SlideShare une entreprise Scribd logo
1  sur  14
Aum gam ganapataye namya.




Risk Analysis and
Mitigation Precedence
Modeling




Ratneshwar Jha
Infosys Technologies Ltd
Contents
   1.1    Abstract:                              3
   1.2    Introduction                           3
   1.3    Risk Influnce Factor Analysis          3
   1.4    Risk Netwok Generation                 4
   A.     Risk Discovery                         4
   B.     Risk Dependency Analysis               5
   1.5    Risk Proritization                     8
   1.6    Risk Dependency Analysis               10
   1.7    Mitigation Analysis                    11
   1.8    Conclusion                             13
   1.9    References                             13
   1.10   Author(s) Profile                      14




2|Page
1.1 Abstract:
         Risk analysis is crucial process in project management. Present risk analysis models
         analyze risks independently and are static. That is, current models don’t account for
         the effect of one risk on another and don’t predict how the risks might behave in future.
         This model introduces the concept of risk dependencies with a mathematical model
         which makes risk analysis sophisticated and futuristic.

         Index Terms: RIF, Risk Dependency, Contribution factor, Alone mitigation factor,
         Total Mitigation factor and Risk Exposure.


         1.2 Introduction
         The term risk has its own meaning and perspective in different processes. In the
         present scenario risks can also be viewed as an opportunity to gain competitive
         advantage. Thus based on this insight risk can be defined as “A probable event which
         has potential negative or positive impact on the business process or project objective”.

         This paper proposes an integrated approach to risk analysis process which is more
         planned, opportunistic and robust. The proposed risk analysis model concentrates on
         risk analysis part of risk management process and offers a logically structured way to
         quantify and mitigate risk. This article is organized as follows:

         a) Risk Influence Factor, which deals with vulnerability of system with respect to
             external factors.
         b) Risk Network Generation, is divided into two parts: What-If and Why Analysis
             which is risk discovery process and Risk Dependency Analysis which is actual
             process of Risk Network Generation.
         c) Risk Prioritization, in this phase each node in the risk network is analyzed based
             on cost time benefit and time priority associated with it.
         d) Risk dependency analysis, in this phase, each risk inside top priority groups will
             be analyzed and prioritized based on the mitigation factors.
         e) Mitigation Analysis, which signifies mitigation effort variation with respect to time.

         1.3 Risk Influnce Factor Analysis
         Risk Influence Factor [1] (RIF) signifies all the factors are influencing a risk category as
         per the present condition under which project is undertaken. It plays a significant role
         in estimating the basic dimensions of a risk in terms of probability of risk’s occurrences.
         RIF’s analysis can be best represented by Bayesian Networks [3] in which each RIF
         represents a parent node to a risk node which is identified. For instance suppose a
         risk of Human Resource (HR) category is identified in a project, before estimating its
         impact and probability of occurrence, all RIFs should be mapped with respect to time
         of occurrence of the upcoming risk. Salary, Place of Joining and motivation for higher
         studies, Opportunities within project/Company can be some RIFs which can influence
         a risk of HR category. A general statement can be put forward “The more influential
         are RIFs for a risk category, the more chances of risk to happen in that category and
         impact depends upon the current phase of project”. Thus RIFs portray a basic picture


3|Page
of risks which is helpful in estimating the parameters like probability of risk occurrence.
         The formula to calculate probability of occurrence of a risk node is:

                    P(R) = P(R| PA(RRIF) .                              (1)

         Where PA(RRIF) represents all the RIF acting on the risk of particular category


         1.4 Risk Netwok Generation
         All Risk model is based on the subjective notion of probability and assumptions.
         Therefore, this model is based on the following assumptions:

         a. The exposure of a risk E(R) is a function of time(t) and mitigation effort(M),
            mathematically it can be expressed as :
                    E (Ri) = f (t,M)


         Variation of risk exposure on time can be realized when mitigation effort (M)          0 which


         results in three possible scenarios:

              i. E(Ri) is directly proportional to t; with the increase in time risk exposure
                  increases.
              ii. E(Ri) is inversely proportional to t; with the increase in time risk exposure
                  decreases.
           iii. E(Ri) is independent to t; Risk Exposure remains unaffected by time.
         Note: The proposed risk analysis model deals with the scenario where Risk Exposure
         is directly dependent on time (Scenario i).

               A. Risk Discovery
         Risk discovery is an important activity in risk analysis process which applies to all
         phases of the project. The process of risk discovery has to be revisited periodically
         and its frequency depends on project health.

         Apart from the standard process, two variants will be covered in detail:

         a. What-If and Why analysis
         b. Risk Dependency Analysis
         1.     What If And Why Analysis
         This approach takes input as “What-If” scenario for each risk category in the project
         and then answer “Why” for the “What-If”. That is, “What-If” identifies the potential fault
         points in the projects and the answer to the question “Why” provides proper validation
         and authentication for the risk (fault-points) discovered. The scenario in a typical
         project which is discussed below makes “What-If” understanding more clear:

         “What-If”: Requirement Change (Risk Category: Client) “Why”: Requirement document
         is not clear enough.

4|Page
“What-If”: Too less design Engineers. (Risk Category: Human Resource) “Why”: The
         coming project is to be built on new design tool.

         Here in both above scenarios, it is evident that “What-If” & “Why” scenario helps us to
         discover & identify new risks like “Requirement Change” and “Too less design
         Engineers”. It can be observed that “Why” itself recursively generates potential risks
         like “New design tool” from second scenario or “Lack of proper communication
         between onsite and offshore team” from first scenario. Therefore, the “What-If” &
         “Why” scenario should be recursively executed till “Why” does not regenerate any
         more risks. Hence, the process of Risk discovery and identification is explained in the
         figure 1.1 below:




             Fig 1.1: Risk Identification process based on “What-If and Why” Analysis

             B. Risk Dependency Analysis
         Risk dependency analysis is fundamental activity in the proposed model. The idea
         behind the risk dependency derived from an old proverb “Problem does not come
         alone.”, that is, if the individual problem is scrutinized then lot of small and big
         problems can be identified that are attached to a given problem. Likewise, the risk
         should not be treated as individual entity as it is perceived in the current project risk
         models rather it should be perceived as the related entities which overall influences
         the decision making process in mitigating the risk. This model identifies the
         dependencies between the risks and analyses risks based on the identified
         relationship(s). We will here discuss an algorithm which builds risk network based on
         the risks identified by “What-If & Why Analysis” described above.

