SlideShare une entreprise Scribd logo
1  sur  5
Maria Gomez | 1


Risk Management


Gray (2010, 211) defines Risk as “an uncertain event or condition that, if it occurs, has a positive or
negative effect on project objectives”, where uncertain means something that could happen but we
are not sure about it.

Dealing with these uncertain events is what is called Risk Management and the Project Manager is
the one responsible for it. Meredith (2010, 205) quoted the PMBOK Guide and define risk
management as “the systematic process of identifying, analysing and responding to project risk”.
Having a well prepared risk management plan is one of the factor that help a project to end
successfully. In every project's life cycle we can find situation where the reality was not even close
of what the plan says, and the project manager must be able to deal with the situation and/or
mitigate the consequences where possible.


Risk Management process


Identification

This phase is intended to identify and list the risks (as many as possible) that can be found in a
particular project. A project is such an independent and unique entity there is no literature or past
experiences (although they always help) that can provide the project manager with a list of “most
common” risks (Maylor, 2010, 218-232). Therefore it is necessary to hold some kind of
brainstorming meeting involving team's members, clients and/or stakeholders to identify potential
risks.

Some of the tools use during these meetings are:

    •    Risk Breakdown Structures (RBSs): this model is based on the Work Breakdown Structure
         (WBS), used in the planning stage to organized the work to be done in order to success in
         the project. Following the same structure, a RBS would define all the areas where risks are
         likely to appear from a general point of view and going down as many levels as necessary
         increasingly detailing these areas (Hillson, 2002). These approach is more useful and easier
         to implement when the project has been planned used a WBS, as consulting the latter will
         help avoiding a risk event to be missed (Gray 2010, 212-234).

                                                                                               Jan 2011
Maria Gomez | 2

    •   Risk Profile: this is defined as a list of question to be hand in to the stakeholders that are
        based in previous experiences and refer to common areas of a project where risk are more
        likely to appear. These questions came normally from a Risk Management Data Bank, “a
        permanent record of identified risks, methods used to mitigate them, and the result of all risk
        management activities” (Meredith 2010, 207).


Analysis

In this stage the Project Manager has to analyse and prioritise the list of risks produced in the
previous stage. Normally a good place to start is by assessing for each risk:

    •   How likely the event to occur

    •   What the impact would be if the event occurs.

There are quite a few methods or techniques to do this. Maylor (2010, 223-232) divided them into
two different approaches:


Qualitative Approach

Analysing every risk in terms of the two elements cited before (likelihood and impact) is the first
step to take. The scale for each of them may vary and be specific for each project, but in general
these tend to be numeric, going from 1 (very low probability / impact”) to 5 (very high probability /
impact) . One way of representing is known as “Risk Severity Matrix” (Fig 1). Normally this matrix
is generic for each organization, so the Project Manager only needs to allocate each event in their
correct cell.




                          Figure 1: Risk Severity Matrix (NASA, 2009)



                                                                                                 Jan 2011
Maria Gomez | 3

As an extend of this method we have Failure Mode and Effect Analysis (FMEA), where we need to
include to the above data a new variable: Detection difficulty, which can be defined as “the ability
to detect a failure associated with each cause” (Meredith, 2010, 208). This new parameter needs to
be scale as the other two. Once we have all the number, we can calculate the Risk Priority Number
(RPN) for each event by using the equation: Severity x Likelihood x Difficulty.


Quantity Approach

We are talking here about statistical techniques that help by assessing the project's risk. This
techniques may be mandatory for some project before they start as some companies or public
organizations tend to decide if a project is worth to be execute based on the outcomes of these
techniques. These techniques normally are executed by using simulation software. One of the most
popular is called PERT (Program Evaluation and Review Technique) and it can be used to asses the
overall risk of the project (Gray 2010, 219).


Plan

The third step in the Risk Management Process is to decide what the response would be for each
risk. These can be classified in 4 groups (Gray 2010, 219-229):


Mitigate

There are two strategies to mitigate a risk and these are based on the parameters we have used to
identify the risks:

    •   Reduce the probability of the event to occur

   •    Reduce the impact that the event can have in the project


Avoid

This implies removing the task that may cause the event. Obviously this cannot be the solution for
all the risks as some of the tasks causing risks are essential for the project.


Transfer

This means to outsource the activities involve in the risk. The chosen third party will assume the
responsibility of the risk if it occurs so it will not necessary mean that the risk will disappear.

