SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
The International Journal Of Engineering And Science (IJES)
||Volume||2 ||Issue|| 6 ||Pages|| 12-16||2013||
ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805
www.theijes.com The IJES Page 12
Task Oriented Risk Assessment - A Risk Assessment Tool
Maushumi Lahon
1,
Department of CS and IT Don Bosco College of Engineering and Technology
A Constituent Unit of Assam Don Bosco University
Working with Department of CE & Application,
Assam Engineering Institute
------------------------------------------------------------Abstract----------------------------------------------------------------
It is a well known fact that projects get delayed and sometimes they fail due to insufficient knowledge regarding
the causes of the failure as well as because of not identifying the critical points which require special attention.
A proactive exercise is very important in order to identify and find those aspects which need more attention in
order to avoid delays and failures. In this paper an attempt is made to explain the Task Oriented Risk
Assessment concept as a tool which can assist in identifying those tasks and events which require more
attention. A detailed description of the Risk Exposure assessment of tasks using Risk Exposure assessment of
failure events, assessment of precedence tasks and position of the tasks in the network schedule is proposed. The
risk assessment for a particular issue forms the foundation for making a decision about future actions which
may lead to additional analyses, perform activities that reduce the risk, or do nothing at all. This assessment is
based on identifying the tasks and subtasks in a project and then identifying the events which are responsible for
the failure of the tasks which may alternatively be termed as the reasons which are the causes for the failure of
the task.
KEYWORDS : Event, Impact, Project, Risk Assessment, Task
-------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 29th
May 2013, Date of Publication: 18.June.2013
-------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
To complete a project or a task it is necessary to cope up with the uncertainties it may face. Events for
which the organisation is not prepared for can cause a negative impact like time overrun, cost overrun etc.
Therefore, formal methods are essential to identify these uncertainties which can assist the decision making
process and minimise loss [7]. The problem is to identify the cause-effect relationship between the events, their
triggers, their effects and severity of the impact and then propose a feasible solution to combat the situation.
Further it is also important to identify which method or technique should be used for which problem and in
which industry. Projection and Quantification of risk is a major challenge in the area of risk analysis and
management which requires detailed description of the tasks associated with every objective and then identify
the factors which may have a positive or negative effect on the task. Finally, design a formal procedure for
identification of the factors, analyse them and initiate proactive measure to minimize the negative effects.Risk
assessments also enable risk response and mitigation strategies to be expressed.Cost/benefit analysis can be used
to compare risk mitigation strategies and understand howeffectively the money would be spent[1].To assist in
this proactive exercise we propose TORA (Task Oriented Risk Assessment) [10] as a tool for risk assessment in
order to contribute to the success of a project.
II. BACKGROUND
There are various approaches to riskmanagement in the literature on risk management. These
approaches vary among researchers, and preference for a certain approach mostly depends on the type of the
project and the environment [6]. Two approaches that can be distinguished are: an evaluation approach and a
management approach [2].The evaluation approach consider risk management as an analysis process that aims
at determining the risk factors [2]. Information about project failure and its causes are collected andthis
information is used in checklists for risk identification. The contribution of risk management to project success
is indirect, because the information collected is used in future projects. The management approach considers risk
management to be a management instrument by which information is collected and analysed to support the
decisionmaking process in a particular project. This approach does not look for generic risks, but instead focuses
on managing the risks that are relevant in the project in question. Concentrating on the management approach
here we are trying to use the task based concept for assessing risk which in turn will act as a security net in the
decision making process. Risk assessment fully discloses the sensitivity of the project to its participants to
Task Oriented Risk Assessment...
www.theijes.com The IJES Page 13
ensure that all threats are fully understood [3] . As a result, accurate understanding of potential challenges, and
risk mitigation strategies can also be created in advance.
III. CONCEPT OF TORA
Task Oriented Risk Assessment starts from the point when a work breakdown structure of the project is
made[10]. The Work Breakdown Structure provides the base for identification of the tasks and subtasks. Next
step is to identify the events that are responsible for the failure of these tasks. After identification of the events,
