SlideShare a Scribd company logo
1 of 54
Project Risk Management 
Dr. A.K.Panigrahi 
1
2
3
What is Risk? 
• Risk is the possibility of suffering loss 
• Risk is a measure of the probability and 
consequence of not achieving a defined 
project goal. 
• Possible – but not certain, so it is 
expressed as probability 
• Risks change though out the life of a 
project 
• Loss - is any unwanted consequence that 
might occur 4
Risk in Projects 
• In a development project, the loss 
describes the impact to the project which 
could be in the form of diminished quality 
of the end product, increased costs, 
delayed completion, or failure. 
5
6 
Possible Risks in a Project 
• Creeping user requirements 
• Excessive schedule pressure 
• Low quality 
• Cost overruns 
• Poor estimates 
• Low customer satisfaction 
• Long schedules
Project Risk 
Project Risk 
Scope 
Integration 
Communication 
Human Resources 
Cost 
Procurement 
Quality 
Time
The Importance of Project Risk Management 
• Project risk management is the art and science of 
identifying, analyzing, and responding to risk throughout the 
life of a project and in the best interests of meeting project 
objectives 
• Risk management is often overlooked in projects, but it can 
help improve project success by helping select good 
projects, determining project scope, and developing realistic 
estimates 
• Unfortunately, crisis management has higher visibility due to 
the obvious danger to the success of the project but it’s risk 
management that helps a project have fewer problems to 
begin with. 
8
9
Risk Can Be Positive 
• Positive risks are risks that result in good 
things happening; sometimes called 
opportunities 
• A general definition of project risk is an 
uncertainty that can have a negative or 
positive effect on meeting project objectives 
• The goal of project risk management is to 
minimize potential negative risks while 
maximizing potential1 0positive risks
11 
Risk Management 
• Risk management is the act or practice of 
dealing with risk. 
• Risk management is proactive rather than 
reactive. 
• Risk management is not a separate 
activity but rather on aspect of sound 
project management.
Elements of Risk Management 
• Effective Risk Management is made up of: 
– Risk Assessment: identify, analyze, prioritize 
– Risk Control: planning, resolution, monitoring 
RISK 
ASSESSMENT 
12 
RISK 
MANAGEMENT 
RISK 
CONTROL 
IDENTIFICATION 
ANALYSIS 
PRIORITIZATION 
PLANNING 
RESOLUION 
MONITORING
13 
Common Mistakes in Risk 
Management 
• Not understanding the benefits of Risk 
Management 
• Not providing adequate time or resources 
for Risk Management 
• Not identifying and assessing risk using a 
standardized approach
Project Risk Management 
Processes 
• Risk management planning: deciding how 
to approach and plan the risk management 
activities for the project 
• Risk identification: determining which risks 
are likely to affect a project and documenting 
the characteristics of each 
• Qualitative risk analysis: prioritizing risks 
based on their probability and impact of 
occurrence 14
Project Risk Management Processes 
• Quantitative risk analysis: numerically estimating 
the effects of risks on project objectives 
• Risk response planning: taking steps to enhance 
opportunities and reduce threats to meeting project 
objectives 
• Risk monitoring and control: monitoring 
identified and residual risks, identifying new risks, 
carrying out risk response plans, and evaluating 
the effectiveness of risk strategies throughout the 
life of the project 
15
Project Risk Management 
Summary 
16
Risk Management 
• Four Main Steps 
Risk 
Identification 
Risk 
Risk Response 
Development 
Assessment 
Risk Response 
Control 
• Before these activities? 
Plan Risk Management Process 
17
Risk Identification 
• The possible risk is determined by a number of 
interrelated factors such as: 
– Nature of the Project 
– Aggressive or Conservative Schedule/Budget 
– Skills and motivation of the Project Team 
18
19 
Risk Identification 
• The need to proactively identify risks. 
– When an event happens it is too late to plan. 
• Tools for identifying risk 