                                                                                                 Jan 2011
Maria Gomez | 4

Retain

This involves accepting the loss or gain when the risk occurs. It is although necessary to have a
contingency plan to be implemented when the risk falls into this category. This plan should include
a detailed list of actions to be taken. Examples of this can be having a list of alternative suppliers or
having a contingency fund.


Monitoring

Finally and once the project has started the Project Manager needs to constantly monitor the tasks
where the risks are likely to occur and update the plan with new risks or any modification on the
existing ones. It is useful to have what it is called a Risk Register which normally contains a list of
the risks with description and the rest of the data that have been collected and calculated in the
previous steps (likelihood, impact, response plan, etc.) (Maylor 2010, 222).




                                                                                                Jan 2011
Maria Gomez | 5


References


- Gray, C., 2010. Project management : the managerial process 5th ed., Dubuque Iowa ;London:
McGraw-Hill Contemporary Learning; McGraw-Hill [distributor].

- Hillson, D., 2002. Use a Risk Breakdown Structure (RBS) to Understand Your Risks. Available at:
http://www.risk-doctor.com/pdf-files/rbs1002.pdf [Accessed January 22, 2011].

- NPR 8553.1B - NASA Environmental Management System - Chapter3: Planning. Available at:
http://nodis3.gsfc.nasa.gov/displayDir.cfm?
Internal_ID=N_PR_8553_001B_&page_name=Chapter3 [Accessed January 23, 2011].

- Maylor, H., 2010. Project management 4th ed., Harlow England; New York: Financial Times
Prentice Hall.

- Meredith, J., 2010. Project management : a managerial approach 7th ed., Hoboken N.J.: Wiley.




                                                                                         Jan 2011

Contenu connexe

Tendances

Increasing the Probability of Project Success
Increasing the Probability of Project SuccessIncreasing the Probability of Project Success
Increasing the Probability of Project SuccessGlen Alleman
 
Building risk tolerance
Building risk toleranceBuilding risk tolerance
Building risk toleranceGlen Alleman
 
Risk assesment template
Risk assesment templateRisk assesment template
Risk assesment templateGlen Alleman
 
Proactive vs. Reactive Approaches to Software Security Strategy
Proactive vs. Reactive Approaches to Software Security StrategyProactive vs. Reactive Approaches to Software Security Strategy
Proactive vs. Reactive Approaches to Software Security StrategyLindsey Landolfi
 
Best Practice Crisis And Issues Management A Recommended Approach By SMC
Best Practice Crisis And Issues Management   A Recommended Approach By SMCBest Practice Crisis And Issues Management   A Recommended Approach By SMC
Best Practice Crisis And Issues Management A Recommended Approach By SMCJanet Saunders
 
Crisis Management
Crisis ManagementCrisis Management
Crisis ManagementNorthTec
 
Programmatic risk management workshop (handbook)
Programmatic risk management workshop (handbook)Programmatic risk management workshop (handbook)
Programmatic risk management workshop (handbook)Glen Alleman
 
Risk management of the performance measurement baseline
Risk management of the performance measurement baselineRisk management of the performance measurement baseline
Risk management of the performance measurement baselineGlen Alleman
 
Risk management
Risk managementRisk management
Risk managementbipulpwc
 
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITY
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITYRISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITY
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITYAshim Sharma
 
Crisis Management
Crisis ManagementCrisis Management
Crisis Managementeuweben01
 
Crisis and risk management
Crisis and risk managementCrisis and risk management
Crisis and risk managementARMEN MEHRABYAN
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)rafeeqameen
 
Sameer Mitter Bournemouth - What do understand by Risk management
Sameer Mitter Bournemouth - What do understand by Risk managementSameer Mitter Bournemouth - What do understand by Risk management
Sameer Mitter Bournemouth - What do understand by Risk managementSameer Mitter
 
Bertrand's Individual Essay
Bertrand's Individual EssayBertrand's Individual Essay
Bertrand's Individual EssayPrince Bertrand
 
Risk management (final review)
Risk management (final review)Risk management (final review)
Risk management (final review)Glen Alleman
 
Crisis management final
Crisis management finalCrisis management final
Crisis management finalGeeg geeh
 
Why Traditional Risk Management fails in the Oil+Gas Sector
Why Traditional Risk Management fails in the Oil+Gas SectorWhy Traditional Risk Management fails in the Oil+Gas Sector
Why Traditional Risk Management fails in the Oil+Gas Sectorjanknopfler
 

Tendances (20)

Increasing the Probability of Project Success
Increasing the Probability of Project SuccessIncreasing the Probability of Project Success
Increasing the Probability of Project Success
 