         Algorithm 1: Generating Risk Network

         INPUT: Risk set R identified through “What-If & Why Analysis” process, that is, R =
         {R1, R2, R3…. Rn)

         For each risk element Rx belonging risk category Cm;

         1. In same category Cm, identify risk Ry which may affect Rx.
         If (Ry does not belong to risk set R, validate it through “What-If &Why Analysis”);
         Add Ry to risk set R.
         If (No edges are present between Rx and Ry and

         If Rx is largely affected by Ry);
         then the relationship structure would be:

5|Page
Ry        Rx
            If (No edges are present between Rx and Ry and Rx is largely affecting Ry,)
            then the relationship structure would be:
                Rx       Ry
         2. Follow the same process as step 1 for Rx for risk categories other than Cm
            End: When the whole risk set relationship analysis is done.
            The algorithm1 discovers new risks which are validated through “What-If & Why
            Analysis” and builds risk network of all the risk. To elaborate the Risk dependency
            analysis in detail, consider a generic example in which R1, R2, R3, R4 and R5 are
            identified in the risk discovery phase. For each risk discovered, for example, R1 is
            taken first and it was observed that R2, R5 (belonging to same category of R1) and R3
            (belonging to different category from R1) risk influences R1. This can be graphically
            put like:




            R2 risk is affected by R4 and R5. R3 is affected by R5 and R6 (New risk found in
            process of analyzing dependency). R6 risk affects R3 and R5. Thus the risk network
            tree will assume the shape as:




                         Fig 3.4: Risk network tree based on above assumption

            Thus mathematically risk dependency can be viewed as partially connected graph
            defined by G=(V,E), where V={Ri : i є N and R is the all risk discovered}, that is they
            are risk nodes discovered which is represented as circle with the risk name along with
            risk attributes like risk category, risk exposure, time for mitigation, total mitigation
            factor. All these attributes will be discussed later in the paper. E={ Ri ← Rj ; Rj is
            affecting Ri with dependency factor Cji }, that is, they are the edges which connects
            two dependent risk with some dependency factor Cji. The risk network which is
            obtained is a directed acyclic graph (DAG) which inherits Bayesian characteristics. [2]

            The risk dependency analysis can help in identifying new risks. Suppose in a critical
            project, it was identified that customer involvement is minimal in a project. Hence, it
            can be identified as a potential risk. If it is identified as a risk, then from the below
            discussion we will see how the risk dependency process helps us to identify some
            new risks based on this risk.



6|Page
Parent Risk: Minimal Customer Involvement
         Risk Category: Customer category
         The process of risk dependency is for new risk discovery is as follows:
         Step 1: Identify child risk that can add strength to parent risk within the parent
         category.
         After analyzing the various factor in the customer domain. It can be inferred that
         customer acceptance could be potential risk as they might not acceptance the design,
         because of the reason that their participation was minimal.

         Step 2: Identify the risks of other categories that may after the parent risk. It could be:
         Project specific factor:
         Requirement changes
         There is maximum chance that the requirement of customer may change which is due
         to the parent risk.
         Quality category:
         Quality Commitment

         If the customer involvement is minimal then there are chances that it might affect the
         overall quality of the product as expected by customer.

         These new identified risks should be validated through WHAT IF AND WHY analysis
         before considering them as a risk. Thus risk dependency identification might help us in
         identifying new potential risk. Again the above example is just a demonstration;
         conditions may differ from project to projects. For example in some projects there
         might not be any problem if the customer involvement is low. Therefore in those
         projects there is no question of analyzing this further. Here it can be inferred that risk
         is very subjective concept which assumes different meaning in different context. It
         should be viewed relatively than absolutely as it is done is current model.

         The question is how to define the dependency factor (how much child risk contributes
         parent in terms of impact) of child risk. This will be followed in more detail in the
         following section.

         a) RISK DEPENDENCY FACTOR
         Risk dependency factor signifies how much the child risk contributes to the parent risk
         on project.

         Consider a generic example in which two risks are connected with dependency factor
         Cmn as shown below in figure:




                             Fig: 3.5: Risk dependency between two risks.


7|Page
Here in Fig 3.5, arrow from Rm to Rn denotes direction of impact of risk Rm over its
         parent Rn which is denoted by Cmn. The value of Cmn can be calculated as follows:

         Cmn = (P(Rn| Rm) ) * (I(Rm) / ( I(Rn) + I(Rm) ) )   (2)

         Where, P(Rn| Rm) represents conditional probability of Rn (Child Risk) risk when Rm
         (Parent Risk) has already occurred and (I(Rm) / ( I(Rn) + I(Rm) ) represents the
         contribution of parent risk impact over child risk.

         It can be figured out that for strong dependencies, the probabilities of occurrence of
         child risk shows high degree of correlation with parent risk. That is, if there is high
         probability of occurrence parent risk then there will be high chances of child risk to
         happen when connected via strong dependency relationship.

         Thus co-relation helps us to estimate and validate the probability of occurrence.


         1.5 Risk Proritization
         After the risk is discovered and its attributes are defined, the next step is to prioritize
         the risk. Unlike the current model, this model makes use of the current assumption
         described in paper. Hence, this model does not take impact as prime factor to
         prioritize the risk rather it takes other factors to churn out the opportunity factor
         associated with the risk.

         In this model risk is prioritized based on the three parameters:

         a. Risk Exposure.
         b. Mitigation Exposure.
         c.   Risk dependency analysis.
         1. RISK EXPOSURE ANALYSIS
              In this phase of risk analysis, risk exposure is calculated which signifies how much
              a process is exposed to a given risk. This is calculated by simple formula:
              RE (R) =Impact * probability of occurrence             (3)
              Here, Impact of a risk on project must be analyzed based on the effect of a risk on
              project goals. Therefore, for each project goal impact should be graded on scale
              of 1-10. And the final impact of risk will be:
              Impact(Ri) =∑Impact(ProjectGoals)/∑j                 (4)

         Here, ∑ Impact (Project Goals) is summation of impact on all project goals for a risk Ri.
         and ∑ j is total number of project goals identified in a project. Thus Impact of a risk is
         average of its impact on project goals. Probability of occurrence signifies the chance
         of occurrence of risk during project execution. It should be noted that while analyzing
         the risk dependency the Impact and probability of occurrence should satisfy the
         inequalities mentioned in Eq. 1.

         2. MITIGATION EXPOSURE
              Mitigation Exposure signifies the amount of positivity gained in business process
              when a particular risk is mitigated to a large extent. Hence this factor in the risk
              analysis explores the opportunity angle of a particular risk. As the business


8|Page
process has major axis viz. time and cost, hence the Mitigation exposure takes
             these axes into account and formulates on the following factors:
             a) Cost Benefit Factor
             b) Time factor
         Both the factors will be taken up in detail in following section.

         a. COST BENEFIT FACTOR
         This factor describes the relative cost benefit associated with the risk. It can be
         defined as follows:

         CBF (R) = (1- (Cost of Mitigation/Amount on stake))*10                (5)

         Whereas, Amount on stake, can be calculated through the schedule slippage which is
         standard followed in most of the software projects. Apart from this, when amount on
         stake cannot be directly computed from schedule slippage then amount of stake can
         be looked as the risk category fraction in the project cost that it carries away. It can be
         useful when the nature of risk is subjective, that is, there is no way to calculate the
         Amount on stake objectively. It can be calculated as:

         Amount on Stake= Cost Impact Factor * Risk category share in project cost             (6)

         Whereas the Cost impact factor to be graded on scale of 1-10, this represents the
         impact of the risk on the risk category cost in project.


                                Cost Impact Factor         Factor Value
                                       STRONG              0.7 to 1.0
                                       MEDIUM              0.4 to 0.7
                                         WEAK              0.1 to 0.4
                               Table 4.1: Showing Cost Impact Factor




                 Fig 4.1: A hypothetical cost based categorization of risk category.