– Brainstorming 
– Nominal Group Technique 
• Each member identifies their ideas 
• Each member writes an idea on the board until all 
ideas are listed
20 
Risk Identification 
• The group discusses each idea 
• Each individual ranks each of the ideas 
• The group then ranks all the ideas 
• Each individual ranks all the ideas again 
• Rankings are summarized 
– Delphi technique 
• Experts asked individually to provide input 
• Input summarized and distributed 
• Experts rank input
21 
Risk Identification 
– Strength, Weakness, Opportunities, Threats 
– Cause and effect diagrams 
– Past Projects
Likelihood 
• What is the likelihood of risk? 
– Expressed as a Probability (Percentage) 
– Example – There is a 5% chance of a programmer 
breaking their big toe whilst coding in any 6 month 
period 
22
Impact 
• What impact will it have on the project? 
– Example – A broken toe on average results in the loss of 20 
working days for a programmer 
– Expected Value of Loss/Profit 
• Expected Value = Loss/Profit x Likelihood 
• -20 x 0.05 = -1 
• So we will lose 1 day of coding per programmer on a 6 month 
project 
23
Urgency 
• How urgently do we need to deal with it? 
– Immediate remedy or Can it wait? 
– Additional means of prioritising action 
24
Example Risk Assessment 
Team Conflict and Injuries 
Description: Teammates in the group might have conflicts with one another 
throughout the semester. Injuries might result from conflict, accidents, 
and other mishaps throughout the semester. 
How to 
Avoid It: 
If any of the teammates show signs of conflict against one another, we 
need to mediate between them in order to make our team working 
smoothly and such throughout the whole semester. Thus that will reduce 
a factor for injury. However, for the other factors of injury, we need to 
make sure that we take good care of ourselves such that no harm will 
befall upon us (such as carpal tunnel syndrome, leg breaking, finger 
breaking, etc). 
What It Will 
Affect: 
If there is a large enough conflict, we might lose some teammates. 
Same with for injuries, if the injury is bad enough to cause teammates to 
not be able to work on the project. 
Possible 
Likelihood: 
3/100 chance 
The Real World Lab: http://www.cc.gatech.edu/classes/RWL/Web/ 
25
Quantifying Risk 
• Programmer has 5% chance of breaking toe in 
any 6 month period 
– Broken toe results in the loss of 20 programmer days 
– Cost of a programmer-day = £500 
• Expected Loss per year due to broken toes 
– 2 x (0.05 x -20) = -2 days 
– Expected loss = -£1000 
26
Techniques 
• Risk Map/Probability Impact Matrix 
• Hazard Control Matrix 
• Payoff Matrix 
• Decision Tree 
27
Risk Map 
Likelihood of Occurrence 
High Medium Low 
Large 
Medium 
Scale of impact 
Small 
28
Likelihood of Occurrence 
High Medium Low 
Large 
Medium 
Scale of impact 
Small 
Risk Map 
29
Risk Map 
Likelihood of Occurrence 
High Medium Low 
Large 
Medium 
Scale of impact 
Small 
A B 
C 
D 
30
Risk Map 
• List the risks in 
order of priority 
• What else can we 
use to help 
prioritise? 
Likelihood of Occurrence 
High Medium Low 
Large 
Medium 
Scale of impact 
Small 
A B 
C 
D 
31
Hazard Control Matrix 
From Curtis, G (1998) "Business Information Systems" Addison Wesley 
Errors 
and 
omissions 
Lost data 
and 
documents 
Computer 
Failure 
Unauthorized 
Access 
Fire Fraud 
Input 
controls 
Processing 
controls 
Output 
controls 
Storage 
controls 
Operating 
system 
controls 
Records 
management 
Accounting 
controls 
Contingency 
plan 
Physical 
security 
32
Hazard Control Matrix 
From Curtis, G (1998) "Business Information Systems" Addison Wesley 
Errors 
and 
omissions 
Lost data 
and 
documents 
Computer 
Failure 
Unauthorized 
Access 
Fire Fraud 
Input 
controls 
Processing 
controls 
Output 
controls 
Storage 
controls 
Operating 
system 
controls 
Records 
management 
Accounting 
controls 
Contingency 
plan 
Physical 
security 
33
Hazard Control Matrix 
From Curtis, G (1998) "Business Information Systems" Addison Wesley 
Errors 
and 
omissions 
Lost data 
and 
documents 
Computer 
Failure 
Unauthorized 
Access 
Fire Fraud 
Input 
controls 
 
