SlideShare a Scribd company logo
Project Risk Management:
An Overview
2
Dilbert’s Take…
3
Goals and Objectives
 Project Risk
 Risk Management
 Why Risk Management
 Risk Management Planning
 Identifying & Quantifying Risks
 Response Planning
 Risk Monitoring & Control
 Tools, Tricks and Helpful Links
4
What is Project Risk?
 An event that, if it occurs, causes either a
positive or negative impact on a project
 Keys attributes of Risk
– Uncertainty
– Positive and Negative
– Cause and Consequence
5
Risk Management
 Risk management is concerned with
identifying risks and drawing up plans to
minimise their effect on a project.
 A risk is a probability that some adverse (or
positive) circumstance will occur
– Project risks affect schedule or resources;
– Product risks affect the quality or performance of
the software being developed;
– Business risks affect the organization developing
or procuring the software.
6
Risk Management Process
 PMBOK ® Definition
– “The systematic process of identifying, analyzing,
and responding to project risk”
 Steps
 Risk Management Planning
 Risk Identification
 Qualitative/Quantitative Risk Analysis
 Risk Response Planning
 Risk Monitoring & Control
7
Value From Managing Risks
 Opportunity to move from “fire-fighting” to proactive
decision making on the project.
 Better chance of project success.
 Improved project schedule and cost performance.
 Stakeholders and team members better understand
the nature of the project.
 Helps define the strengths and weaknesses of the
project.
8
Why Not Risk Management?
 With so much benefit to managing risk, why is it
often overlooked? :
1. The organization is too busy with real problems to worry
about potential ones,
2. There is a perception that there is not too much that can go
wrong, or
3. They have a fatalistic belief that not much can be done
about risks, or
4. “Shoot the messenger mentality”; fear that disclosure of
project risks will be seen as an indication of project
weakness.
9
 All projects have risks, denial does not make them
go away, it just makes you unprepared for them if
they occur.
 Risk in itself is not bad, it is how well the project
plans for and reacts to risks that counts.
 Formal risk management is a cornerstone of good
project management. Stakeholder visibility into
project risks makes it easier to get additional
resources and organizational support when risks do
occur.
Won’t identified risks make the project
look bad?
10
Risk Management Planning
 Plan for the Planning
– Risk planning should be appropriate for the
project
– Question you should ask:
1. How risky is the project?
2. Is it a new technology or something your organization
is familiar with?
3. Do you have past projects to reference?
4. What is the visibility of the project?
5. How big is the project?
6. How important is the project?
11
The Risk Management Plan
 What should it include?
– How you will identify, quantify or qualify risk
 Methods and tools
– Budget…yes budget
– Who is doing what
– How often
– Risk categories, levels, and thresholds for action.
– Reporting requirements
– Monitoring, tracking and documenting strategies
12
The Risk Management Process
 Risk identification
– Identify project, product and business risks;
 Risk analysis
– Assess the likelihood and consequences of these
risks;
 Risk response planning
– Draw up plans to avoid or minimize the effects of
the risk;
 Risk monitoring
– Monitor the risks throughout the project;
13
The Risk Management Process
14
Identifying Risk
 Continuous, Iterative Process
 What is it and what does it look like
 The sooner the better
 The more the merrier
 A fact is not a risk (it’s an issue).
 Be specific
 Don’t try to do everything at once
15
Identification Techniques
 Brainstorming
 Checklists
 Interviewing
 SWOT Analysis (strengths, weaknesses opportunities, threats)
 Delphi Technique (anonymous consensus building)
 Diagramming Techniques
– Cause & effect
– Flow Charts
– Influence Diagrams
16
Risks and Risk Types
Risk type Possible risks
Technology The database used in the system cannot process as many transactions
per second as expected.
Software components that should be reused contain defects that limit
their functionality.
People It is impossible to recruit staff with the skills required.
Key staff are ill and unavailable at critical times.
Required training for staff is not available.
Organizational The organization is restructured so that different management are
responsible for the project.
Organizational financial problems force reductions in the project budget.
Tools The code generated by CASE tools is inefficient.
CASE tools cannot be integrated.
Requirements Changes to requirements that require major design rework are proposed.
Customers fail to understand the impact of requirements changes.
Estimation The time required to develop the software is underestimated.
The rate of defect repair is underestimated.
The size of the software is underestimated.
17
Software Risks
Risk Affects Description
Staff turnover Project Experienced staff will leave the project before it is
finished.
Management change Project There will be a change of organizational management
with different priorities.
Hardware unavailability Project Hardware that is essential for the project will not be
delivered on schedule.
Requirements change Project and
product
There will be a larger number of changes to the
requirements than anticipated.
Specification delays Project and
product