the Risk Exposure of each of the event is to be ascertained. There are two parameters that contribute to this
calculation of Risk Exposure: i) frequency of occurrence of the event and ii) impact [5]. Frequency of
occurrence is classified into five classes and impact is classified into four classes. Frequency of occurrence is
classified as Frequent, Occasional, Seldom and Unlikely. Impact is classified as Catastrophic, Critical, Marginal
and Negligible. Based on the combination of these two parameters, Risk exposure of each event is classified as
Very High, High, Moderate and Low. The following tables represents the conditions when a task or event’s
Frequency of occurrence is classified into five categories and when an Impact is to be considered as
Catastrophic, Critical, Marginal or Negligible.
Table 1: Frequency of occurrence categories
Frequency of
occurrence
Condition
Frequent Occurs very often in the life time of the project
Very Likely Will occur several times during the life time of
the project
Occasional Will occur during the life time of the project
Seldom May occur during the life time of the project
Unlikely Can consider that it will not occur during the life
time of the project
The following table represents the conditions when an Impact is to be considered as Catastrophic, Critical,
Marginal or Negligible.
Table 2 : Impact categories
Impact Condition
Catastrophic Project failure, loss of life or system
Critical Major project setback, permanent disability or
severe injury to human or major system damage
Moderate Minor setback to the project, minor injury and
occupational illness and minor system damage
Negligible No considerable damage to project, human or
system
After categorising the Frequency of Occurrence and Impact the following table reflects the corresponding Risk
Exposure depending on the two parameters.
Table 3: Table representing the Risk Exposure of an Event
Impact Catastro
phic
Critical Marginal Negligible
Frequency of
Occurrence
Frequent Very
High
Very
High
High Moderate
Very Likely Very
High
High Moderate Low
Occasional High High Moderate Low
Seldom High Moderate Low Low
Unlikely Moderate Low Low Low
Sometimes a task may be directly assessable based on the study of closure reports or from expert judgements. In
those cases it may not be necessary to go for listing of events and further analysis. For those tasks risk may be
assessed directly by the two aforesaid parameters i.e. its frequency of failure and the impact that may happen in
Task Oriented Risk Assessment...
www.theijes.com The IJES Page 14
case of its failure. In case a task needs to be assessed using the Risk Exposure results of the events that may lead
to its failure, the following section presents a detailed illustration on this.
IV. CRITERIA FOR RISK ASSESSMENT
Those tasks that cannot be assessed for its Risk Exposure directly are proposed to be assessed based on
the following three parameters. This step is an addition to the concept introduced against TORA [10] :
i) Risk Exposure of the task based on failure events
ii) Number of precedence tasks with their Risk Exposure, and
iii) The position of the task and the precedence task/tasks in the Network diagram.
4.1. ILLUSTRATION
Consider a task T with five failure events E1,E2,E3,E4 and E5 and each have been evaluated with a
specific Risk Exposure Value depending on its probable frequency of Occurrence and the Impact intensity in
case the event becomes a reality. For example:
Table 4 : Risk Exposure of each event of task T.
Event
Name
Frequency of
Occurrence
Impact Risk
Exposure
E1 Frequent Critical Very High
E2 Occasional Marginal Moderate
E3 Seldom Catastrophic High
E4 Occasional Negligible Low
E5 Very Likely Marginal Moderate
To assess the risk exposure of the task we have calculated the number of events in each category of risk
exposure. For the given case it is : Very High – 1, High – 1, Moderate – 2 and Low – 1.
4.2. RULES TO ASSESS RISK EXPOSURE OF A TASK BASED ON EVENTS
The following rules are considered to assess the Risk Exposure of the task :
Rule I : If 50% or more of the events fall under Very High category or 70% or more of the events fall under
High category, then the Risk Exposure of the task is considered to beVery High
Rule II : If less than 50% but more than 25% of the events fall under Very High category or less than 70% but
more than 40% event fall under High category, then the risk exposure of the task is considered to be High.
Rule III: If less than 25% of the events fall under Very High and less than 40% of the events fall under High,
then risk exposure is High.
Rule IV: If less than 25% of the events fall under Very High and 50% or more events fall under Moderate then
risk exposure is High
Rule V: If less than 40% of the events fall under High and more than 70% of the events fall under Moderate
then risk exposure is High.
Rule VI: If more than 70% of the events fall under Moderate then risk exposure is Moderate.
Rule VII: For all other combinations risk exposure is assumed to be Low
Assessing the given task the events are grouped into categories as follows :
Very High : 1/5 = 20% High : 1/5 = 20%
Moderate : 2/5 = 40% Low : 1/5 = 20%
The assessment falls under Rule III and hence the risk exposure of the task is classified as High. For
the second parameter it is proposed to consider the Risk Exposure of the tasks preceding to the given task T. The
number of preceding tasks along with their Risk Exposure value is considered to have an impact on the Risk
Assessment of the task T that is to be assessed. In case there are more than one task preceding the task T similar