Processing 
controls 
 
Output 
controls 
 
Storage 
controls 
Operating 
system 
controls 
Records 
management 
 
Accounting 
controls 
 
Contingency 
plan 
Physical 
security 
34
Hazard Control Matrix 
From Curtis, G (1998) "Business Information Systems" Addison Wesley 
Errors 
and 
omissions 
Lost data 
and 
documents 
Computer 
Failure 
Unauthorized 
Access 
Fire Fraud 
Input 
controls 
    
Processing 
controls 
  
Output 
controls 
    
Storage 
controls 
  
Operating 
system 
controls 
  
Records 
management 
   
Accounting 
controls 
   
Contingency 
plan 
  
Physical 
security 
   
35
Identification and Assessment 
• Problems 
– Not a particularly interesting task 
– Needs experience to do well 
• Are these good reasons to not do it? 
36
Risk Response Development 
• How are we going to deal with risks when they 
occur? 
– What about those we weren’t expecting? 
37
38 
Risk Response Planning 
• Who is going to detect when the risk 
occurs? 
• Who has the responsibility to respond and 
communicate? 
• What is the response?
Risk Response Planning 
• After identifying and quantifying risks, you 
must decide how to respond to them 
• Four main response strategies for negative 
risks: 
– Risk avoidance 
– Risk acceptance 
– Risk transference 
– Risk mitigation 
39
Risk Management Planning 
Risk Response Definitions 
• Avoidance – Changing a project 
objective to eliminate the threat posed 
by an adverse risk event.
Risk Management Planning 
Risk Response Definitions 
• Transference – Shifting the negative 
impact of a threat, along with the 
ownership of the response, to a third 
party.
Risk Management Planning 
Risk Response Definitions 
• Mitigation – Reducing the Probability or 
Impact of an adverse risk event (threat) 
to an acceptable threshold.
Risk Management Planning 
Risk Response Definitions 
• Acceptance – The project team decides 
not to change project objectives to deal 
with the risk. 
• Passive acceptance: no action , deal with threats as they occur 
(workarounds) 
• Active acceptance: establish a contingency reserve to handle risks
44 
Risk Strategies 
• Factors impacting the strategy 
– Impact of the risk 
– Project constraints 
– Tolerances 
• Strategy 
– Accept or Ignore 
• Provide reserves 
– Contingency plans 
• Natural disaster/backup plans
45 
Risk Strategies 
– Avoidance, eliminate the risk 
– Mitigate, lessen the impact of the risk 
• Performance impact, provide extra hardware 
– Transfer the risk 
• Offsite backup planning 
• Server farms 
• Outside management
46 
Risk Monitoring and Control 
• Risk monitoring 
– Determine who is responsible for monitoring 
– How are risks monitored? 
• Project tracking, resources, quality, etc 
– Communicating the status of identified risks 
• Reviews and Audits 
• Once a risk is identified as occurring 
– Communicate 
– Take action
Control Systems 
• Preventive Control 
– Stops undesirable events (disturbances) from 
occurring (see Curtis, 1998 Chapter 8) 
• Feedback Control 
– Doesn’t attempt to prevent unpredictable 
disturbances 
– Is able to recover from effects 
• Systems will usually combine both 
47
Risk Control 
• Goals of Control 
– Prevention 
– Detection 
– Minimise Loss 
– Recovery 
– Investigation 
H. A. Simon 
• Risk Response 
– Avoidance 
• Prevention 
– Mitigation 
• Transfer 
– Acceptance 
Cadle and Yeates 
48
Risk Response Control 
• Implement Risk Responses 
• Identify new Risks 
– Implement new responses 
49
50 
Risk Response and Evaluation 
• Trigger the defined risk response plan 
– Identify the risk owner 
– Assign resources 
– Understand the impacts 
• PERTs, Dependencies 
• Communicate 
• Evaluate once action is taken 
– Is more action needed? 
– What additional risks are triggered?
Risk Register 
• Can be used to keep information about identified 
risks 
– Title and description 
– Risk Status - e.g. candidate, live, closed 
– Potential impact 
– Risk owner 
– Actions 
– Action Log 
51
Risk Ownership 
• Risk owner is someone who: 
– Has sufficient information concerning the risk 
– Has the necessary resources to do something 
about the risk 
– Possesses the authority to do something 
about the risk 
52
Don’t take the risk if... 
• the organization cannot afford to lose. 
• the exposure to the outcome is too great. 
• the situation (or project) is not worth it. 
• the odds are not in the project’s favor. 
• the benefits are not clearly identified. 
• there appear to be a large number of acceptable 
alternatives. 
53
Don’t take the risk if... 
• the risk does not achieve the project objective. 
• the expected value from baseline assumptions is 
negative. 
• the data is unorganized, without structure or 
pattern. 
• there is not enough data to understand the 
results. 
• a contingency plan for recovery is not in place 
should the results prove unsatisfactory. 
54