         Suppose a hypothetical cost based categorization of risk category in a project as
         depicted in the Fig 4.1.Here we see the overall project cost is divided among the risk
         categories which are identified in the project, the amount on stake in the above
         equation is the relative share of the risk of a risk’s category pie. Like suppose a risk in


9|Page
HR category expected to occur then the amount of stake is the risk share in HR
                 occupied pie.
                 The above pie share expected to be roughly completed in pre-project analysis
                 depending on the requirements and SLAs and other business documents.
                 Cost of Mitigation is the total cost involved in mitigating the risk. It involves the both
                 direct costs like Human resource utilization cost, software/hardware cost, Logistic
                 utilization cost and hidden costs like penalty clause in SLA and others.
               b. TIME FACTOR
                 This factor signifies the relative time factor associated with the risk. It is based on the
                 assumption that risks which have higher time of mitigation should come low in
                 mitigation. That is risk of near visibility of occurrence should be taken up against
                 others. The time factor can be calculated as follows:

                 TF (R) = ETM/TTM                                    (7)

                 Where,

                     a. Total time for mitigation (TTM) is the time period in working hrs from when the
                        risk is identified till the time the given risk is expected to trigger.
                     b. Expected time for Mitigation (ETM) is the time required to mitigate the risk to a
                        large extent.




                                  Fig 4.2: Depicting ETM and TTM in time analysis

                 It should be noted that for constant risk which does not varies with the time should be
                 given constant value for the above ratio analyzing the above part.

                 After having all the above analysis, the alone mitigation strength which signifies the
                 drive for mitigating particular risk, can be calculated as follows:

                 AMF(R) = RE (R) * ME (R)                           (8)

                 Where mitigation exposure of risk R can be calculated as ME(R) = (CBF(R) + TF (R)) /
                 2    (9)


                 1.6 Risk Dependency Analysis
                 This manuscript talk of collectivism in risk mitigation is talked than the individualism,
                 that is, risks are viewed as related entities rather than with respect to risk mitigation
                 analyzed. Therefore it will show how these dependencies affect in decision for
                 mitigating the risk. Assume that Cji denotes the dependency factor of riskJ on riski.



10 | P a g e
Total Mitigation Exposure factor (TMF) denotes overall the willingness to mitigate a
               risk. The Total Mitigation Exposure Factor for risk Ri can be calculated as follows:

               TMF (Ri) = ∑ i ∑j (AMF(Ri ) + TMF (Rj) * Cjj)          (10)

               Where riski and riskj are connected risks through dependency factor Cji. and j є R ->
               [1,n] ,i є R -> [j-1,n] where n is number of nodes in graph. The above formula takes
               each risk alone mitigation factor (AMF) into consideration and iterates though each
               child risk to calculate the total mitigation factor of a risk. That is, TMF is summation of
               alone mitigation factor of parent risk and the individual contribution of child risk
               towards the mitigation factor of parent risk.

               Applying the formula (9) on the Figure 3.4 the Total Mitigation factor of each risk
               based on the above formula is:

               a. TMF(R5)=AMF(R5)
               b. TMF(R4)=AMF(R4)
               c.   TMF(R2)=AMF(R2)+TMF(R5)*C25
                    +TMF(R4)*C24
               d. TMF(R3)=AMF(R3)+ TMF(R4)*C34
               e. TMF(R1)=AMF(R1)+TMF(R2)*C12+ TMF(R4)*C14+ TMF(R3)*C13
               Where AMF is alone mitigation factor and TMF is Total mitigation factor of a risk.

               Here for R5 and R4 AMF and TMF are same as there is no child risk is connected to it,
               that is, no risk is affecting its alone mitigation factor. Hence based on the TMF of each
               risk, each risk should be prioritized for mitigation.


               1.7 Mitigation Analysis
               Once all these factors are decided upon, risk can be extrapolated in future to visualize
               its behavior in future which can be defined though risk mitigation line. Hence risk
               mitigation line can help in planning business process in better way.

               Risk Mitigation curve is defined by the simple linear equation:
               TMF (Ri) = S (Ri) * TM+ TMF (Ri)o               (11)
               Where, TMF (Ri)o: Initial Total Mitigation Factor of risk Ri and Expected time for
               mitigation (Tm) (ETM) and S(Ri) represents slope of the line which is equal to
               (TMF(Ri)Minimal-TMF(Ri)o)/TM                    (12)
               Where TMF (Ri)Minimal, which is shown by green line in fig 6.1, is the minimal value for
               TMF (Ri) for which the risk can be accepted or no longer beneficial to mitigate it.




                                       Fig: 6.1: Analysis of TMF with Time

11 | P a g e
The amount of mitigation can be calculated at a given instance will be{TMF(Ri)o -TMF
               (Ri)t} / TMF (Ri)o.
               Thus the mitigation can follow any curve which depends on the mitigation strategy
               followed to mitigate that risk. Therefore, along with linear flavor of risk mitigation it can
               follow non-linear curves like logarithmic curve, which can be followed if the risk is falls
               in top priority category. For the sake of simplicity, linear curve is talked about.
               Risks that do not vary with the time can be realized as a line parallel to the time axis,
               that is its TMF and Risk exposure does not changes with time.




                                  Fig: 6.2: Mitigation achieved after some time t

               All other factors like Cij follow the same equation with the above calculated slope.
               Hence at any given point of time the TMF of a risk can be predicted. Note that the
               value derived by this is not the actual value but it is an estimated value of that risk at
               that point of time. Hence actual TMF value at times can be in 3 regions of the above
               curve:
               Below the line: If actual TMF value is below the line then, it can be followed that risk
               mitigation strategy is way above the expectations. Hence it is positive sign.
               On the line: If actual TMF value is on the line then, it can be followed that risk
               mitigation strategy is at par the expectations.
               Above the line: If actual TMF value is above the line then, it can be followed that risk
               mitigation strategy is below the expectations. Hence it is negative sign; something
               more in terms of effort should be put to mitigate the same.
               Having the clear understanding of the above, we can graphically conclude which risk
               in the future will have what impact on business process at a given point of time. In the
               above figure, curve signifies the maximum actual value that can TMF of a risk can
               take up at any given point of time. Again this can be standardized for a particular
               process. TMF value above than this curve denotes that mitigation is not is not
               complying with the mitigation plan. One way to define that threshold curve mentioned
               above is to assume a circle having centre at
               any point on the line and radius as a unit (1 or 2). The d/dx (tangent) on the diametric
               point defines the threshold region which will be parallel to the line defined by above
               equation.




                                 Fig 6.3: Plotting a set of risks in graph together

12 | P a g e
Now, considering all the risks together and plotting them together (Fig 6.3) will
               generate a picture how the risks are going to behave in future and thus we can
               estimate what all risk can come up as high priority. Here in the Fig 6.3, initially, that is
               at t=0, the order of risk priority was R1> R2 > R3. Then at t1 time according to graph
               the order of risk priority changed to R2 > R1 > R3. And finally at time t2, the order of
               priority took the shape like R2 > R3.Thus with this kind analysis the business process
               can be planned in more robust and sophisticated way.


               1.8 Conclusion
               The Integrated Risk Analysis Model enlists all the parameters that is used by existing
               Risk Analysis Models in software project management and introduces concept of risk
               dependency which came out to be beneficial and crucial factor in Risk Analysis. It is
               shown that how to identify the dependencies between risk and how it can be used in
               risk analysis through a series of mathematical formulations. Through a series of
               mathematical formulations, the risk behavior and amount of mitigation at any point of
               time can be predicted. Therefore it is robust and futuristic than the current models of
               risk analysis.