Specifications of essential interfaces are not available
on schedule
Size underestimate Project and
product
The size of the system has been underestimated.
CASE tool under-
performance
Product CASE tools which support the project do not perform
as anticipated
Technology change Business The underlying technology on which the system is
built is superseded by new technology.
Product competition Business A competitive product is marketed before the system
is completed.
18
Risk Analysis
 Assess probability, seriousness, and urgency
of each risk.
 Probability may be very low, low, moderate,
high or very high.
 Risk effects might be catastrophic, serious,
tolerable or insignificant.
 Urgency might be immediate, short term, or
long term.
19
Analyzing Risk - Qualitative
 Subjective
 Educated Guess
 High, Medium, Low
 Red, Yellow, Green
 1-10
 Prioritized/Ranked list of ALL identified risks
 First step in risk analysis!
20
Risk Analysis - Quantitative
 Numerical/Statistical Analysis
 Determines probability of occurrence and
consequences of risks
 Should be focused to highest risks as determined by
Qualitative Risk Analysis and Risk Threshold
21
Risk Analysis (i)
Risk Probability Effects
Organizational financial problems force reductions in
the project budget.
Low Catastrophic
It is impossible to recruit staff with the skills required
for the project.
High Catastrophic
Key staff are ill at critical times in the project. Moderate Serious
Software components that should be reused contain
defects which limit their functionality.
Moderate Serious
Changes to requirements that require major design
rework are proposed.
Moderate Serious
The organization is restructured so that different
management are responsible for the project.
High Serious
22
Risk Analysis (ii)
Risk Probability Effects
The database used in the system cannot process as
many transactions per second as expected.
Moderate Serious
The time required to develop the software is
underestimated.
High Serious
CASE tools cannot be integrated. High Tolerable
Customers fail to understand the impact of
requirements changes.
Moderate Tolerable
Required training for staff is not available. Moderate Tolerable
The rate of defect repair is underestimated. Moderate Tolerable
The size of the software is underestimated. High Tolerable
The code generated by CASE tools is inefficient. Moderate Insignificant
23
Probability & Impact Analysis
Risk Probability Impact Expected Value
1 25% $45,000 $11,250
2 50% $2,000 $1,000
3 30% $100,000 $30,000
24
Risk Response Planning
 “What are we going to do about it?”
 Techniques/Strategies:
– Avoidance – Eliminate it
– Transference – Pawn it off
– Mitigation – Reduce probability or impact of it
– Acceptance – Do nothing
 Strategy should be commensurate with risk
– Hint: Don’t spend more money preventing the risk than the
impact of the risk would be if it occurs 
 The Risk Response Plan/Risk Response Register
25
Risk Management Strategies (i)
Risk Strategy
Organizational
financial problems
Prepare a briefing document for senior management
showing how the project is making a very important
contribution to the goals of the business.
Recruitment
problems
Alert customer of potential difficulties and the
possibility of delays, investigate outsourcing work.
Staff illness Reorganize team so that there is more overlap of work
and people therefore understand each other’s jobs.
26
Risk Management Strategies (ii)
Risk Strategy
Requirements
changes
Derive traceability information to assess requirements
change impact, and maximise information hiding in the
design.
Organizational
restructuring
Prepare a briefing document for senior management
showing how the project is making a very important
contribution to the goals of the business.
Database
performance
Investigate the possibility of buying a higher-
performance database.
Underestimated
development time
Investigate outsourcing components, investigate use of
a program generator
27
Risk Monitoring
 Assess each identified risk regularly to
decide whether or not it is becoming less or
more probable.
 Also assess whether the effects of the risk
have changed.
 Each key risk should be discussed at
management progress meetings.
28
Risk Monitoring & Control
 Continuous, Iterative Process
 Done right the risk impact will be minimized:
– Someone IS responsible
– Watch for risk triggers
– Communicate…Communicate…Communicate
– Take corrective action - Execute
– Re-evaluate and look for new risk constantly
 Tools:
– Risk Reviews
– Risk Audits
29
Risk indicators
Risk type Potential indicators
Technology Late delivery of hardware or support software, many
reported technology problems
People Poor staff morale, poor relationships amongst team
member, job availability
Organizational Organizational gossip, lack of action by senior
management
Tools Reluctance by team members to use tools, complaints
about CASE tools, demands for higher-powered
workstations
Requirements Many requirements change requests, customer
complaints
Estimation Failure to meet agreed schedule, failure to fix reported
defects
30
Tools & Tricks
 Risk Identification Spreadsheet
 Risk log Spreadsheet
 Templates
 Make your own
31
Helpful Links
 Project Management Institute (PMI)
– www.pmi.org
 CMMI
– www.sei.cmu.edu/cmmi/
 PMI Government SIG
– www.pmi-govsig.org
 NIH Project Management Center of Excellence
– http://irm.cit.nih.gov/cio/PMExcellence/
32
Questions???
Thank You
for the opportunity
to present to you today!