Building risk tolerance
Building risk toleranceBuilding risk tolerance
Building risk tolerance
 
Risk assesment template
Risk assesment templateRisk assesment template
Risk assesment template
 
Proactive vs. Reactive Approaches to Software Security Strategy
Proactive vs. Reactive Approaches to Software Security StrategyProactive vs. Reactive Approaches to Software Security Strategy
Proactive vs. Reactive Approaches to Software Security Strategy
 
Best Practice Crisis And Issues Management A Recommended Approach By SMC
Best Practice Crisis And Issues Management   A Recommended Approach By SMCBest Practice Crisis And Issues Management   A Recommended Approach By SMC
Best Practice Crisis And Issues Management A Recommended Approach By SMC
 
Crisis Management
Crisis ManagementCrisis Management
Crisis Management
 
Programmatic risk management workshop (handbook)
Programmatic risk management workshop (handbook)Programmatic risk management workshop (handbook)
Programmatic risk management workshop (handbook)
 
Risk management of the performance measurement baseline
Risk management of the performance measurement baselineRisk management of the performance measurement baseline
Risk management of the performance measurement baseline
 
Risk management
Risk managementRisk management
Risk management
 
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITY
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITYRISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITY
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITY
 
Crisis Management
Crisis ManagementCrisis Management
Crisis Management
 
Crisis and risk management
Crisis and risk managementCrisis and risk management
Crisis and risk management
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
 
Sameer Mitter Bournemouth - What do understand by Risk management
Sameer Mitter Bournemouth - What do understand by Risk managementSameer Mitter Bournemouth - What do understand by Risk management
Sameer Mitter Bournemouth - What do understand by Risk management
 
Pmi 19 26
Pmi 19 26Pmi 19 26
Pmi 19 26
 
Bertrand's Individual Essay
Bertrand's Individual EssayBertrand's Individual Essay
Bertrand's Individual Essay
 
Risk management (final review)
Risk management (final review)Risk management (final review)
Risk management (final review)
 
Chap5
Chap5Chap5
Chap5
 
Crisis management final
Crisis management finalCrisis management final
Crisis management final
 
Why Traditional Risk Management fails in the Oil+Gas Sector
Why Traditional Risk Management fails in the Oil+Gas SectorWhy Traditional Risk Management fails in the Oil+Gas Sector
Why Traditional Risk Management fails in the Oil+Gas Sector
 

Similaire à Project Management - Risk management

Lecture 6 Managing risk.pptx
Lecture 6 Managing risk.pptxLecture 6 Managing risk.pptx
Lecture 6 Managing risk.pptxMehediHasan636262
 
1 This document was originally created on 26th May 2009 .docx
1 This document was originally created on 26th May 2009 .docx1 This document was originally created on 26th May 2009 .docx
1 This document was originally created on 26th May 2009 .docxkarisariddell
 
11. Project Risk Management.pptx
11. Project Risk Management.pptx11. Project Risk Management.pptx
11. Project Risk Management.pptxKamranKhan353531
 
Running head RISK MANAGEMENT PLAN 1RISK MANAGE.docx
Running head RISK MANAGEMENT PLAN          1RISK MANAGE.docxRunning head RISK MANAGEMENT PLAN          1RISK MANAGE.docx
Running head RISK MANAGEMENT PLAN 1RISK MANAGE.docxtoltonkendal
 
PMP Training - 11 project risk management
PMP Training - 11 project risk managementPMP Training - 11 project risk management
PMP Training - 11 project risk managementejlp12
 
MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
 MBA 6941, Managing Project Teams 1 Course Learning Ou.docx MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
MBA 6941, Managing Project Teams 1 Course Learning Ou.docxaryan532920
 
Project of entrepreneurship
Project of entrepreneurship Project of entrepreneurship
Project of entrepreneurship AliAbbas390458
 
Project risk management - Methodology and application
Project risk management - Methodology and applicationProject risk management - Methodology and application
Project risk management - Methodology and applicationMarco De Santis, PMP, CFPP
 
Risk management Phase 1-5 Individual Project.docx
Risk management Phase 1-5 Individual Project.docxRisk management Phase 1-5 Individual Project.docx
Risk management Phase 1-5 Individual Project.docxjoellemurphey
 
BBA 4226, Risk Management 1 Course Learning Outcomes
 BBA 4226, Risk Management 1 Course Learning Outcomes  BBA 4226, Risk Management 1 Course Learning Outcomes
BBA 4226, Risk Management 1 Course Learning Outcomes MargaritoWhitt221
 