               1.9 References
               1. Xue-Hui Ren, Yuan-Hua Li,Hong-Xia Tian, Study On Environmental Risk Influence
                  Factor Of Tongliao,Applied Artificial Intelligence (pp 678-685).World Scientific.
               2. J. Pearl, "Aspects of Graphical Models Connected With Causality," UCLA
                  Cognitive Systems Laboratory, Technical Report (R-195-LL). In Proceedings of
                  the 49th Session of the International Statistical Institute, Italy, Tome LV, Book 1,
                  Florence, 399-401, August 1993.




13 | P a g e
1.10 Author(s) Profile




               Author is having 3 years of work experience in Software field. He had been
               associated with Infosys Technologies Ltd from (Oct 2007 – Oct 2010). Now
               currently associated with Xchanging Pvt Ltd. He completed his B.E Degree in
               Information Science from Visvesvaraya Technological University in 2007.

               E-mail: ratneshwar.jha01@gmail.com




14 | P a g e

Contenu connexe

Tendances

Management of risks and implication on the nigerian manufacturing sector
Management of risks and implication on the nigerian manufacturing sectorManagement of risks and implication on the nigerian manufacturing sector
Management of risks and implication on the nigerian manufacturing sectorAlexander Decker
 
Project Risk Management_O2D
Project Risk Management_O2DProject Risk Management_O2D
Project Risk Management_O2DHungyu Lai
 
Executive Travel, Keeping Your Employees Safe
Executive Travel, Keeping Your Employees SafeExecutive Travel, Keeping Your Employees Safe
Executive Travel, Keeping Your Employees SafeResolver Inc.
 
Model risk management: a primer
Model risk management: a primerModel risk management: a primer
Model risk management: a primerImanuel Costigan
 
Quantitative Techniques and Concepts in Finance
Quantitative Techniques and Concepts in FinanceQuantitative Techniques and Concepts in Finance
Quantitative Techniques and Concepts in FinanceRoselle Fuentes
 
4 Steps to Intelligent Risk Taking
4 Steps to Intelligent Risk Taking 4 Steps to Intelligent Risk Taking
4 Steps to Intelligent Risk Taking PECB
 
Model Risk Management : Best Practices
Model Risk Management : Best PracticesModel Risk Management : Best Practices
Model Risk Management : Best PracticesQuantUniversity
 
Comprehensive Overview Of Risk Management
Comprehensive Overview Of Risk ManagementComprehensive Overview Of Risk Management
Comprehensive Overview Of Risk ManagementAndrew Valenti
 
Portfolio Optimization Using MAD
Portfolio Optimization Using MADPortfolio Optimization Using MAD
Portfolio Optimization Using MADFilippas Beteniotis
 
Risk Analysis & Risk Management
Risk Analysis & Risk ManagementRisk Analysis & Risk Management
Risk Analysis & Risk ManagementGrafic.guru
 
Decision and risk analysis
Decision and risk analysisDecision and risk analysis
Decision and risk analysisIndra Biswakarma
 
Mastering Risk Assessment
Mastering Risk AssessmentMastering Risk Assessment
Mastering Risk Assessmentsimurares
 
Improve Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsImprove Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsResolver Inc.
 
Assessment Of Risk Mitigation
Assessment Of Risk MitigationAssessment Of Risk Mitigation
Assessment Of Risk MitigationEneni Oduwole
 
ISO 31000 risk management process
ISO 31000 risk management processISO 31000 risk management process
ISO 31000 risk management processMuizz Anibire
 

Tendances (20)

ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
 
Management of risks and implication on the nigerian manufacturing sector
Management of risks and implication on the nigerian manufacturing sectorManagement of risks and implication on the nigerian manufacturing sector
Management of risks and implication on the nigerian manufacturing sector
 
Project Risk Management_O2D
Project Risk Management_O2DProject Risk Management_O2D
Project Risk Management_O2D
 
Executive Travel, Keeping Your Employees Safe
Executive Travel, Keeping Your Employees SafeExecutive Travel, Keeping Your Employees Safe
Executive Travel, Keeping Your Employees Safe
 
Model risk management: a primer
Model risk management: a primerModel risk management: a primer
Model risk management: a primer
 
Quantitative Techniques and Concepts in Finance
Quantitative Techniques and Concepts in FinanceQuantitative Techniques and Concepts in Finance
Quantitative Techniques and Concepts in Finance
 
4 Steps to Intelligent Risk Taking
4 Steps to Intelligent Risk Taking 4 Steps to Intelligent Risk Taking
4 Steps to Intelligent Risk Taking
 
Risk management
Risk managementRisk management
Risk management
 
Model Risk Management : Best Practices
Model Risk Management : Best PracticesModel Risk Management : Best Practices
Model Risk Management : Best Practices
 
Comprehensive Overview Of Risk Management
Comprehensive Overview Of Risk ManagementComprehensive Overview Of Risk Management
Comprehensive Overview Of Risk Management
 
risk analysis
 risk analysis risk analysis
risk analysis
 
Risk analysis
Risk analysis  Risk analysis
Risk analysis
 
Portfolio Optimization Using MAD
Portfolio Optimization Using MADPortfolio Optimization Using MAD
Portfolio Optimization Using MAD
 
Risk Analysis & Risk Management
Risk Analysis & Risk ManagementRisk Analysis & Risk Management
Risk Analysis & Risk Management
 
Decision and risk analysis
Decision and risk analysisDecision and risk analysis
Decision and risk analysis
 
Mastering Risk Assessment
Mastering Risk AssessmentMastering Risk Assessment
Mastering Risk Assessment
 
Risk Management Primer
Risk Management PrimerRisk Management Primer
Risk Management Primer
 
Improve Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsImprove Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 Steps
 
Assessment Of Risk Mitigation
Assessment Of Risk MitigationAssessment Of Risk Mitigation
Assessment Of Risk Mitigation
 
ISO 31000 risk management process
ISO 31000 risk management processISO 31000 risk management process
ISO 31000 risk management process
 

En vedette (7)

Trn 08
Trn 08Trn 08
Trn 08
 
D john peter
D john peterD john peter
D john peter
 
Trn 10
Trn 10Trn 10
Trn 10
 
Piyush govil archana_sharma
Piyush govil  archana_sharmaPiyush govil  archana_sharma
Piyush govil archana_sharma
 
Trn 11
Trn 11Trn 11
Trn 11
 
Trn 09
Trn 09Trn 09
Trn 09
 
The Impact of Low Speed Pre-Ignition on Next Generation Engine Oils
The Impact of Low Speed Pre-Ignition on Next Generation Engine OilsThe Impact of Low Speed Pre-Ignition on Next Generation Engine Oils
The Impact of Low Speed Pre-Ignition on Next Generation Engine Oils
 

Similaire à Rsc 05

Project risk management
Project risk managementProject risk management
Project risk managementEr Swati Nagal
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxGeorgeKabongah2
 