More Related Content

Similar to project_risk_mgmt_final 1.ppt

Risk analysis
Risk analysisRisk analysis
Risk analysis
Indu Sharma Bhardwaj
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
SAJJAD KHUDHUR ABBAS
 
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfdddddddddddddddddddddddddddddddddddddddddddddddSPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
ShepherdChidambaeh
 
Ch_1_PRM.pdf
Ch_1_PRM.pdfCh_1_PRM.pdf
Ch_1_PRM.pdf
AronHailesellasieAbr
 
8. project risk management
8. project risk management8. project risk management
8. project risk management
Mohamed Salah Eldien Mohamed Ali
 
Risk guideline
Risk guidelineRisk guideline
Risk guideline
Russell Pannone
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
Priya Tomar
 
Project mngmnt risks3.2
Project mngmnt risks3.2Project mngmnt risks3.2
Project mngmnt risks3.2
Ananya Indrajith
 
Software Project Management
Software Project ManagementSoftware Project Management
Software Project Management
NoorHameed6
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
YasirShaikh34
 
Paper on risk management by Samuel Obino Mokaya
Paper on risk management by Samuel Obino MokayaPaper on risk management by Samuel Obino Mokaya
Paper on risk management by Samuel Obino MokayaDiscover JKUAT
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
Goutama Bachtiar
 
Control only.pdf
Control only.pdfControl only.pdf
Control only.pdf
NmnKmr2
 
pressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.pptpressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.ppt
KhajaPasha33
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
MuhammadKashif703372
 
Risk Management
Risk ManagementRisk Management
Risk Management
Saqib Raza
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
Andersson Lujan Ojeda
 
Presentation Project managment
Presentation Project managmentPresentation Project managment
Presentation Project managment
Malan Bothma
 

Similar to project_risk_mgmt_final 1.ppt (20)

Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfdddddddddddddddddddddddddddddddddddddddddddddddSPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
 
Project Risk management
Project Risk management Project Risk management
Project Risk management
 
Ch_1_PRM.pdf
Ch_1_PRM.pdfCh_1_PRM.pdf
Ch_1_PRM.pdf
 
8. project risk management
8. project risk management8. project risk management
8. project risk management
 
Risk guideline
Risk guidelineRisk guideline
Risk guideline
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
Project mngmnt risks3.2
Project mngmnt risks3.2Project mngmnt risks3.2
Project mngmnt risks3.2
 
Pm session10
Pm session10Pm session10
Pm session10
 
Software Project Management
Software Project ManagementSoftware Project Management
Software Project Management
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
 