Rules applicable in case of the events may be applied to get a single risk exposure value of the precedence tasks.
In the given case of task T, we have considered two precedence tasks whose risk exposure is High and
Moderate. Referring to the rules it is apparent that it fulfils Rule II by which we assess the risk exposure of
precedence tasks to be High. For the third parameter it is considered that if a task is a part of the critical path, it
has greater contribution to Risk Exposure than the tasks which do not fall in the critical path.Critical path
includes those activities which determines the duration of a project. A network schedule of the tasks is prepared
and calculation of the earliest finish and latest finish time at each node helps in determining the critical path [8].
This is an exercise performed by the project Managers in the project planning phase to determine the duration of
the project. For this parameter,
Task Oriented Risk Assessment...
www.theijes.com The IJES Page 15
if the task to be assessed or even if any of the precedence tasks fall in the critical path the response is to be
considered as YES or else NO. For the task T which is the task to be assessed it is assumed that the precedence
tasks or even T is not a part of the critical path.
4.3. FINAL ASSESSMENT OF THE TASK
For the Final assessment of the task, five categories of risk are considered which can be ranked from 1
to 5 in ascending order of its severity. The categories are Extremely High, Very High, High, Moderate and Low.
Here Low corresponds to 1 and Extremely High corresponds to 5. The table represents the combination of the
parameters for which an assessed risk category is proposed considering the individual parameter values. In case
of the example considered for illustration i.e.task T, the values of the parameters as assessed in previous section
are High, High and No. This combination can be matched with the corresponding entry to get the final
assessment result.The Final assessment of the example considered i.e. task T is Very High (according to the
proposed table).
Table 5: Table representing the Risk Exposure of a task
RE of the
task based
on failure
Events
REof
precedence
tasks
Part of
Critical
Path
Assessed Risk for
the task
Very High
Very High Yes Extremely High
No Extremely High
High Yes Extremely High
No Very High
Moderate Yes Very High
No High
Low Yes High
No High
High
Very High Yes Extremely High
No Extremely High
High Yes Extremely High
No Very High
Moderate Yes Very High
No High
Low Yes High
No Moderate
Moderate
Very High Yes Very High
No High
High Yes Very High
No Moderate
Moderate Yes High
No Moderate
Low Yes Moderate
No Low
Low
Very High Yes High
No Moderate
High Yes Moderate
No Low
Moderate Yes Moderate
No Low
Low Yes Low
No Low
V. CONCLUSION
Projects are an inevitable part of every system and successful completion of a project is considered to
be the goal and objective of every project manager. For this objective to be fulfilled, it is understood that every
project needs some measure to identify those aspects which may take the form of a threat in successful
completion of the project. Risk assessment provides a valuable input for the project managers to identify those
tasks or events that may convert into a threat. Moreover, risk assessment does not only contribute to the
successful completion of the project, but also aims to assist in identifying those points where risk monitoring
and control measures need to be directed so as to avoid loss of human life or system as well as minimise the
extent of loss with regards to all the resources, be it man, money, machine or material. The proposed task
assessment takes into consideration the events related to the task that is to be assessed as well as the events that
are related to the preceding tasks.
Task Oriented Risk Assessment...
www.theijes.com The IJES Page 16
In this case the risk associated with the preceding task is also influencing the risk assessment of the
task to be assessed. In case the task to be assessed or any of the tasks fall in the critical path, the proposed
method considers this aspect as a contributor to the risk category. The risk assessment results can be further
refined to produce risk prioritization depending on the risk acceptance level of the organisations’ risk
management policy.
REFERENCES
[1] The Benefits of Risk Assessment for Projects, Portfolios, and Businesses, An Oracle White Paper, June 2009.
[2] de Bakker, K et al, ‘ Does risk management contribute to IT project success ? A meta analysis of empirical evidence’, Intl.
Journal of Project Management, 2009.
[3] http://www.airsafe.com/risk/basics.htm -- Revised: 3 December 2007.
[4] Dayasindhu N, Padmanabhan S, Ravi J, ‘Integrated Approach to Risk Management for Custom Software Development and
Maintenance Initiatives’Emerging Trends and Challenges in IT Management,2006.
[5] R.S. Pressman, Software Engineering( 5th
Edition, McGRAW-HILL)
[6] A Guide By The Association For Project Management , Compiled from information provided by members of the Special
Interest Group on RiskManagement, Jan 2000.
[7] Enterprise Risk Management: Tools and Techniques For Effective Implementation, Published by IMA, 2007.
[8] John J. Rakos, Software Project Management for Small to Medium Sized Projects(1998, Prentice Hall)
[9] Jalote,P ,Software Project Management in Practice(2001, Addison-Wesley Professional)
[10] Lahon M, Singh J Y, Task Oriented Risk Assessment (TORA), Intl Journal of Computer Application, Volume 66, 2013