More Related Content

What's hot

Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk ManagementKaustubh Gupta
 
Risk Management
Risk ManagementRisk Management
Risk ManagementSaqib Raza
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk ManagementHayat Denzi
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentationRaven Morgan
 
The Art and Science Behind Successful Risk Workshops
The Art and Science Behind Successful Risk WorkshopsThe Art and Science Behind Successful Risk Workshops
The Art and Science Behind Successful Risk WorkshopsAcumen
 
Download risk management workshop
Download   risk management workshopDownload   risk management workshop
Download risk management workshopBestoutcome
 
Construction Risk Summit "benefit and pits of Construction Risk Management"
Construction Risk Summit   "benefit and pits of Construction Risk Management"Construction Risk Summit   "benefit and pits of Construction Risk Management"
Construction Risk Summit "benefit and pits of Construction Risk Management"bfriday
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk ManagementSAJJAD KHUDHUR ABBAS
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategiesDebashishDas49
 
Project Management Risks Review
Project Management Risks ReviewProject Management Risks Review
Project Management Risks ReviewDavid Tennant
 
Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Dhamo daran
 
Presentation manage risk
Presentation manage riskPresentation manage risk
Presentation manage riskMichael Curtis
 
Software testing - Risk management
Software testing - Risk managementSoftware testing - Risk management
Software testing - Risk managementPractiTest
 
Technical Risk Management
Technical Risk ManagementTechnical Risk Management
Technical Risk ManagementGlen Alleman
 

What's hot (20)

Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk Management
 
Project Management 05
Project Management 05Project Management 05
Project Management 05
 
Risk management
Risk managementRisk management
Risk management
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentation
 
Project Risk
Project RiskProject Risk
Project Risk
 
The Art and Science Behind Successful Risk Workshops
The Art and Science Behind Successful Risk WorkshopsThe Art and Science Behind Successful Risk Workshops
The Art and Science Behind Successful Risk Workshops
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Download risk management workshop
Download   risk management workshopDownload   risk management workshop
Download risk management workshop
 
Construction Risk Summit "benefit and pits of Construction Risk Management"
Construction Risk Summit   "benefit and pits of Construction Risk Management"Construction Risk Summit   "benefit and pits of Construction Risk Management"
Construction Risk Summit "benefit and pits of Construction Risk Management"
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategies
 
Project Management Risks Review
Project Management Risks ReviewProject Management Risks Review
Project Management Risks Review
 
Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Projectriskmanagement pmbok5
Projectriskmanagement pmbok5
 
Presentation manage risk
Presentation manage riskPresentation manage risk
Presentation manage risk
 
Basic risk management presentation 17th june 2015
Basic risk management presentation 17th june 2015Basic risk management presentation 17th june 2015
Basic risk management presentation 17th june 2015
 
Software testing - Risk management
Software testing - Risk managementSoftware testing - Risk management
Software testing - Risk management
 
Risk management
Risk managementRisk management
Risk management
 
Technical Risk Management
Technical Risk ManagementTechnical Risk Management
Technical Risk Management
 

Similar to Project Risk management

project_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptproject_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptBetshaTizazu2
 
Project Risk mgt ch3 supplimentary.ppt n
Project Risk mgt ch3 supplimentary.ppt nProject Risk mgt ch3 supplimentary.ppt n
Project Risk mgt ch3 supplimentary.ppt nKevin117905
 
Risk management concepts and learning
Risk management   concepts and learningRisk management   concepts and learning
Risk management concepts and learningVanita Ahuja
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.pptavisha23
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.pptAyidAlmgati
 
PMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptPMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptDorraLamouchi1
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementNajmul Hussain
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptYasirShaikh34
 
Risk Management Best Practices
Risk Management Best PracticesRisk Management Best Practices
Risk Management Best PracticesPMILebanonChapter
 
A Guide to Risk Management
A Guide to Risk ManagementA Guide to Risk Management
A Guide to Risk ManagementProjectCon
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk ManagementGoutama Bachtiar
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)ShudipPal
 
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Association for Project Management
 
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfdddddddddddddddddddddddddddddddddddddddddddddddSPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfdddddddddddddddddddddddddddddddddddddddddddddddShepherdChidambaeh
 