Paper on risk management by Samuel Obino Mokaya
Paper on risk management by Samuel Obino MokayaPaper on risk management by Samuel Obino Mokaya
Paper on risk management by Samuel Obino Mokaya
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Control only.pdf
Control only.pdfControl only.pdf
Control only.pdf
 
pressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.pptpressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.ppt
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Presentation Project managment
Presentation Project managmentPresentation Project managment
Presentation Project managment
 

More from BetshaTizazu2

Proposal power point draft.pptx
Proposal power point draft.pptxProposal power point draft.pptx
Proposal power point draft.pptx
BetshaTizazu2
 
Presentation Proposal.pptx
Presentation Proposal.pptxPresentation Proposal.pptx
Presentation Proposal.pptx
BetshaTizazu2
 
EYAYA PROJECT PROGRES APRIL 30.pptx
EYAYA PROJECT PROGRES APRIL 30.pptxEYAYA PROJECT PROGRES APRIL 30.pptx
EYAYA PROJECT PROGRES APRIL 30.pptx
BetshaTizazu2
 
Project Implementation, SM 2015 1.pptx
Project Implementation, SM 2015 1.pptxProject Implementation, SM 2015 1.pptx
Project Implementation, SM 2015 1.pptx
BetshaTizazu2
 
Book Chapter Review of the Title 01.pptx
Book Chapter Review  of the Title 01.pptxBook Chapter Review  of the Title 01.pptx
Book Chapter Review of the Title 01.pptx
BetshaTizazu2
 
The Prospects Of Economic Growthhhh...pptx
The Prospects Of Economic Growthhhh...pptxThe Prospects Of Economic Growthhhh...pptx
The Prospects Of Economic Growthhhh...pptx
BetshaTizazu2
 
Presentation for research team.ppt
Presentation for research team.pptPresentation for research team.ppt
Presentation for research team.ppt
BetshaTizazu2
 
Soft Skills 2011 Secretariat of the House of Federation .ppt
Soft Skills 2011 Secretariat of the House of Federation .pptSoft Skills 2011 Secretariat of the House of Federation .ppt
Soft Skills 2011 Secretariat of the House of Federation .ppt
BetshaTizazu2
 
Positive Atitude.ppt
Positive Atitude.pptPositive Atitude.ppt
Positive Atitude.ppt
BetshaTizazu2
 
Chapter 3.pptx
Chapter 3.pptxChapter 3.pptx
Chapter 3.pptx
BetshaTizazu2
 
Crashing and Updating.ppt
Crashing and Updating.pptCrashing and Updating.ppt
Crashing and Updating.ppt
BetshaTizazu2
 
ch05_crashing.ppt
ch05_crashing.pptch05_crashing.ppt
ch05_crashing.ppt
BetshaTizazu2
 
Feasibility Analysis.ppt
Feasibility Analysis.pptFeasibility Analysis.ppt
Feasibility Analysis.ppt
BetshaTizazu2
 
PCCC Ch-1.ppt
PCCC Ch-1.pptPCCC Ch-1.ppt
PCCC Ch-1.ppt
BetshaTizazu2
 
Wal-mart’s and Hard Rock.pptx
Wal-mart’s and Hard Rock.pptxWal-mart’s and Hard Rock.pptx
Wal-mart’s and Hard Rock.pptx
BetshaTizazu2
 
Biruk POM.pptx
Biruk POM.pptxBiruk POM.pptx
Biruk POM.pptx
BetshaTizazu2
 
Chapter-2 Solved examples.ppt
Chapter-2 Solved examples.pptChapter-2 Solved examples.ppt
Chapter-2 Solved examples.ppt
BetshaTizazu2
 
Weaver_Concept_Selection_20080729.ppt
Weaver_Concept_Selection_20080729.pptWeaver_Concept_Selection_20080729.ppt
Weaver_Concept_Selection_20080729.ppt
BetshaTizazu2
 
hiwot FSCM1.pptx
hiwot FSCM1.pptxhiwot FSCM1.pptx
hiwot FSCM1.pptx
BetshaTizazu2
 

More from BetshaTizazu2 (20)

Proposal power point draft.pptx
Proposal power point draft.pptxProposal power point draft.pptx
Proposal power point draft.pptx
 