Contenu connexe

Tendances

Session 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis ISession 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis IMuizz Anibire
 
Contingency Planning Guide
Contingency Planning GuideContingency Planning Guide
Contingency Planning Guiderlynes
 
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...Muizz Anibire
 
Managing cost and schedule risk
Managing cost and schedule riskManaging cost and schedule risk
Managing cost and schedule riskGlen Alleman
 
Session 06_Risk Assessment Program for YSP_Risk Analysis III
Session 06_Risk Assessment Program for YSP_Risk Analysis IIISession 06_Risk Assessment Program for YSP_Risk Analysis III
Session 06_Risk Assessment Program for YSP_Risk Analysis IIIMuizz Anibire
 
Optimization of different objective function in risk assessment system
Optimization of different objective function in risk assessment  systemOptimization of different objective function in risk assessment  system
Optimization of different objective function in risk assessment systemAlexander Decker
 
Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides SlideTeam
 
Effectiveness of Risk Management and Chosen Methods in Construction Sector
Effectiveness of Risk Management and Chosen Methods in Construction SectorEffectiveness of Risk Management and Chosen Methods in Construction Sector
Effectiveness of Risk Management and Chosen Methods in Construction SectorIRJET Journal
 
Proactive vs. Reactive Approaches to Software Security Strategy
Proactive vs. Reactive Approaches to Software Security StrategyProactive vs. Reactive Approaches to Software Security Strategy
Proactive vs. Reactive Approaches to Software Security StrategyLindsey Landolfi
 
Session 03_Risk Assessment Program for YSP_Risk Identification
Session 03_Risk Assessment Program for YSP_Risk IdentificationSession 03_Risk Assessment Program for YSP_Risk Identification
Session 03_Risk Assessment Program for YSP_Risk IdentificationMuizz Anibire
 
Use of Causeand Effect Diagrams for Risk Management
Use of Causeand Effect Diagrams for Risk ManagementUse of Causeand Effect Diagrams for Risk Management
Use of Causeand Effect Diagrams for Risk ManagementProcept Associates
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Session 07_Risk Assessment Program for YSP_Risk Evaluation
Session 07_Risk Assessment Program for YSP_Risk EvaluationSession 07_Risk Assessment Program for YSP_Risk Evaluation
Session 07_Risk Assessment Program for YSP_Risk EvaluationMuizz Anibire
 
Preliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysis
Preliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysisPreliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysis
Preliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysisIRJESJOURNAL
 

Tendances (20)

Risk assesment
Risk assesmentRisk assesment
Risk assesment
 
Session 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis ISession 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis I
 
Contingency Planning Guide
Contingency Planning GuideContingency Planning Guide
Contingency Planning Guide
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
 
50320130403010
5032013040301050320130403010
50320130403010
 
Risk analysis
Risk analysis  Risk analysis
Risk analysis
 
Managing cost and schedule risk
Managing cost and schedule riskManaging cost and schedule risk
Managing cost and schedule risk
 
Well drilling fuzzy risk assessment using fuzzy FMEA and fuzzy TOPSIS
Well drilling fuzzy risk assessment using fuzzy FMEA and fuzzy TOPSISWell drilling fuzzy risk assessment using fuzzy FMEA and fuzzy TOPSIS
Well drilling fuzzy risk assessment using fuzzy FMEA and fuzzy TOPSIS
 
Session 06_Risk Assessment Program for YSP_Risk Analysis III
Session 06_Risk Assessment Program for YSP_Risk Analysis IIISession 06_Risk Assessment Program for YSP_Risk Analysis III
Session 06_Risk Assessment Program for YSP_Risk Analysis III
 
Optimization of different objective function in risk assessment system
Optimization of different objective function in risk assessment  systemOptimization of different objective function in risk assessment  system
Optimization of different objective function in risk assessment system
 
Disaster plan
Disaster planDisaster plan
Disaster plan
 
Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides
 
Effectiveness of Risk Management and Chosen Methods in Construction Sector
Effectiveness of Risk Management and Chosen Methods in Construction SectorEffectiveness of Risk Management and Chosen Methods in Construction Sector
Effectiveness of Risk Management and Chosen Methods in Construction Sector
 
Proactive vs. Reactive Approaches to Software Security Strategy
Proactive vs. Reactive Approaches to Software Security StrategyProactive vs. Reactive Approaches to Software Security Strategy
Proactive vs. Reactive Approaches to Software Security Strategy
 
Session 03_Risk Assessment Program for YSP_Risk Identification
Session 03_Risk Assessment Program for YSP_Risk IdentificationSession 03_Risk Assessment Program for YSP_Risk Identification
Session 03_Risk Assessment Program for YSP_Risk Identification
 
Use of Causeand Effect Diagrams for Risk Management
Use of Causeand Effect Diagrams for Risk ManagementUse of Causeand Effect Diagrams for Risk Management
Use of Causeand Effect Diagrams for Risk Management
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Session 07_Risk Assessment Program for YSP_Risk Evaluation
Session 07_Risk Assessment Program for YSP_Risk EvaluationSession 07_Risk Assessment Program for YSP_Risk Evaluation
Session 07_Risk Assessment Program for YSP_Risk Evaluation
 
Preliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysis
Preliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysisPreliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysis
Preliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysis
 

En vedette

G03702054060
G03702054060G03702054060
G03702054060theijes
 
I0363068074
I0363068074I0363068074
I0363068074theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
E0373031039
E0373031039E0373031039
E0373031039theijes
 
E0362028035
E0362028035E0362028035
E0362028035theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
D0372027037
D0372027037D0372027037
D0372027037theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
B03501007026
B03501007026B03501007026
B03501007026theijes
 
D03502018022
D03502018022D03502018022
D03502018022theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
H0373058071
H0373058071H0373058071
H0373058071theijes
 
B02610509
B02610509B02610509
B02610509theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 

En vedette (19)

G03702054060
G03702054060G03702054060
G03702054060
 
I0363068074
I0363068074I0363068074
I0363068074
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
E0373031039
E0373031039E0373031039
E0373031039
 
E0362028035
E0362028035E0362028035
E0362028035
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
D0372027037
D0372027037D0372027037
D0372027037
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
B03501007026
B03501007026B03501007026
B03501007026
 
