfarran
Table 11-4. Potential Negative Risk Conditions Associated with Each Knowledge
Area
30
30. Dr Mohamed Elfarran
Identify Risk, Tools & Tech.
SWOT Analysis
○ This technique examines the project from each of the strengths,
weaknesses, opportunities, and threats.
31
31. Dr Mohamed Elfarran
Identify Risk, Tools & Tech.
● Delphi Technique
○ The Delphi Technique is used to derive a consensus among a panel of experts who make
predictions about future developments
○ Provides independent and anonymous input regarding future events
○ Uses repeated rounds of questioning and written responses and avoids the biasing effects
possible in oral methods, such as brainstorming
32
32. Dr Mohamed Elfarran
Identify Risk, Tools & Tech.
● Prompt Risk
○ A prompt risk is a predetermined list of risk that might give rise
to individual risk and that could also act as sources of overall risk.
The risk categories in the lowest level of the risk breakdown
structure can be used as a prompt list for individual project risk.
● Meetings
○ Often call a risk workshop
33
33. Dr Mohamed Elfarran
Identify Risk, Output
34
● The main output of the risk identification process is a list of identified
risks and other information needed to begin creating a risk register
● A risk register is:
○ A document that contains the results of various risk management processes
and that is often displayed in a table or spreadsheet format
○ A tool for documenting potential risk events and related information
● Risk events refer to specific, uncertain events that may occur to the
detriment or enhancement of the project
34. Dr Mohamed Elfarran
Risk Register Contents
● An identification number for each risk event
● A rank for each risk event
● The name of each risk event
● A description of each risk event
● The category under which each risk event falls
● The root cause of each risk
● Triggers for each risk; triggers are indicators or symptoms of actual risk events
● Potential responses to each risk
● The risk owner or person who will own or take responsibility for each risk
● The probability and impact of each risk occurring.
● The status of each risk
35
Information
Technology
35. Dr Mohamed Elfarran
Table 11-5. Sample Risk Register
36
Information Technology Project Management, Seventh Edition
• No.: R44
• Rank: 1
• Risk: New customer
• Description: We have never done a project for this organization
before and don’t know too much about them. One of our company’s
strengths is building good customer relationships, which often leads
to further projects with that customer. We might have trouble working
with this customer because they are new to us.
• Category: People risk
• Etc.
39. Dr Mohamed Elfarran
Perform Qualitative Risk Analysis
Perform Qualitative Risk Analysis Is the process of prioritizing
individual project risk for further analysis or actions by assessing the
probability of occurrence and impact and as well as other characteristics.
The key benefit of this process is that it focuses efforts on high priority
risks.
40
Project Management Institute, A Guide to the Project Management Body of Knowledge, (PMBOK® Guide) –
Sixth Edition, Project Management Institute, Inc., 2017, Page 419.
41. Dr Mohamed Elfarran
Output
● Top Ten Risk Item Tracking is a qualitative risk analysis tool that helps to
identify risks and maintain an awareness of risks throughout the life of a
project
● Establish a periodic review of the top ten project risk items
● List the current ranking, previous ranking, number of times the risk appears
on the list over a period of time, and a summary of progress made in
resolving the risk item
42
Information
Technology
43. Dr Mohamed Elfarran
Output
● A watch list is a list of risks that are low priority, but are still identified as
potential risks
● Qualitative analysis can also identify risks that should be evaluated on a
quantitative basis
44
Information
Technology
44. Dr Mohamed Elfarran
Perform Quantitative Risk Analysis
Perform Quantitative Risk Analysis is the process of numerically
analyzing the combined effect of identified individual project risks and
other sources of uncertainty on overall project objective. The key benefit
of this process is that it quantifies overall project risk exposure, and it can
also provide additional quantitative risk information to support risk
response planning.
45
Project Management Institute, A Guide to the Project Management Body of Knowledge, (PMBOK® Guide) –
Sixth Edition, Project Management Institute, Inc., 2017, Page 428.
45. Dr Mohamed Elfarran
Perform Quantitative Risk Analysis
This Process used technique such as Monte Carlo Simulation and Decision
Tree Analysis to:
○ Quantify the possible outcomes for the project and their probabilities.
○ Assess the probability of achieving specific project objectives.
○ Identify risks requiring the most attention by quantifying their relative
contribution to overall project risk.
○ Identify realistic and achievable cost, schedule or scope targets, given
the project risks.
○ Determine the best project management decision when some
conditions or outcomes are uncertain.