Presentation Proposal.pptx
Presentation Proposal.pptxPresentation Proposal.pptx
Presentation Proposal.pptx
 
EYAYA PROJECT PROGRES APRIL 30.pptx
EYAYA PROJECT PROGRES APRIL 30.pptxEYAYA PROJECT PROGRES APRIL 30.pptx
EYAYA PROJECT PROGRES APRIL 30.pptx
 
Project Implementation, SM 2015 1.pptx
Project Implementation, SM 2015 1.pptxProject Implementation, SM 2015 1.pptx
Project Implementation, SM 2015 1.pptx
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Book Chapter Review of the Title 01.pptx
Book Chapter Review  of the Title 01.pptxBook Chapter Review  of the Title 01.pptx
Book Chapter Review of the Title 01.pptx
 
The Prospects Of Economic Growthhhh...pptx
The Prospects Of Economic Growthhhh...pptxThe Prospects Of Economic Growthhhh...pptx
The Prospects Of Economic Growthhhh...pptx
 
Presentation for research team.ppt
Presentation for research team.pptPresentation for research team.ppt
Presentation for research team.ppt
 
Soft Skills 2011 Secretariat of the House of Federation .ppt
Soft Skills 2011 Secretariat of the House of Federation .pptSoft Skills 2011 Secretariat of the House of Federation .ppt
Soft Skills 2011 Secretariat of the House of Federation .ppt
 
Positive Atitude.ppt
Positive Atitude.pptPositive Atitude.ppt
Positive Atitude.ppt
 
Chapter 3.pptx
Chapter 3.pptxChapter 3.pptx
Chapter 3.pptx
 
Crashing and Updating.ppt
Crashing and Updating.pptCrashing and Updating.ppt
Crashing and Updating.ppt
 
ch05_crashing.ppt
ch05_crashing.pptch05_crashing.ppt
ch05_crashing.ppt
 
Feasibility Analysis.ppt
Feasibility Analysis.pptFeasibility Analysis.ppt
Feasibility Analysis.ppt
 
PCCC Ch-1.ppt
PCCC Ch-1.pptPCCC Ch-1.ppt
PCCC Ch-1.ppt
 
Wal-mart’s and Hard Rock.pptx
Wal-mart’s and Hard Rock.pptxWal-mart’s and Hard Rock.pptx
Wal-mart’s and Hard Rock.pptx
 
Biruk POM.pptx
Biruk POM.pptxBiruk POM.pptx
Biruk POM.pptx
 
Chapter-2 Solved examples.ppt
Chapter-2 Solved examples.pptChapter-2 Solved examples.ppt
Chapter-2 Solved examples.ppt
 
Weaver_Concept_Selection_20080729.ppt
Weaver_Concept_Selection_20080729.pptWeaver_Concept_Selection_20080729.ppt
Weaver_Concept_Selection_20080729.ppt
 
hiwot FSCM1.pptx
hiwot FSCM1.pptxhiwot FSCM1.pptx
hiwot FSCM1.pptx
 

Recently uploaded

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 

Recently uploaded (20)