Critical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_enCritical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_enVyacheslav Guzovsky
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk ManagementNimat Khattak
 
Software Risk Management updated.ppt
Software Risk Management updated.pptSoftware Risk Management updated.ppt
Software Risk Management updated.pptumairshams6
 

Similar to Project Risk management (20)

project_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptproject_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.ppt
 
Project Risk mgt ch3 supplimentary.ppt n
Project Risk mgt ch3 supplimentary.ppt nProject Risk mgt ch3 supplimentary.ppt n
Project Risk mgt ch3 supplimentary.ppt n
 
Risk management concepts and learning
Risk management   concepts and learningRisk management   concepts and learning
Risk management concepts and learning
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
 
PMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptPMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.ppt
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project Management
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
 
Risk Management Best Practices
Risk Management Best PracticesRisk Management Best Practices
Risk Management Best Practices
 
A Guide to Risk Management
A Guide to Risk ManagementA Guide to Risk Management
A Guide to Risk Management
 
Project risk analysis
Project risk analysisProject risk analysis
Project risk analysis
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
 
bpm-risk-analysis
bpm-risk-analysisbpm-risk-analysis
bpm-risk-analysis
 
Ch_1_PRM.pdf
Ch_1_PRM.pdfCh_1_PRM.pdf
Ch_1_PRM.pdf
 
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
 
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfdddddddddddddddddddddddddddddddddddddddddddddddSPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
 
Critical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_enCritical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_en
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Software Risk Management updated.ppt
Software Risk Management updated.pptSoftware Risk Management updated.ppt
Software Risk Management updated.ppt
 

Recently uploaded

Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756dollysharma2066
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio managementJunaidKhan750825
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxgeorgebrinton95
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 

Recently uploaded (20)

Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio management
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 