D03502018022
D03502018022D03502018022
D03502018022
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
H0373058071
H0373058071H0373058071
H0373058071
 
B02610509
B02610509B02610509
B02610509
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 

Similaire à The International Journal of Engineering and Science (The IJES)

The use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projectsThe use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projectsEswar Publications
 
Risk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesRisk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesIRJET Journal
 
Minimization of Risks in Construction projects
Minimization of Risks in Construction projectsMinimization of Risks in Construction projects
Minimization of Risks in Construction projectsIRJET Journal
 
Risk Management Appraisal - A tool for successful Infrastructure project
Risk Management Appraisal - A tool for successful Infrastructure projectRisk Management Appraisal - A tool for successful Infrastructure project
Risk Management Appraisal - A tool for successful Infrastructure projectIRJET Journal
 
ISOL 533 - Information Security and Risk Management R.docx
ISOL 533 - Information Security and Risk Management            R.docxISOL 533 - Information Security and Risk Management            R.docx
ISOL 533 - Information Security and Risk Management R.docxchristiandean12115
 
Risk management plan
Risk management planRisk management plan
Risk management planKashif Mastan
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaPankaj K Sinha
 
PRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfPRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfmohamed Ismail
 
Risk Assessment for Building Construction Sites in Myanmar
Risk Assessment for Building Construction Sites in MyanmarRisk Assessment for Building Construction Sites in Myanmar
Risk Assessment for Building Construction Sites in Myanmarijtsrd
 
B0363010015
B0363010015B0363010015
B0363010015theijes
 
IRJET- Analysis of Risk Management in Construction Sector using Fault Tree...
IRJET- 	  Analysis of Risk Management in Construction Sector using Fault Tree...IRJET- 	  Analysis of Risk Management in Construction Sector using Fault Tree...
IRJET- Analysis of Risk Management in Construction Sector using Fault Tree...IRJET Journal
 
Assignment 1 Human Resource Management Overview Due Week 4 an.docx
Assignment 1 Human Resource Management Overview Due Week 4 an.docxAssignment 1 Human Resource Management Overview Due Week 4 an.docx
Assignment 1 Human Resource Management Overview Due Week 4 an.docxtrippettjettie
 
HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...
HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...
HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...IRJET Journal
 
HSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptHSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptGkMechanical
 
Risk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisRisk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisGaurav Singh Rajput
 
Risk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RARisk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RAGaurav Singh Rajput
 
Risk Management In High Rise Construction Projects
Risk Management In High Rise Construction ProjectsRisk Management In High Rise Construction Projects
Risk Management In High Rise Construction ProjectsIRJET Journal
 
Project Risk Management ( With :Decision tree analysi,Simulation,Sensitivity ...
Project Risk Management ( With :Decision tree analysi,Simulation,Sensitivity ...Project Risk Management ( With :Decision tree analysi,Simulation,Sensitivity ...
Project Risk Management ( With :Decision tree analysi,Simulation,Sensitivity ...IndraYu2
 
APPLICATION OF FUZZY LOGIC IN RISK ASSESSMENT OF FAILURES AND ACCIDENTS FOR T...
APPLICATION OF FUZZY LOGIC IN RISK ASSESSMENT OF FAILURES AND ACCIDENTS FOR T...APPLICATION OF FUZZY LOGIC IN RISK ASSESSMENT OF FAILURES AND ACCIDENTS FOR T...
APPLICATION OF FUZZY LOGIC IN RISK ASSESSMENT OF FAILURES AND ACCIDENTS FOR T...Rustem Baiburin
 
F041123639
F041123639F041123639
F041123639IOSR-JEN
 

Similaire à The International Journal of Engineering and Science (The IJES) (20)

The use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projectsThe use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projects
 
Risk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesRisk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction Industries
 
Minimization of Risks in Construction projects
Minimization of Risks in Construction projectsMinimization of Risks in Construction projects
Minimization of Risks in Construction projects
 
Risk Management Appraisal - A tool for successful Infrastructure project
Risk Management Appraisal - A tool for successful Infrastructure projectRisk Management Appraisal - A tool for successful Infrastructure project
Risk Management Appraisal - A tool for successful Infrastructure project
 
ISOL 533 - Information Security and Risk Management R.docx
ISOL 533 - Information Security and Risk Management            R.docxISOL 533 - Information Security and Risk Management            R.docx
ISOL 533 - Information Security and Risk Management R.docx
 
Risk management plan
Risk management planRisk management plan
Risk management plan
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K Sinha
 
PRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfPRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdf
 
Risk Assessment for Building Construction Sites in Myanmar
Risk Assessment for Building Construction Sites in MyanmarRisk Assessment for Building Construction Sites in Myanmar
Risk Assessment for Building Construction Sites in Myanmar
 
B0363010015
B0363010015B0363010015
B0363010015
 
IRJET- Analysis of Risk Management in Construction Sector using Fault Tree...
IRJET- 	  Analysis of Risk Management in Construction Sector using Fault Tree...IRJET- 	  Analysis of Risk Management in Construction Sector using Fault Tree...
IRJET- Analysis of Risk Management in Construction Sector using Fault Tree...
 