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 

project_risk_mgmt_final 1.ppt

  • 3. 3 Goals and Objectives  Project Risk  Risk Management  Why Risk Management  Risk Management Planning  Identifying & Quantifying Risks  Response Planning  Risk Monitoring & Control  Tools, Tricks and Helpful Links
  • 4. 4 What is Project Risk?  An event that, if it occurs, causes either a positive or negative impact on a project  Keys attributes of Risk – Uncertainty – Positive and Negative – Cause and Consequence
  • 5. 5 Risk Management  Risk management is concerned with identifying risks and drawing up plans to minimise their effect on a project.  A risk is a probability that some adverse (or positive) circumstance will occur – Project risks affect schedule or resources; – Product risks affect the quality or performance of the software being developed; – Business risks affect the organization developing or procuring the software.
  • 6. 6 Risk Management Process  PMBOK ® Definition – “The systematic process of identifying, analyzing, and responding to project risk”  Steps  Risk Management Planning  Risk Identification  Qualitative/Quantitative Risk Analysis  Risk Response Planning  Risk Monitoring & Control
  • 7. 7 Value From Managing Risks  Opportunity to move from “fire-fighting” to proactive decision making on the project.  Better chance of project success.  Improved project schedule and cost performance.  Stakeholders and team members better understand the nature of the project.  Helps define the strengths and weaknesses of the project.
  • 8. 8 Why Not Risk Management?  With so much benefit to managing risk, why is it often overlooked? : 1. The organization is too busy with real problems to worry about potential ones, 2. There is a perception that there is not too much that can go wrong, or 3. They have a fatalistic belief that not much can be done about risks, or 4. “Shoot the messenger mentality”; fear that disclosure of project risks will be seen as an indication of project weakness.
  • 9. 9  All projects have risks, denial does not make them go away, it just makes you unprepared for them if they occur.  Risk in itself is not bad, it is how well the project plans for and reacts to risks that counts.  Formal risk management is a cornerstone of good project management. Stakeholder visibility into project risks makes it easier to get additional resources and organizational support when risks do occur. Won’t identified risks make the project look bad?
  • 10. 10 Risk Management Planning  Plan for the Planning – Risk planning should be appropriate for the project – Question you should ask: 1. How risky is the project? 2. Is it a new technology or something your organization is familiar with? 3. Do you have past projects to reference? 4. What is the visibility of the project? 5. How big is the project? 6. How important is the project?
  • 11. 11 The Risk Management Plan  What should it include? – How you will identify, quantify or qualify risk  Methods and tools – Budget…yes budget – Who is doing what – How often – Risk categories, levels, and thresholds for action. – Reporting requirements – Monitoring, tracking and documenting strategies
  • 12. 12 The Risk Management Process  Risk identification – Identify project, product and business risks;  Risk analysis – Assess the likelihood and consequences of these risks;  Risk response planning – Draw up plans to avoid or minimize the effects of the risk;  Risk monitoring – Monitor the risks throughout the project;
  • 14. 14 Identifying Risk  Continuous, Iterative Process  What is it and what does it look like  The sooner the better  The more the merrier  A fact is not a risk (it’s an issue).  Be specific  Don’t try to do everything at once
  • 15. 15 Identification Techniques  Brainstorming  Checklists  Interviewing  SWOT Analysis (strengths, weaknesses opportunities, threats)  Delphi Technique (anonymous consensus building)  Diagramming Techniques – Cause & effect – Flow Charts – Influence Diagrams
  • 16. 16 Risks and Risk Types Risk type Possible risks Technology The database used in the system cannot process as many transactions per second as expected. Software components that should be reused contain defects that limit their functionality. People It is impossible to recruit staff with the skills required. Key staff are ill and unavailable at critical times. Required training for staff is not available. Organizational The organization is restructured so that different management are responsible for the project. Organizational financial problems force reductions in the project budget. Tools The code generated by CASE tools is inefficient. CASE tools cannot be integrated. Requirements Changes to requirements that require major design rework are proposed. Customers fail to understand the impact of requirements changes. Estimation The time required to develop the software is underestimated. The rate of defect repair is underestimated. The size of the software is underestimated.
  • 17. 17 Software Risks Risk Affects Description Staff turnover Project Experienced staff will leave the project before it is finished. Management change Project There will be a change of organizational management with different priorities. Hardware unavailability Project Hardware that is essential for the project will not be delivered on schedule. Requirements change Project and product There will be a larger number of changes to the requirements than anticipated. Specification delays Project and product Specifications of essential interfaces are not available on schedule Size underestimate Project and product The size of the system has been underestimated. CASE tool under- performance Product CASE tools which support the project do not perform as anticipated Technology change Business The underlying technology on which the system is built is superseded by new technology. Product competition Business A competitive product is marketed before the system is completed.