Project Risk management

  • 1. Project Risk Management Dr. A.K.Panigrahi 1
  • 2. 2
  • 3. 3
  • 4. What is Risk? • Risk is the possibility of suffering loss • Risk is a measure of the probability and consequence of not achieving a defined project goal. • Possible – but not certain, so it is expressed as probability • Risks change though out the life of a project • Loss - is any unwanted consequence that might occur 4
  • 5. Risk in Projects • In a development project, the loss describes the impact to the project which could be in the form of diminished quality of the end product, increased costs, delayed completion, or failure. 5
  • 6. 6 Possible Risks in a Project • Creeping user requirements • Excessive schedule pressure • Low quality • Cost overruns • Poor estimates • Low customer satisfaction • Long schedules
  • 7. Project Risk Project Risk Scope Integration Communication Human Resources Cost Procurement Quality Time
  • 8. The Importance of Project Risk Management • Project risk management is the art and science of identifying, analyzing, and responding to risk throughout the life of a project and in the best interests of meeting project objectives • Risk management is often overlooked in projects, but it can help improve project success by helping select good projects, determining project scope, and developing realistic estimates • Unfortunately, crisis management has higher visibility due to the obvious danger to the success of the project but it’s risk management that helps a project have fewer problems to begin with. 8
  • 9. 9
  • 10. Risk Can Be Positive • Positive risks are risks that result in good things happening; sometimes called opportunities • A general definition of project risk is an uncertainty that can have a negative or positive effect on meeting project objectives • The goal of project risk management is to minimize potential negative risks while maximizing potential1 0positive risks
  • 11. 11 Risk Management • Risk management is the act or practice of dealing with risk. • Risk management is proactive rather than reactive. • Risk management is not a separate activity but rather on aspect of sound project management.
  • 12. Elements of Risk Management • Effective Risk Management is made up of: – Risk Assessment: identify, analyze, prioritize – Risk Control: planning, resolution, monitoring RISK ASSESSMENT 12 RISK MANAGEMENT RISK CONTROL IDENTIFICATION ANALYSIS PRIORITIZATION PLANNING RESOLUION MONITORING
  • 13. 13 Common Mistakes in Risk Management • Not understanding the benefits of Risk Management • Not providing adequate time or resources for Risk Management • Not identifying and assessing risk using a standardized approach
  • 14. Project Risk Management Processes • Risk management planning: deciding how to approach and plan the risk management activities for the project • Risk identification: determining which risks are likely to affect a project and documenting the characteristics of each • Qualitative risk analysis: prioritizing risks based on their probability and impact of occurrence 14
  • 15. Project Risk Management Processes • Quantitative risk analysis: numerically estimating the effects of risks on project objectives • Risk response planning: taking steps to enhance opportunities and reduce threats to meeting project objectives • Risk monitoring and control: monitoring identified and residual risks, identifying new risks, carrying out risk response plans, and evaluating the effectiveness of risk strategies throughout the life of the project 15
  • 17. Risk Management • Four Main Steps Risk Identification Risk Risk Response Development Assessment Risk Response Control • Before these activities? Plan Risk Management Process 17
  • 18. Risk Identification • The possible risk is determined by a number of interrelated factors such as: – Nature of the Project – Aggressive or Conservative Schedule/Budget – Skills and motivation of the Project Team 18
  • 19. 19 Risk Identification • The need to proactively identify risks. – When an event happens it is too late to plan. • Tools for identifying risk – Brainstorming – Nominal Group Technique • Each member identifies their ideas • Each member writes an idea on the board until all ideas are listed
  • 20. 20 Risk Identification • The group discusses each idea • Each individual ranks each of the ideas • The group then ranks all the ideas • Each individual ranks all the ideas again • Rankings are summarized – Delphi technique • Experts asked individually to provide input • Input summarized and distributed • Experts rank input
  • 21. 21 Risk Identification – Strength, Weakness, Opportunities, Threats – Cause and effect diagrams – Past Projects
  • 22. Likelihood • What is the likelihood of risk? – Expressed as a Probability (Percentage) – Example – There is a 5% chance of a programmer breaking their big toe whilst coding in any 6 month period 22
  • 23. Impact • What impact will it have on the project? – Example – A broken toe on average results in the loss of 20 working days for a programmer – Expected Value of Loss/Profit • Expected Value = Loss/Profit x Likelihood • -20 x 0.05 = -1 • So we will lose 1 day of coding per programmer on a 6 month project 23
  • 24. Urgency • How urgently do we need to deal with it? – Immediate remedy or Can it wait? – Additional means of prioritising action 24
  • 25. Example Risk Assessment Team Conflict and Injuries Description: Teammates in the group might have conflicts with one another throughout the semester. Injuries might result from conflict, accidents, and other mishaps throughout the semester. How to Avoid It: If any of the teammates show signs of conflict against one another, we need to mediate between them in order to make our team working smoothly and such throughout the whole semester. Thus that will reduce a factor for injury. However, for the other factors of injury, we need to make sure that we take good care of ourselves such that no harm will befall upon us (such as carpal tunnel syndrome, leg breaking, finger breaking, etc). What It Will Affect: If there is a large enough conflict, we might lose some teammates. Same with for injuries, if the injury is bad enough to cause teammates to not be able to work on the project. Possible Likelihood: 3/100 chance The Real World Lab: http://www.cc.gatech.edu/classes/RWL/Web/ 25