Assignment 1 Human Resource Management Overview Due Week 4 an.docx
Assignment 1 Human Resource Management Overview Due Week 4 an.docxAssignment 1 Human Resource Management Overview Due Week 4 an.docx
Assignment 1 Human Resource Management Overview Due Week 4 an.docx
 
HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...
HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...
HAZARD IDENTIFICATION AND RISK ASSESSMENT IN AUTO COMPONENTS MANUFACTURING IN...
 
HSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptHSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.ppt
 
Risk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisRisk Assessment and Job Safety Analysis
Risk Assessment and Job Safety Analysis
 
Risk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RARisk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RA
 
Risk Management In High Rise Construction Projects
Risk Management In High Rise Construction ProjectsRisk Management In High Rise Construction Projects
Risk Management In High Rise Construction Projects
 
Project Risk Management ( With :Decision tree analysi,Simulation,Sensitivity ...
Project Risk Management ( With :Decision tree analysi,Simulation,Sensitivity ...Project Risk Management ( With :Decision tree analysi,Simulation,Sensitivity ...
Project Risk Management ( With :Decision tree analysi,Simulation,Sensitivity ...
 
APPLICATION OF FUZZY LOGIC IN RISK ASSESSMENT OF FAILURES AND ACCIDENTS FOR T...
APPLICATION OF FUZZY LOGIC IN RISK ASSESSMENT OF FAILURES AND ACCIDENTS FOR T...APPLICATION OF FUZZY LOGIC IN RISK ASSESSMENT OF FAILURES AND ACCIDENTS FOR T...
APPLICATION OF FUZZY LOGIC IN RISK ASSESSMENT OF FAILURES AND ACCIDENTS FOR T...
 
F041123639
F041123639F041123639
F041123639
 

Dernier

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

The International Journal of Engineering and Science (The IJES)