46
49. Dr Mohamed Elfarran
Perform Quantitative Risk Analysis, Tools & Tech.
● Expected Monetary Value (EMV)
● Expected Payoff for good market = 80,000*0.15 + 50,000*0.45 = LE 34,500
● Expected Payoff for good quality = 80,000*0.15 + 20,000*0.25 = LE 17,000
● EMV = 80,000*0.15 + 50,000*0.45 +20,000*0.25 + (-20,000)*0.15 = LE 36,500
50
Probability %
Payoff
Status
15
80,000
Good Market – Good Quality
45
50,000
Good Market – Poor Quality
25
20,000
Poor Market – Good Quality
15
-20,000
Poor Market – Poor Quality
50. Dr Mohamed Elfarran
Perform Quantitative Risk Analysis, Tools & Tech.
● Simulation uses a representation or model of a system to analyze the
expected behavior or performance of the system
● Monte Carlo analysis simulates a model’s outcome many times to provide a
statistical distribution of the calculated results
● To use a Monte Carlo simulation, you must have three estimates (most likely,
pessimistic, and optimistic) plus an estimate of the likelihood of the estimate
being between the most likely and optimistic values
51
Information
Technology
52. Dr Mohamed Elfarran
Perform Quantitative Risk Analysis, Tools & Tech.
● Sensitivity analysis is a technique used to show the effects of changing one
or more variables on an outcome
● For example, many people use it to determine what the monthly payments for
a loan will be given different interest rates or periods of the loan, or for
determining break-even points based on different assumptions
● Spreadsheet software, such as Excel, is a common tool for performing
sensitivity analysis
53
Information
Technology
53. Dr Mohamed Elfarran
Perform Quantitative Risk Analysis, Tools & Tech.
● Sensitivity Analysis
■ Helps to determine which individual project risks or other
sources of uncertainty have the most potential impact on the
project outcomes
■ Involve making all risk variables at their baseline and study
impact on the project objectives when on variable is changed
54
57. Dr Mohamed Elfarran
Plan Risk Responses
The process of developing options selecting strategies, and agreeing on
actions to address overall project risk exposure, as well as to treat
individual project risk. The key benefit of this process is that it identifies
appropriate way to address overall project risk and individual project risk.
58
Project Management Institute, A Guide to the Project Management Body of Knowledge, (PMBOK® Guide) –
Sixth Edition, Project Management Institute, Inc., 2017, Page 437.
58. Dr Mohamed Elfarran
Plan Risk Responses
● Risk response should be:
○ Appropriate to the significance of the risk
○ Cost effective in meeting the challenge
○ Realistic within the project context
○ Agreed upon by all parties involved
○ Owned by a responsible person
59
63. Dr Mohamed Elfarran
Plan Risk Responses
● Residual Risk
The risks that remain after risk responses have been implemented.
● Secondary Risk
The risks that arise as a direct result of implementing a risk response.
64
65. Dr Mohamed Elfarran
Implement Risk Responses
Implement Risk Responses is the process of implementing agreed upon
risk response plans. The key benefit of this process is that it ensures that
the agreed upon risk responses are executed as planned in order to
address overall project risk exposure, minimize individual project threats,
and maximize individual project opportunities.
66
Project Management Institute, A Guide to the Project Management Body of Knowledge, (PMBOK® Guide) –
Sixth Edition, Project Management Institute, Inc., 2017, Page 449.
67. Dr Mohamed Elfarran
Monitor Risk
Monitor risk is the process of monitoring the implementation of agreed upon
response plan, tracking identified risks, identifying and analyzing new risks,
and evaluating risk process effectiveness throughout the project.
The key benefit of this process is that it enable project decisions to be based
on current information about overall project risk exposure and individual
project risk.
68
*This definition is taken from the Glossary of the Project Management Institute, A Guide to the Project Management
Body of Knowledge, (PMBOK® Guide) – Sixth Edition, Project Management Institute, Inc., 2017.
68. Dr Mohamed Elfarran
Monitor Risk
The Monitor Risk processes uses performance information generated
during project execution to determine if:
○ Implemented risk responses are effective
○ Level of overall project risk has changed
○ Status of identified individual project risk has changes
○ New individual project risk have arisen
○ Risk management approach is still appropriate
69
69. Dr Mohamed Elfarran
Monitor Risk
○ Project assumptions are still valid
○ Risk management policies and procedures are being followed
○ Contingency reserves for cost or schedule require modified
○ Project strategy is still valid
70