  • 26. Quantifying Risk • Programmer has 5% chance of breaking toe in any 6 month period – Broken toe results in the loss of 20 programmer days – Cost of a programmer-day = £500 • Expected Loss per year due to broken toes – 2 x (0.05 x -20) = -2 days – Expected loss = -£1000 26
  • 27. Techniques • Risk Map/Probability Impact Matrix • Hazard Control Matrix • Payoff Matrix • Decision Tree 27
  • 28. Risk Map Likelihood of Occurrence High Medium Low Large Medium Scale of impact Small 28
  • 29. Likelihood of Occurrence High Medium Low Large Medium Scale of impact Small Risk Map 29
  • 30. Risk Map Likelihood of Occurrence High Medium Low Large Medium Scale of impact Small A B C D 30
  • 31. Risk Map • List the risks in order of priority • What else can we use to help prioritise? Likelihood of Occurrence High Medium Low Large Medium Scale of impact Small A B C D 31
  • 32. Hazard Control Matrix From Curtis, G (1998) "Business Information Systems" Addison Wesley Errors and omissions Lost data and documents Computer Failure Unauthorized Access Fire Fraud Input controls Processing controls Output controls Storage controls Operating system controls Records management Accounting controls Contingency plan Physical security 32
  • 33. Hazard Control Matrix From Curtis, G (1998) "Business Information Systems" Addison Wesley Errors and omissions Lost data and documents Computer Failure Unauthorized Access Fire Fraud Input controls Processing controls Output controls Storage controls Operating system controls Records management Accounting controls Contingency plan Physical security 33
  • 34. Hazard Control Matrix From Curtis, G (1998) "Business Information Systems" Addison Wesley Errors and omissions Lost data and documents Computer Failure Unauthorized Access Fire Fraud Input controls  Processing controls  Output controls  Storage controls Operating system controls Records management  Accounting controls  Contingency plan Physical security 34
  • 35. Hazard Control Matrix From Curtis, G (1998) "Business Information Systems" Addison Wesley Errors and omissions Lost data and documents Computer Failure Unauthorized Access Fire Fraud Input controls     Processing controls   Output controls     Storage controls   Operating system controls   Records management    Accounting controls    Contingency plan   Physical security    35
  • 36. Identification and Assessment • Problems – Not a particularly interesting task – Needs experience to do well • Are these good reasons to not do it? 36
  • 37. Risk Response Development • How are we going to deal with risks when they occur? – What about those we weren’t expecting? 37
  • 38. 38 Risk Response Planning • Who is going to detect when the risk occurs? • Who has the responsibility to respond and communicate? • What is the response?
  • 39. Risk Response Planning • After identifying and quantifying risks, you must decide how to respond to them • Four main response strategies for negative risks: – Risk avoidance – Risk acceptance – Risk transference – Risk mitigation 39
  • 40. Risk Management Planning Risk Response Definitions • Avoidance – Changing a project objective to eliminate the threat posed by an adverse risk event.
  • 41. Risk Management Planning Risk Response Definitions • Transference – Shifting the negative impact of a threat, along with the ownership of the response, to a third party.
  • 42. Risk Management Planning Risk Response Definitions • Mitigation – Reducing the Probability or Impact of an adverse risk event (threat) to an acceptable threshold.
  • 43. Risk Management Planning Risk Response Definitions • Acceptance – The project team decides not to change project objectives to deal with the risk. • Passive acceptance: no action , deal with threats as they occur (workarounds) • Active acceptance: establish a contingency reserve to handle risks
  • 44. 44 Risk Strategies • Factors impacting the strategy – Impact of the risk – Project constraints – Tolerances • Strategy – Accept or Ignore • Provide reserves – Contingency plans • Natural disaster/backup plans
  • 45. 45 Risk Strategies – Avoidance, eliminate the risk – Mitigate, lessen the impact of the risk • Performance impact, provide extra hardware – Transfer the risk • Offsite backup planning • Server farms • Outside management
  • 46. 46 Risk Monitoring and Control • Risk monitoring – Determine who is responsible for monitoring – How are risks monitored? • Project tracking, resources, quality, etc – Communicating the status of identified risks • Reviews and Audits • Once a risk is identified as occurring – Communicate – Take action
  • 47. Control Systems • Preventive Control – Stops undesirable events (disturbances) from occurring (see Curtis, 1998 Chapter 8) • Feedback Control – Doesn’t attempt to prevent unpredictable disturbances – Is able to recover from effects • Systems will usually combine both 47
  • 48. Risk Control • Goals of Control – Prevention – Detection – Minimise Loss – Recovery – Investigation H. A. Simon • Risk Response – Avoidance • Prevention – Mitigation • Transfer – Acceptance Cadle and Yeates 48
  • 49. Risk Response Control • Implement Risk Responses • Identify new Risks – Implement new responses 49
  • 50. 50 Risk Response and Evaluation • Trigger the defined risk response plan – Identify the risk owner – Assign resources – Understand the impacts • PERTs, Dependencies • Communicate • Evaluate once action is taken – Is more action needed? – What additional risks are triggered?
  • 51. Risk Register • Can be used to keep information about identified risks – Title and description – Risk Status - e.g. candidate, live, closed – Potential impact – Risk owner – Actions – Action Log 51
  • 52. Risk Ownership • Risk owner is someone who: – Has sufficient information concerning the risk – Has the necessary resources to do something about the risk – Possesses the authority to do something about the risk 52
  • 53. Don’t take the risk if... • the organization cannot afford to lose. • the exposure to the outcome is too great. • the situation (or project) is not worth it. • the odds are not in the project’s favor. • the benefits are not clearly identified. • there appear to be a large number of acceptable alternatives. 53
  • 54. Don’t take the risk if... • the risk does not achieve the project objective. • the expected value from baseline assumptions is negative. • the data is unorganized, without structure or pattern. • there is not enough data to understand the results. • a contingency plan for recovery is not in place should the results prove unsatisfactory. 54