Ratneshwar jha risk analysis and mitigation precedence modeling
Ratneshwar jha   risk analysis and mitigation precedence modelingRatneshwar jha   risk analysis and mitigation precedence modeling
Ratneshwar jha risk analysis and mitigation precedence modelingPMInstituteIndia
 
BBA 4226, Risk Management 1 Course Learning Outcomes .docx
 BBA 4226, Risk Management 1 Course Learning Outcomes .docx BBA 4226, Risk Management 1 Course Learning Outcomes .docx
BBA 4226, Risk Management 1 Course Learning Outcomes .docxaryan532920
 
Risk Management
Risk ManagementRisk Management
Risk Managementrajuinstru
 
BBA 4226, Risk Management 1 Course Learning Outcomes
 BBA 4226, Risk Management 1 Course Learning Outcomes  BBA 4226, Risk Management 1 Course Learning Outcomes
BBA 4226, Risk Management 1 Course Learning Outcomes MargaritoWhitt221
 
Running head RISK MANAGEMENT PLAN 1RISK MANAGE.docx
Running head RISK MANAGEMENT PLAN          1RISK MANAGE.docxRunning head RISK MANAGEMENT PLAN          1RISK MANAGE.docx
Running head RISK MANAGEMENT PLAN 1RISK MANAGE.docxtoltonkendal
 
Use of Causeand Effect Diagrams for Risk Management
Use of Causeand Effect Diagrams for Risk ManagementUse of Causeand Effect Diagrams for Risk Management
Use of Causeand Effect Diagrams for Risk ManagementProcept Associates
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaPankaj K Sinha
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)Priya Tomar
 
5 Project Risk Identification Tools I Use & How You Can Use Them Too
5 Project Risk Identification Tools I Use & How You Can Use Them Too5 Project Risk Identification Tools I Use & How You Can Use Them Too
5 Project Risk Identification Tools I Use & How You Can Use Them TooSHAZEBALIKHAN1
 
Session 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis ISession 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis IMuizz Anibire
 
Pm610 1103 b-02-schwappach-loren-p5-db6
Pm610 1103 b-02-schwappach-loren-p5-db6Pm610 1103 b-02-schwappach-loren-p5-db6
Pm610 1103 b-02-schwappach-loren-p5-db6Loren Schwappach
 
Adopting the Quadratic Mean Process to Quantify the Qualitative Risk Analysis
Adopting the Quadratic Mean Process to Quantify the Qualitative Risk AnalysisAdopting the Quadratic Mean Process to Quantify the Qualitative Risk Analysis
Adopting the Quadratic Mean Process to Quantify the Qualitative Risk AnalysisRicardo Viana Vargas
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docxtarifarmarie
 
Risk Management Appraisal - A tool for successful Infrastructure project
Risk Management Appraisal - A tool for successful Infrastructure projectRisk Management Appraisal - A tool for successful Infrastructure project
Risk Management Appraisal - A tool for successful Infrastructure projectIRJET Journal
 
1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docxfelicidaddinwoodie
 
Software Project Risk Management Practice in Oman
Software Project Risk Management Practice in OmanSoftware Project Risk Management Practice in Oman
Software Project Risk Management Practice in OmanEECJOURNAL
 
Safety hazard-identification-on-construction-projects
Safety hazard-identification-on-construction-projectsSafety hazard-identification-on-construction-projects
Safety hazard-identification-on-construction-projectsAHMED NADIM JILANI
 

Similaire à Rsc 05 (20)

Project risk management
Project risk managementProject risk management
Project risk management
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
 
Ratneshwar jha risk analysis and mitigation precedence modeling
Ratneshwar jha   risk analysis and mitigation precedence modelingRatneshwar jha   risk analysis and mitigation precedence modeling
Ratneshwar jha risk analysis and mitigation precedence modeling
 
BBA 4226, Risk Management 1 Course Learning Outcomes .docx
 BBA 4226, Risk Management 1 Course Learning Outcomes .docx BBA 4226, Risk Management 1 Course Learning Outcomes .docx
BBA 4226, Risk Management 1 Course Learning Outcomes .docx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
BBA 4226, Risk Management 1 Course Learning Outcomes
 BBA 4226, Risk Management 1 Course Learning Outcomes  BBA 4226, Risk Management 1 Course Learning Outcomes
BBA 4226, Risk Management 1 Course Learning Outcomes
 
Running head RISK MANAGEMENT PLAN 1RISK MANAGE.docx
Running head RISK MANAGEMENT PLAN          1RISK MANAGE.docxRunning head RISK MANAGEMENT PLAN          1RISK MANAGE.docx
Running head RISK MANAGEMENT PLAN 1RISK MANAGE.docx
 
Use of Causeand Effect Diagrams for Risk Management
Use of Causeand Effect Diagrams for Risk ManagementUse of Causeand Effect Diagrams for Risk Management
Use of Causeand Effect Diagrams for Risk Management
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K Sinha
 
8. project risk management
8. project risk management8. project risk management
8. project risk management
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
5 Project Risk Identification Tools I Use & How You Can Use Them Too
5 Project Risk Identification Tools I Use & How You Can Use Them Too5 Project Risk Identification Tools I Use & How You Can Use Them Too
5 Project Risk Identification Tools I Use & How You Can Use Them Too
 
Session 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis ISession 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis I
 
Pm610 1103 b-02-schwappach-loren-p5-db6
Pm610 1103 b-02-schwappach-loren-p5-db6Pm610 1103 b-02-schwappach-loren-p5-db6
Pm610 1103 b-02-schwappach-loren-p5-db6
 
Adopting the Quadratic Mean Process to Quantify the Qualitative Risk Analysis
Adopting the Quadratic Mean Process to Quantify the Qualitative Risk AnalysisAdopting the Quadratic Mean Process to Quantify the Qualitative Risk Analysis
Adopting the Quadratic Mean Process to Quantify the Qualitative Risk Analysis
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
 
Risk Management Appraisal - A tool for successful Infrastructure project
Risk Management Appraisal - A tool for successful Infrastructure projectRisk Management Appraisal - A tool for successful Infrastructure project
Risk Management Appraisal - A tool for successful Infrastructure project
 
1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx
 
Software Project Risk Management Practice in Oman
Software Project Risk Management Practice in OmanSoftware Project Risk Management Practice in Oman
Software Project Risk Management Practice in Oman
 
Safety hazard-identification-on-construction-projects
Safety hazard-identification-on-construction-projectsSafety hazard-identification-on-construction-projects
Safety hazard-identification-on-construction-projects
 

Plus de PMInstituteIndia (20)

Trn 07
Trn 07Trn 07
Trn 07
 
Trn 06
Trn 06Trn 06
Trn 06
 
Trn 05
Trn 05Trn 05
Trn 05
 
Trn 04
Trn 04Trn 04
Trn 04
 
Trn 03
Trn 03Trn 03
Trn 03
 
Trn 02
Trn 02Trn 02
Trn 02
 
Trn 01
Trn 01Trn 01
Trn 01
 
Trn 12
Trn 12Trn 12
Trn 12
 
Sps 01
Sps 01Sps 01
Sps 01
 
Sft 03
Sft 03Sft 03
Sft 03
 
Sft 02
Sft 02Sft 02
Sft 02
 
Sft 01
Sft 01Sft 01
Sft 01
 
Sft 04
Sft 04Sft 04
Sft 04
 
Rsc 06
Rsc 06Rsc 06
Rsc 06
 
Rsc 04
Rsc 04Rsc 04
Rsc 04
 
Rsc 03
Rsc 03Rsc 03
Rsc 03
 
Rsc 02
Rsc 02Rsc 02
Rsc 02
 
Rsc 01
Rsc 01Rsc 01
Rsc 01
 
Rsc 07
Rsc 07Rsc 07
Rsc 07
 
Pmt 05
Pmt 05Pmt 05
Pmt 05
 

Dernier

Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 

Dernier (20)

Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 

Rsc 05

  • 1. Aum gam ganapataye namya. Risk Analysis and Mitigation Precedence Modeling Ratneshwar Jha Infosys Technologies Ltd
  • 2. Contents 1.1 Abstract: 3 1.2 Introduction 3 1.3 Risk Influnce Factor Analysis 3 1.4 Risk Netwok Generation 4 A. Risk Discovery 4 B. Risk Dependency Analysis 5 1.5 Risk Proritization 8 1.6 Risk Dependency Analysis 10 1.7 Mitigation Analysis 11 1.8 Conclusion 13 1.9 References 13 1.10 Author(s) Profile 14 2|Page
  • 3. 1.1 Abstract: Risk analysis is crucial process in project management. Present risk analysis models analyze risks independently and are static. That is, current models don’t account for the effect of one risk on another and don’t predict how the risks might behave in future. This model introduces the concept of risk dependencies with a mathematical model which makes risk analysis sophisticated and futuristic. Index Terms: RIF, Risk Dependency, Contribution factor, Alone mitigation factor, Total Mitigation factor and Risk Exposure. 1.2 Introduction The term risk has its own meaning and perspective in different processes. In the present scenario risks can also be viewed as an opportunity to gain competitive advantage. Thus based on this insight risk can be defined as “A probable event which has potential negative or positive impact on the business process or project objective”. This paper proposes an integrated approach to risk analysis process which is more planned, opportunistic and robust. The proposed risk analysis model concentrates on risk analysis part of risk management process and offers a logically structured way to quantify and mitigate risk. This article is organized as follows: a) Risk Influence Factor, which deals with vulnerability of system with respect to external factors. b) Risk Network Generation, is divided into two parts: What-If and Why Analysis which is risk discovery process and Risk Dependency Analysis which is actual process of Risk Network Generation. c) Risk Prioritization, in this phase each node in the risk network is analyzed based on cost time benefit and time priority associated with it. d) Risk dependency analysis, in this phase, each risk inside top priority groups will be analyzed and prioritized based on the mitigation factors. e) Mitigation Analysis, which signifies mitigation effort variation with respect to time. 1.3 Risk Influnce Factor Analysis Risk Influence Factor [1] (RIF) signifies all the factors are influencing a risk category as per the present condition under which project is undertaken. It plays a significant role in estimating the basic dimensions of a risk in terms of probability of risk’s occurrences. RIF’s analysis can be best represented by Bayesian Networks [3] in which each RIF represents a parent node to a risk node which is identified. For instance suppose a risk of Human Resource (HR) category is identified in a project, before estimating its impact and probability of occurrence, all RIFs should be mapped with respect to time of occurrence of the upcoming risk. Salary, Place of Joining and motivation for higher studies, Opportunities within project/Company can be some RIFs which can influence a risk of HR category. A general statement can be put forward “The more influential are RIFs for a risk category, the more chances of risk to happen in that category and impact depends upon the current phase of project”. Thus RIFs portray a basic picture 3|Page
  • 4. of risks which is helpful in estimating the parameters like probability of risk occurrence. The formula to calculate probability of occurrence of a risk node is: P(R) = P(R| PA(RRIF) . (1) Where PA(RRIF) represents all the RIF acting on the risk of particular category 1.4 Risk Netwok Generation All Risk model is based on the subjective notion of probability and assumptions. Therefore, this model is based on the following assumptions: a. The exposure of a risk E(R) is a function of time(t) and mitigation effort(M), mathematically it can be expressed as : E (Ri) = f (t,M) Variation of risk exposure on time can be realized when mitigation effort (M) 0 which results in three possible scenarios: i. E(Ri) is directly proportional to t; with the increase in time risk exposure increases. ii. E(Ri) is inversely proportional to t; with the increase in time risk exposure decreases. iii. E(Ri) is independent to t; Risk Exposure remains unaffected by time. Note: The proposed risk analysis model deals with the scenario where Risk Exposure is directly dependent on time (Scenario i). A. Risk Discovery Risk discovery is an important activity in risk analysis process which applies to all phases of the project. The process of risk discovery has to be revisited periodically and its frequency depends on project health. Apart from the standard process, two variants will be covered in detail: a. What-If and Why analysis b. Risk Dependency Analysis 1. What If And Why Analysis This approach takes input as “What-If” scenario for each risk category in the project and then answer “Why” for the “What-If”. That is, “What-If” identifies the potential fault points in the projects and the answer to the question “Why” provides proper validation and authentication for the risk (fault-points) discovered. The scenario in a typical project which is discussed below makes “What-If” understanding more clear: “What-If”: Requirement Change (Risk Category: Client) “Why”: Requirement document is not clear enough. 4|Page
  • 5. “What-If”: Too less design Engineers. (Risk Category: Human Resource) “Why”: The coming project is to be built on new design tool. Here in both above scenarios, it is evident that “What-If” & “Why” scenario helps us to discover & identify new risks like “Requirement Change” and “Too less design Engineers”. It can be observed that “Why” itself recursively generates potential risks like “New design tool” from second scenario or “Lack of proper communication between onsite and offshore team” from first scenario. Therefore, the “What-If” & “Why” scenario should be recursively executed till “Why” does not regenerate any more risks. Hence, the process of Risk discovery and identification is explained in the figure 1.1 below: Fig 1.1: Risk Identification process based on “What-If and Why” Analysis B. Risk Dependency Analysis Risk dependency analysis is fundamental activity in the proposed model. The idea behind the risk dependency derived from an old proverb “Problem does not come alone.”, that is, if the individual problem is scrutinized then lot of small and big problems can be identified that are attached to a given problem. Likewise, the risk should not be treated as individual entity as it is perceived in the current project risk models rather it should be perceived as the related entities which overall influences the decision making process in mitigating the risk. This model identifies the dependencies between the risks and analyses risks based on the identified relationship(s). We will here discuss an algorithm which builds risk network based on the risks identified by “What-If & Why Analysis” described above. Algorithm 1: Generating Risk Network INPUT: Risk set R identified through “What-If & Why Analysis” process, that is, R = {R1, R2, R3…. Rn) For each risk element Rx belonging risk category Cm; 1. In same category Cm, identify risk Ry which may affect Rx. If (Ry does not belong to risk set R, validate it through “What-If &Why Analysis”); Add Ry to risk set R. If (No edges are present between Rx and Ry and If Rx is largely affected by Ry); then the relationship structure would be: 5|Page