  • 18. 18 Risk Analysis  Assess probability, seriousness, and urgency of each risk.  Probability may be very low, low, moderate, high or very high.  Risk effects might be catastrophic, serious, tolerable or insignificant.  Urgency might be immediate, short term, or long term.
  • 19. 19 Analyzing Risk - Qualitative  Subjective  Educated Guess  High, Medium, Low  Red, Yellow, Green  1-10  Prioritized/Ranked list of ALL identified risks  First step in risk analysis!
  • 20. 20 Risk Analysis - Quantitative  Numerical/Statistical Analysis  Determines probability of occurrence and consequences of risks  Should be focused to highest risks as determined by Qualitative Risk Analysis and Risk Threshold
  • 21. 21 Risk Analysis (i) Risk Probability Effects Organizational financial problems force reductions in the project budget. Low Catastrophic It is impossible to recruit staff with the skills required for the project. High Catastrophic Key staff are ill at critical times in the project. Moderate Serious Software components that should be reused contain defects which limit their functionality. Moderate Serious Changes to requirements that require major design rework are proposed. Moderate Serious The organization is restructured so that different management are responsible for the project. High Serious
  • 22. 22 Risk Analysis (ii) Risk Probability Effects The database used in the system cannot process as many transactions per second as expected. Moderate Serious The time required to develop the software is underestimated. High Serious CASE tools cannot be integrated. High Tolerable Customers fail to understand the impact of requirements changes. Moderate Tolerable Required training for staff is not available. Moderate Tolerable The rate of defect repair is underestimated. Moderate Tolerable The size of the software is underestimated. High Tolerable The code generated by CASE tools is inefficient. Moderate Insignificant
  • 23. 23 Probability & Impact Analysis Risk Probability Impact Expected Value 1 25% $45,000 $11,250 2 50% $2,000 $1,000 3 30% $100,000 $30,000
  • 24. 24 Risk Response Planning  “What are we going to do about it?”  Techniques/Strategies: – Avoidance – Eliminate it – Transference – Pawn it off – Mitigation – Reduce probability or impact of it – Acceptance – Do nothing  Strategy should be commensurate with risk – Hint: Don’t spend more money preventing the risk than the impact of the risk would be if it occurs   The Risk Response Plan/Risk Response Register
  • 25. 25 Risk Management Strategies (i) Risk Strategy Organizational financial problems Prepare a briefing document for senior management showing how the project is making a very important contribution to the goals of the business. Recruitment problems Alert customer of potential difficulties and the possibility of delays, investigate outsourcing work. Staff illness Reorganize team so that there is more overlap of work and people therefore understand each other’s jobs.
  • 26. 26 Risk Management Strategies (ii) Risk Strategy Requirements changes Derive traceability information to assess requirements change impact, and maximise information hiding in the design. Organizational restructuring Prepare a briefing document for senior management showing how the project is making a very important contribution to the goals of the business. Database performance Investigate the possibility of buying a higher- performance database. Underestimated development time Investigate outsourcing components, investigate use of a program generator
  • 27. 27 Risk Monitoring  Assess each identified risk regularly to decide whether or not it is becoming less or more probable.  Also assess whether the effects of the risk have changed.  Each key risk should be discussed at management progress meetings.
  • 28. 28 Risk Monitoring & Control  Continuous, Iterative Process  Done right the risk impact will be minimized: – Someone IS responsible – Watch for risk triggers – Communicate…Communicate…Communicate – Take corrective action - Execute – Re-evaluate and look for new risk constantly  Tools: – Risk Reviews – Risk Audits
  • 29. 29 Risk indicators Risk type Potential indicators Technology Late delivery of hardware or support software, many reported technology problems People Poor staff morale, poor relationships amongst team member, job availability Organizational Organizational gossip, lack of action by senior management Tools Reluctance by team members to use tools, complaints about CASE tools, demands for higher-powered workstations Requirements Many requirements change requests, customer complaints Estimation Failure to meet agreed schedule, failure to fix reported defects
  • 30. 30 Tools & Tricks  Risk Identification Spreadsheet  Risk log Spreadsheet  Templates  Make your own
  • 31. 31 Helpful Links  Project Management Institute (PMI) – www.pmi.org  CMMI – www.sei.cmu.edu/cmmi/  PMI Government SIG – www.pmi-govsig.org  NIH Project Management Center of Excellence – http://irm.cit.nih.gov/cio/PMExcellence/
  • 32. 32 Questions??? Thank You for the opportunity to present to you today!