372the risk report described in . The risk report will be .docx
372the risk report described in . The risk report will be .docx372the risk report described in . The risk report will be .docx
372the risk report described in . The risk report will be .docxBHANU281672
 
372the risk report described in . The risk report will be .docx
372the risk report described in . The risk report will be .docx372the risk report described in . The risk report will be .docx
372the risk report described in . The risk report will be .docxpriestmanmable
 
Risk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesRisk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesIRJET Journal
 
Information Technology Risk Management
Information Technology Risk ManagementInformation Technology Risk Management
Information Technology Risk ManagementGlen Alleman
 
Project risk management
Project risk managementProject risk management
Project risk managementEr Swati Nagal
 

Similaire à Project Management - Risk management (20)

Lecture 6 Managing risk.pptx
Lecture 6 Managing risk.pptxLecture 6 Managing risk.pptx
Lecture 6 Managing risk.pptx
 
1 This document was originally created on 26th May 2009 .docx
1 This document was originally created on 26th May 2009 .docx1 This document was originally created on 26th May 2009 .docx
1 This document was originally created on 26th May 2009 .docx
 
Risk management
Risk managementRisk management
Risk management
 
11. Project Risk Management.pptx
11. Project Risk Management.pptx11. Project Risk Management.pptx
11. Project Risk Management.pptx
 
Running head RISK MANAGEMENT PLAN 1RISK MANAGE.docx
Running head RISK MANAGEMENT PLAN          1RISK MANAGE.docxRunning head RISK MANAGEMENT PLAN          1RISK MANAGE.docx
Running head RISK MANAGEMENT PLAN 1RISK MANAGE.docx
 
PMP Training - 11 project risk management
PMP Training - 11 project risk managementPMP Training - 11 project risk management
PMP Training - 11 project risk management
 
MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
 MBA 6941, Managing Project Teams 1 Course Learning Ou.docx MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
 
Project of entrepreneurship
Project of entrepreneurship Project of entrepreneurship
Project of entrepreneurship
 
Project risk management - Methodology and application
Project risk management - Methodology and applicationProject risk management - Methodology and application
Project risk management - Methodology and application
 
8. project risk management
8. project risk management8. project risk management
8. project risk management
 
Risk management Phase 1-5 Individual Project.docx
Risk management Phase 1-5 Individual Project.docxRisk management Phase 1-5 Individual Project.docx
Risk management Phase 1-5 Individual Project.docx
 
Risk management
Risk managementRisk management
Risk management
 
IT Policy, RISK MANAGEMENT
IT Policy, RISK MANAGEMENTIT Policy, RISK MANAGEMENT
IT Policy, RISK MANAGEMENT
 
BBA 4226, Risk Management 1 Course Learning Outcomes
 BBA 4226, Risk Management 1 Course Learning Outcomes  BBA 4226, Risk Management 1 Course Learning Outcomes
BBA 4226, Risk Management 1 Course Learning Outcomes
 
372the risk report described in . The risk report will be .docx
372the risk report described in . The risk report will be .docx372the risk report described in . The risk report will be .docx
372the risk report described in . The risk report will be .docx
 
372the risk report described in . The risk report will be .docx
372the risk report described in . The risk report will be .docx372the risk report described in . The risk report will be .docx
372the risk report described in . The risk report will be .docx
 
Risk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesRisk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction Industries
 
Information Technology Risk Management
Information Technology Risk ManagementInformation Technology Risk Management
Information Technology Risk Management
 
Risk Mgt
Risk Mgt Risk Mgt
Risk Mgt
 
Project risk management
Project risk managementProject risk management
Project risk management
 

Plus de Maria Gomez

From Monolith to Observable Microservices using DDD
From Monolith to Observable Microservices using DDDFrom Monolith to Observable Microservices using DDD
From Monolith to Observable Microservices using DDDMaria Gomez
 
CQRS and Event Sourcing: A DevOps perspective
CQRS and Event Sourcing: A DevOps perspectiveCQRS and Event Sourcing: A DevOps perspective
CQRS and Event Sourcing: A DevOps perspectiveMaria Gomez
 
Splitting the monolith using Domain Driven Design
Splitting the monolith using Domain Driven Design Splitting the monolith using Domain Driven Design
Splitting the monolith using Domain Driven Design Maria Gomez
 
Observable Microservices (O'Reilly SACon London 2018)
Observable Microservices (O'Reilly SACon London 2018)Observable Microservices (O'Reilly SACon London 2018)
Observable Microservices (O'Reilly SACon London 2018)Maria Gomez
 