  • 6. Ry Rx If (No edges are present between Rx and Ry and Rx is largely affecting Ry,) then the relationship structure would be: Rx Ry 2. Follow the same process as step 1 for Rx for risk categories other than Cm End: When the whole risk set relationship analysis is done. The algorithm1 discovers new risks which are validated through “What-If & Why Analysis” and builds risk network of all the risk. To elaborate the Risk dependency analysis in detail, consider a generic example in which R1, R2, R3, R4 and R5 are identified in the risk discovery phase. For each risk discovered, for example, R1 is taken first and it was observed that R2, R5 (belonging to same category of R1) and R3 (belonging to different category from R1) risk influences R1. This can be graphically put like: R2 risk is affected by R4 and R5. R3 is affected by R5 and R6 (New risk found in process of analyzing dependency). R6 risk affects R3 and R5. Thus the risk network tree will assume the shape as: Fig 3.4: Risk network tree based on above assumption Thus mathematically risk dependency can be viewed as partially connected graph defined by G=(V,E), where V={Ri : i є N and R is the all risk discovered}, that is they are risk nodes discovered which is represented as circle with the risk name along with risk attributes like risk category, risk exposure, time for mitigation, total mitigation factor. All these attributes will be discussed later in the paper. E={ Ri ← Rj ; Rj is affecting Ri with dependency factor Cji }, that is, they are the edges which connects two dependent risk with some dependency factor Cji. The risk network which is obtained is a directed acyclic graph (DAG) which inherits Bayesian characteristics. [2] The risk dependency analysis can help in identifying new risks. Suppose in a critical project, it was identified that customer involvement is minimal in a project. Hence, it can be identified as a potential risk. If it is identified as a risk, then from the below discussion we will see how the risk dependency process helps us to identify some new risks based on this risk. 6|Page
  • 7. Parent Risk: Minimal Customer Involvement Risk Category: Customer category The process of risk dependency is for new risk discovery is as follows: Step 1: Identify child risk that can add strength to parent risk within the parent category. After analyzing the various factor in the customer domain. It can be inferred that customer acceptance could be potential risk as they might not acceptance the design, because of the reason that their participation was minimal. Step 2: Identify the risks of other categories that may after the parent risk. It could be: Project specific factor: Requirement changes There is maximum chance that the requirement of customer may change which is due to the parent risk. Quality category: Quality Commitment If the customer involvement is minimal then there are chances that it might affect the overall quality of the product as expected by customer. These new identified risks should be validated through WHAT IF AND WHY analysis before considering them as a risk. Thus risk dependency identification might help us in identifying new potential risk. Again the above example is just a demonstration; conditions may differ from project to projects. For example in some projects there might not be any problem if the customer involvement is low. Therefore in those projects there is no question of analyzing this further. Here it can be inferred that risk is very subjective concept which assumes different meaning in different context. It should be viewed relatively than absolutely as it is done is current model. The question is how to define the dependency factor (how much child risk contributes parent in terms of impact) of child risk. This will be followed in more detail in the following section. a) RISK DEPENDENCY FACTOR Risk dependency factor signifies how much the child risk contributes to the parent risk on project. Consider a generic example in which two risks are connected with dependency factor Cmn as shown below in figure: Fig: 3.5: Risk dependency between two risks. 7|Page
  • 8. Here in Fig 3.5, arrow from Rm to Rn denotes direction of impact of risk Rm over its parent Rn which is denoted by Cmn. The value of Cmn can be calculated as follows: Cmn = (P(Rn| Rm) ) * (I(Rm) / ( I(Rn) + I(Rm) ) ) (2) Where, P(Rn| Rm) represents conditional probability of Rn (Child Risk) risk when Rm (Parent Risk) has already occurred and (I(Rm) / ( I(Rn) + I(Rm) ) represents the contribution of parent risk impact over child risk. It can be figured out that for strong dependencies, the probabilities of occurrence of child risk shows high degree of correlation with parent risk. That is, if there is high probability of occurrence parent risk then there will be high chances of child risk to happen when connected via strong dependency relationship. Thus co-relation helps us to estimate and validate the probability of occurrence. 1.5 Risk Proritization After the risk is discovered and its attributes are defined, the next step is to prioritize the risk. Unlike the current model, this model makes use of the current assumption described in paper. Hence, this model does not take impact as prime factor to prioritize the risk rather it takes other factors to churn out the opportunity factor associated with the risk. In this model risk is prioritized based on the three parameters: a. Risk Exposure. b. Mitigation Exposure. c. Risk dependency analysis. 1. RISK EXPOSURE ANALYSIS In this phase of risk analysis, risk exposure is calculated which signifies how much a process is exposed to a given risk. This is calculated by simple formula: RE (R) =Impact * probability of occurrence (3) Here, Impact of a risk on project must be analyzed based on the effect of a risk on project goals. Therefore, for each project goal impact should be graded on scale of 1-10. And the final impact of risk will be: Impact(Ri) =∑Impact(ProjectGoals)/∑j (4) Here, ∑ Impact (Project Goals) is summation of impact on all project goals for a risk Ri. and ∑ j is total number of project goals identified in a project. Thus Impact of a risk is average of its impact on project goals. Probability of occurrence signifies the chance of occurrence of risk during project execution. It should be noted that while analyzing the risk dependency the Impact and probability of occurrence should satisfy the inequalities mentioned in Eq. 1. 2. MITIGATION EXPOSURE Mitigation Exposure signifies the amount of positivity gained in business process when a particular risk is mitigated to a large extent. Hence this factor in the risk analysis explores the opportunity angle of a particular risk. As the business 8|Page
  • 9. process has major axis viz. time and cost, hence the Mitigation exposure takes these axes into account and formulates on the following factors: a) Cost Benefit Factor b) Time factor Both the factors will be taken up in detail in following section. a. COST BENEFIT FACTOR This factor describes the relative cost benefit associated with the risk. It can be defined as follows: CBF (R) = (1- (Cost of Mitigation/Amount on stake))*10 (5) Whereas, Amount on stake, can be calculated through the schedule slippage which is standard followed in most of the software projects. Apart from this, when amount on stake cannot be directly computed from schedule slippage then amount of stake can be looked as the risk category fraction in the project cost that it carries away. It can be useful when the nature of risk is subjective, that is, there is no way to calculate the Amount on stake objectively. It can be calculated as: Amount on Stake= Cost Impact Factor * Risk category share in project cost (6) Whereas the Cost impact factor to be graded on scale of 1-10, this represents the impact of the risk on the risk category cost in project. Cost Impact Factor Factor Value STRONG 0.7 to 1.0 MEDIUM 0.4 to 0.7 WEAK 0.1 to 0.4 Table 4.1: Showing Cost Impact Factor Fig 4.1: A hypothetical cost based categorization of risk category. Suppose a hypothetical cost based categorization of risk category in a project as depicted in the Fig 4.1.Here we see the overall project cost is divided among the risk categories which are identified in the project, the amount on stake in the above equation is the relative share of the risk of a risk’s category pie. Like suppose a risk in 9|Page