  • 1. The International Journal Of Engineering And Science (IJES) ||Volume||2 ||Issue|| 6 ||Pages|| 12-16||2013|| ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805 www.theijes.com The IJES Page 12 Task Oriented Risk Assessment - A Risk Assessment Tool Maushumi Lahon 1, Department of CS and IT Don Bosco College of Engineering and Technology A Constituent Unit of Assam Don Bosco University Working with Department of CE & Application, Assam Engineering Institute ------------------------------------------------------------Abstract---------------------------------------------------------------- It is a well known fact that projects get delayed and sometimes they fail due to insufficient knowledge regarding the causes of the failure as well as because of not identifying the critical points which require special attention. A proactive exercise is very important in order to identify and find those aspects which need more attention in order to avoid delays and failures. In this paper an attempt is made to explain the Task Oriented Risk Assessment concept as a tool which can assist in identifying those tasks and events which require more attention. A detailed description of the Risk Exposure assessment of tasks using Risk Exposure assessment of failure events, assessment of precedence tasks and position of the tasks in the network schedule is proposed. The risk assessment for a particular issue forms the foundation for making a decision about future actions which may lead to additional analyses, perform activities that reduce the risk, or do nothing at all. This assessment is based on identifying the tasks and subtasks in a project and then identifying the events which are responsible for the failure of the tasks which may alternatively be termed as the reasons which are the causes for the failure of the task. KEYWORDS : Event, Impact, Project, Risk Assessment, Task ------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 29th May 2013, Date of Publication: 18.June.2013 ------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION To complete a project or a task it is necessary to cope up with the uncertainties it may face. Events for which the organisation is not prepared for can cause a negative impact like time overrun, cost overrun etc. Therefore, formal methods are essential to identify these uncertainties which can assist the decision making process and minimise loss [7]. The problem is to identify the cause-effect relationship between the events, their triggers, their effects and severity of the impact and then propose a feasible solution to combat the situation. Further it is also important to identify which method or technique should be used for which problem and in which industry. Projection and Quantification of risk is a major challenge in the area of risk analysis and management which requires detailed description of the tasks associated with every objective and then identify the factors which may have a positive or negative effect on the task. Finally, design a formal procedure for identification of the factors, analyse them and initiate proactive measure to minimize the negative effects.Risk assessments also enable risk response and mitigation strategies to be expressed.Cost/benefit analysis can be used to compare risk mitigation strategies and understand howeffectively the money would be spent[1].To assist in this proactive exercise we propose TORA (Task Oriented Risk Assessment) [10] as a tool for risk assessment in order to contribute to the success of a project. II. BACKGROUND There are various approaches to riskmanagement in the literature on risk management. These approaches vary among researchers, and preference for a certain approach mostly depends on the type of the project and the environment [6]. Two approaches that can be distinguished are: an evaluation approach and a management approach [2].The evaluation approach consider risk management as an analysis process that aims at determining the risk factors [2]. Information about project failure and its causes are collected andthis information is used in checklists for risk identification. The contribution of risk management to project success is indirect, because the information collected is used in future projects. The management approach considers risk management to be a management instrument by which information is collected and analysed to support the decisionmaking process in a particular project. This approach does not look for generic risks, but instead focuses on managing the risks that are relevant in the project in question. Concentrating on the management approach here we are trying to use the task based concept for assessing risk which in turn will act as a security net in the decision making process. Risk assessment fully discloses the sensitivity of the project to its participants to
  • 2. Task Oriented Risk Assessment... www.theijes.com The IJES Page 13 ensure that all threats are fully understood [3] . As a result, accurate understanding of potential challenges, and risk mitigation strategies can also be created in advance. III. CONCEPT OF TORA Task Oriented Risk Assessment starts from the point when a work breakdown structure of the project is made[10]. The Work Breakdown Structure provides the base for identification of the tasks and subtasks. Next step is to identify the events that are responsible for the failure of these tasks. After identification of the events, the Risk Exposure of each of the event is to be ascertained. There are two parameters that contribute to this calculation of Risk Exposure: i) frequency of occurrence of the event and ii) impact [5]. Frequency of occurrence is classified into five classes and impact is classified into four classes. Frequency of occurrence is classified as Frequent, Occasional, Seldom and Unlikely. Impact is classified as Catastrophic, Critical, Marginal and Negligible. Based on the combination of these two parameters, Risk exposure of each event is classified as Very High, High, Moderate and Low. The following tables represents the conditions when a task or event’s Frequency of occurrence is classified into five categories and when an Impact is to be considered as Catastrophic, Critical, Marginal or Negligible. Table 1: Frequency of occurrence categories Frequency of occurrence Condition Frequent Occurs very often in the life time of the project Very Likely Will occur several times during the life time of the project Occasional Will occur during the life time of the project Seldom May occur during the life time of the project Unlikely Can consider that it will not occur during the life time of the project The following table represents the conditions when an Impact is to be considered as Catastrophic, Critical, Marginal or Negligible. Table 2 : Impact categories Impact Condition Catastrophic Project failure, loss of life or system Critical Major project setback, permanent disability or severe injury to human or major system damage Moderate Minor setback to the project, minor injury and occupational illness and minor system damage Negligible No considerable damage to project, human or system After categorising the Frequency of Occurrence and Impact the following table reflects the corresponding Risk Exposure depending on the two parameters. Table 3: Table representing the Risk Exposure of an Event Impact Catastro phic Critical Marginal Negligible Frequency of Occurrence Frequent Very High Very High High Moderate Very Likely Very High High Moderate Low Occasional High High Moderate Low Seldom High Moderate Low Low Unlikely Moderate Low Low Low Sometimes a task may be directly assessable based on the study of closure reports or from expert judgements. In those cases it may not be necessary to go for listing of events and further analysis. For those tasks risk may be assessed directly by the two aforesaid parameters i.e. its frequency of failure and the impact that may happen in