  • 10. HR category expected to occur then the amount of stake is the risk share in HR occupied pie. The above pie share expected to be roughly completed in pre-project analysis depending on the requirements and SLAs and other business documents. Cost of Mitigation is the total cost involved in mitigating the risk. It involves the both direct costs like Human resource utilization cost, software/hardware cost, Logistic utilization cost and hidden costs like penalty clause in SLA and others. b. TIME FACTOR This factor signifies the relative time factor associated with the risk. It is based on the assumption that risks which have higher time of mitigation should come low in mitigation. That is risk of near visibility of occurrence should be taken up against others. The time factor can be calculated as follows: TF (R) = ETM/TTM (7) Where, a. Total time for mitigation (TTM) is the time period in working hrs from when the risk is identified till the time the given risk is expected to trigger. b. Expected time for Mitigation (ETM) is the time required to mitigate the risk to a large extent. Fig 4.2: Depicting ETM and TTM in time analysis It should be noted that for constant risk which does not varies with the time should be given constant value for the above ratio analyzing the above part. After having all the above analysis, the alone mitigation strength which signifies the drive for mitigating particular risk, can be calculated as follows: AMF(R) = RE (R) * ME (R) (8) Where mitigation exposure of risk R can be calculated as ME(R) = (CBF(R) + TF (R)) / 2 (9) 1.6 Risk Dependency Analysis This manuscript talk of collectivism in risk mitigation is talked than the individualism, that is, risks are viewed as related entities rather than with respect to risk mitigation analyzed. Therefore it will show how these dependencies affect in decision for mitigating the risk. Assume that Cji denotes the dependency factor of riskJ on riski. 10 | P a g e
  • 11. Total Mitigation Exposure factor (TMF) denotes overall the willingness to mitigate a risk. The Total Mitigation Exposure Factor for risk Ri can be calculated as follows: TMF (Ri) = ∑ i ∑j (AMF(Ri ) + TMF (Rj) * Cjj) (10) Where riski and riskj are connected risks through dependency factor Cji. and j є R -> [1,n] ,i є R -> [j-1,n] where n is number of nodes in graph. The above formula takes each risk alone mitigation factor (AMF) into consideration and iterates though each child risk to calculate the total mitigation factor of a risk. That is, TMF is summation of alone mitigation factor of parent risk and the individual contribution of child risk towards the mitigation factor of parent risk. Applying the formula (9) on the Figure 3.4 the Total Mitigation factor of each risk based on the above formula is: a. TMF(R5)=AMF(R5) b. TMF(R4)=AMF(R4) c. TMF(R2)=AMF(R2)+TMF(R5)*C25 +TMF(R4)*C24 d. TMF(R3)=AMF(R3)+ TMF(R4)*C34 e. TMF(R1)=AMF(R1)+TMF(R2)*C12+ TMF(R4)*C14+ TMF(R3)*C13 Where AMF is alone mitigation factor and TMF is Total mitigation factor of a risk. Here for R5 and R4 AMF and TMF are same as there is no child risk is connected to it, that is, no risk is affecting its alone mitigation factor. Hence based on the TMF of each risk, each risk should be prioritized for mitigation. 1.7 Mitigation Analysis Once all these factors are decided upon, risk can be extrapolated in future to visualize its behavior in future which can be defined though risk mitigation line. Hence risk mitigation line can help in planning business process in better way. Risk Mitigation curve is defined by the simple linear equation: TMF (Ri) = S (Ri) * TM+ TMF (Ri)o (11) Where, TMF (Ri)o: Initial Total Mitigation Factor of risk Ri and Expected time for mitigation (Tm) (ETM) and S(Ri) represents slope of the line which is equal to (TMF(Ri)Minimal-TMF(Ri)o)/TM (12) Where TMF (Ri)Minimal, which is shown by green line in fig 6.1, is the minimal value for TMF (Ri) for which the risk can be accepted or no longer beneficial to mitigate it. Fig: 6.1: Analysis of TMF with Time 11 | P a g e
  • 12. The amount of mitigation can be calculated at a given instance will be{TMF(Ri)o -TMF (Ri)t} / TMF (Ri)o. Thus the mitigation can follow any curve which depends on the mitigation strategy followed to mitigate that risk. Therefore, along with linear flavor of risk mitigation it can follow non-linear curves like logarithmic curve, which can be followed if the risk is falls in top priority category. For the sake of simplicity, linear curve is talked about. Risks that do not vary with the time can be realized as a line parallel to the time axis, that is its TMF and Risk exposure does not changes with time. Fig: 6.2: Mitigation achieved after some time t All other factors like Cij follow the same equation with the above calculated slope. Hence at any given point of time the TMF of a risk can be predicted. Note that the value derived by this is not the actual value but it is an estimated value of that risk at that point of time. Hence actual TMF value at times can be in 3 regions of the above curve: Below the line: If actual TMF value is below the line then, it can be followed that risk mitigation strategy is way above the expectations. Hence it is positive sign. On the line: If actual TMF value is on the line then, it can be followed that risk mitigation strategy is at par the expectations. Above the line: If actual TMF value is above the line then, it can be followed that risk mitigation strategy is below the expectations. Hence it is negative sign; something more in terms of effort should be put to mitigate the same. Having the clear understanding of the above, we can graphically conclude which risk in the future will have what impact on business process at a given point of time. In the above figure, curve signifies the maximum actual value that can TMF of a risk can take up at any given point of time. Again this can be standardized for a particular process. TMF value above than this curve denotes that mitigation is not is not complying with the mitigation plan. One way to define that threshold curve mentioned above is to assume a circle having centre at any point on the line and radius as a unit (1 or 2). The d/dx (tangent) on the diametric point defines the threshold region which will be parallel to the line defined by above equation. Fig 6.3: Plotting a set of risks in graph together 12 | P a g e
  • 13. Now, considering all the risks together and plotting them together (Fig 6.3) will generate a picture how the risks are going to behave in future and thus we can estimate what all risk can come up as high priority. Here in the Fig 6.3, initially, that is at t=0, the order of risk priority was R1> R2 > R3. Then at t1 time according to graph the order of risk priority changed to R2 > R1 > R3. And finally at time t2, the order of priority took the shape like R2 > R3.Thus with this kind analysis the business process can be planned in more robust and sophisticated way. 1.8 Conclusion The Integrated Risk Analysis Model enlists all the parameters that is used by existing Risk Analysis Models in software project management and introduces concept of risk dependency which came out to be beneficial and crucial factor in Risk Analysis. It is shown that how to identify the dependencies between risk and how it can be used in risk analysis through a series of mathematical formulations. Through a series of mathematical formulations, the risk behavior and amount of mitigation at any point of time can be predicted. Therefore it is robust and futuristic than the current models of risk analysis. 1.9 References 1. Xue-Hui Ren, Yuan-Hua Li,Hong-Xia Tian, Study On Environmental Risk Influence Factor Of Tongliao,Applied Artificial Intelligence (pp 678-685).World Scientific. 2. J. Pearl, "Aspects of Graphical Models Connected With Causality," UCLA Cognitive Systems Laboratory, Technical Report (R-195-LL). In Proceedings of the 49th Session of the International Statistical Institute, Italy, Tome LV, Book 1, Florence, 399-401, August 1993. 13 | P a g e
  • 14. 1.10 Author(s) Profile Author is having 3 years of work experience in Software field. He had been associated with Infosys Technologies Ltd from (Oct 2007 – Oct 2010). Now currently associated with Xchanging Pvt Ltd. He completed his B.E Degree in Information Science from Visvesvaraya Technological University in 2007. E-mail: ratneshwar.jha01@gmail.com 14 | P a g e