  • 3. Task Oriented Risk Assessment... www.theijes.com The IJES Page 14 case of its failure. In case a task needs to be assessed using the Risk Exposure results of the events that may lead to its failure, the following section presents a detailed illustration on this. IV. CRITERIA FOR RISK ASSESSMENT Those tasks that cannot be assessed for its Risk Exposure directly are proposed to be assessed based on the following three parameters. This step is an addition to the concept introduced against TORA [10] : i) Risk Exposure of the task based on failure events ii) Number of precedence tasks with their Risk Exposure, and iii) The position of the task and the precedence task/tasks in the Network diagram. 4.1. ILLUSTRATION Consider a task T with five failure events E1,E2,E3,E4 and E5 and each have been evaluated with a specific Risk Exposure Value depending on its probable frequency of Occurrence and the Impact intensity in case the event becomes a reality. For example: Table 4 : Risk Exposure of each event of task T. Event Name Frequency of Occurrence Impact Risk Exposure E1 Frequent Critical Very High E2 Occasional Marginal Moderate E3 Seldom Catastrophic High E4 Occasional Negligible Low E5 Very Likely Marginal Moderate To assess the risk exposure of the task we have calculated the number of events in each category of risk exposure. For the given case it is : Very High – 1, High – 1, Moderate – 2 and Low – 1. 4.2. RULES TO ASSESS RISK EXPOSURE OF A TASK BASED ON EVENTS The following rules are considered to assess the Risk Exposure of the task : Rule I : If 50% or more of the events fall under Very High category or 70% or more of the events fall under High category, then the Risk Exposure of the task is considered to beVery High Rule II : If less than 50% but more than 25% of the events fall under Very High category or less than 70% but more than 40% event fall under High category, then the risk exposure of the task is considered to be High. Rule III: If less than 25% of the events fall under Very High and less than 40% of the events fall under High, then risk exposure is High. Rule IV: If less than 25% of the events fall under Very High and 50% or more events fall under Moderate then risk exposure is High Rule V: If less than 40% of the events fall under High and more than 70% of the events fall under Moderate then risk exposure is High. Rule VI: If more than 70% of the events fall under Moderate then risk exposure is Moderate. Rule VII: For all other combinations risk exposure is assumed to be Low Assessing the given task the events are grouped into categories as follows : Very High : 1/5 = 20% High : 1/5 = 20% Moderate : 2/5 = 40% Low : 1/5 = 20% The assessment falls under Rule III and hence the risk exposure of the task is classified as High. For the second parameter it is proposed to consider the Risk Exposure of the tasks preceding to the given task T. The number of preceding tasks along with their Risk Exposure value is considered to have an impact on the Risk Assessment of the task T that is to be assessed. In case there are more than one task preceding the task T similar Rules applicable in case of the events may be applied to get a single risk exposure value of the precedence tasks. In the given case of task T, we have considered two precedence tasks whose risk exposure is High and Moderate. Referring to the rules it is apparent that it fulfils Rule II by which we assess the risk exposure of precedence tasks to be High. For the third parameter it is considered that if a task is a part of the critical path, it has greater contribution to Risk Exposure than the tasks which do not fall in the critical path.Critical path includes those activities which determines the duration of a project. A network schedule of the tasks is prepared and calculation of the earliest finish and latest finish time at each node helps in determining the critical path [8]. This is an exercise performed by the project Managers in the project planning phase to determine the duration of the project. For this parameter,
  • 4. Task Oriented Risk Assessment... www.theijes.com The IJES Page 15 if the task to be assessed or even if any of the precedence tasks fall in the critical path the response is to be considered as YES or else NO. For the task T which is the task to be assessed it is assumed that the precedence tasks or even T is not a part of the critical path. 4.3. FINAL ASSESSMENT OF THE TASK For the Final assessment of the task, five categories of risk are considered which can be ranked from 1 to 5 in ascending order of its severity. The categories are Extremely High, Very High, High, Moderate and Low. Here Low corresponds to 1 and Extremely High corresponds to 5. The table represents the combination of the parameters for which an assessed risk category is proposed considering the individual parameter values. In case of the example considered for illustration i.e.task T, the values of the parameters as assessed in previous section are High, High and No. This combination can be matched with the corresponding entry to get the final assessment result.The Final assessment of the example considered i.e. task T is Very High (according to the proposed table). Table 5: Table representing the Risk Exposure of a task RE of the task based on failure Events REof precedence tasks Part of Critical Path Assessed Risk for the task Very High Very High Yes Extremely High No Extremely High High Yes Extremely High No Very High Moderate Yes Very High No High Low Yes High No High High Very High Yes Extremely High No Extremely High High Yes Extremely High No Very High Moderate Yes Very High No High Low Yes High No Moderate Moderate Very High Yes Very High No High High Yes Very High No Moderate Moderate Yes High No Moderate Low Yes Moderate No Low Low Very High Yes High No Moderate High Yes Moderate No Low Moderate Yes Moderate No Low Low Yes Low No Low V. CONCLUSION Projects are an inevitable part of every system and successful completion of a project is considered to be the goal and objective of every project manager. For this objective to be fulfilled, it is understood that every project needs some measure to identify those aspects which may take the form of a threat in successful completion of the project. Risk assessment provides a valuable input for the project managers to identify those tasks or events that may convert into a threat. Moreover, risk assessment does not only contribute to the successful completion of the project, but also aims to assist in identifying those points where risk monitoring and control measures need to be directed so as to avoid loss of human life or system as well as minimise the extent of loss with regards to all the resources, be it man, money, machine or material. The proposed task assessment takes into consideration the events related to the task that is to be assessed as well as the events that are related to the preceding tasks.
  • 5. Task Oriented Risk Assessment... www.theijes.com The IJES Page 16 In this case the risk associated with the preceding task is also influencing the risk assessment of the task to be assessed. In case the task to be assessed or any of the tasks fall in the critical path, the proposed method considers this aspect as a contributor to the risk category. The risk assessment results can be further refined to produce risk prioritization depending on the risk acceptance level of the organisations’ risk management policy. REFERENCES [1] The Benefits of Risk Assessment for Projects, Portfolios, and Businesses, An Oracle White Paper, June 2009. [2] de Bakker, K et al, ‘ Does risk management contribute to IT project success ? A meta analysis of empirical evidence’, Intl. Journal of Project Management, 2009. [3] http://www.airsafe.com/risk/basics.htm -- Revised: 3 December 2007. [4] Dayasindhu N, Padmanabhan S, Ravi J, ‘Integrated Approach to Risk Management for Custom Software Development and Maintenance Initiatives’Emerging Trends and Challenges in IT Management,2006. [5] R.S. Pressman, Software Engineering( 5th Edition, McGRAW-HILL) [6] A Guide By The Association For Project Management , Compiled from information provided by members of the Special Interest Group on RiskManagement, Jan 2000. [7] Enterprise Risk Management: Tools and Techniques For Effective Implementation, Published by IMA, 2007. [8] John J. Rakos, Software Project Management for Small to Medium Sized Projects(1998, Prentice Hall) [9] Jalote,P ,Software Project Management in Practice(2001, Addison-Wesley Professional) [10] Lahon M, Singh J Y, Task Oriented Risk Assessment (TORA), Intl Journal of Computer Application, Volume 66, 2013