Effective team onboarding
Effective team onboardingEffective team onboarding
Effective team onboardingMaria Gomez
 
Observable microservices (O'Reilly SACon NY 2018)
Observable microservices (O'Reilly SACon NY 2018)Observable microservices (O'Reilly SACon NY 2018)
Observable microservices (O'Reilly SACon NY 2018)Maria Gomez
 
Security in agile teams
Security in agile teamsSecurity in agile teams
Security in agile teamsMaria Gomez
 
Security in agile teams
Security in agile teamsSecurity in agile teams
Security in agile teamsMaria Gomez
 
Observable Microservices
Observable MicroservicesObservable Microservices
Observable MicroservicesMaria Gomez
 
Splitting the Monolith
Splitting the MonolithSplitting the Monolith
Splitting the MonolithMaria Gomez
 
Taller de Refactorización (Campus Party Quito 2014)
Taller de Refactorización (Campus Party Quito 2014)Taller de Refactorización (Campus Party Quito 2014)
Taller de Refactorización (Campus Party Quito 2014)Maria Gomez
 
Refactoring workshop (Campus Party Quito 2014)
Refactoring workshop (Campus Party Quito 2014)Refactoring workshop (Campus Party Quito 2014)
Refactoring workshop (Campus Party Quito 2014)Maria Gomez
 
Project Management - Report
Project Management - ReportProject Management - Report
Project Management - ReportMaria Gomez
 
Principles of New Media - Essay
Principles of New Media - EssayPrinciples of New Media - Essay
Principles of New Media - EssayMaria Gomez
 
Responsive Environments - MoodMixer Presentation
Responsive Environments - MoodMixer PresentationResponsive Environments - MoodMixer Presentation
Responsive Environments - MoodMixer PresentationMaria Gomez
 
Responsive Environments - Critical report
Responsive Environments - Critical reportResponsive Environments - Critical report
Responsive Environments - Critical reportMaria Gomez
 
New Media Management - Gantt chart
New Media Management - Gantt chartNew Media Management - Gantt chart
New Media Management - Gantt chartMaria Gomez
 
New Media Management - Project plan
New Media Management - Project planNew Media Management - Project plan
New Media Management - Project planMaria Gomez
 
New Media Management - Presentation
New Media Management - PresentationNew Media Management - Presentation
New Media Management - PresentationMaria Gomez
 
New Media Management - Report
New Media Management - ReportNew Media Management - Report
New Media Management - ReportMaria Gomez
 

Plus de Maria Gomez (20)

From Monolith to Observable Microservices using DDD
From Monolith to Observable Microservices using DDDFrom Monolith to Observable Microservices using DDD
From Monolith to Observable Microservices using DDD
 
CQRS and Event Sourcing: A DevOps perspective
CQRS and Event Sourcing: A DevOps perspectiveCQRS and Event Sourcing: A DevOps perspective
CQRS and Event Sourcing: A DevOps perspective
 
Splitting the monolith using Domain Driven Design
Splitting the monolith using Domain Driven Design Splitting the monolith using Domain Driven Design
Splitting the monolith using Domain Driven Design
 
Observable Microservices (O'Reilly SACon London 2018)
Observable Microservices (O'Reilly SACon London 2018)Observable Microservices (O'Reilly SACon London 2018)
Observable Microservices (O'Reilly SACon London 2018)
 
Effective team onboarding
Effective team onboardingEffective team onboarding
Effective team onboarding
 
Observable microservices (O'Reilly SACon NY 2018)
Observable microservices (O'Reilly SACon NY 2018)Observable microservices (O'Reilly SACon NY 2018)
Observable microservices (O'Reilly SACon NY 2018)
 
Security in agile teams
Security in agile teamsSecurity in agile teams
Security in agile teams
 
Security in agile teams
Security in agile teamsSecurity in agile teams
Security in agile teams
 
Observable Microservices
Observable MicroservicesObservable Microservices
Observable Microservices
 
Splitting the Monolith
Splitting the MonolithSplitting the Monolith
Splitting the Monolith
 
Taller de Refactorización (Campus Party Quito 2014)
Taller de Refactorización (Campus Party Quito 2014)Taller de Refactorización (Campus Party Quito 2014)
Taller de Refactorización (Campus Party Quito 2014)
 
Refactoring workshop (Campus Party Quito 2014)
Refactoring workshop (Campus Party Quito 2014)Refactoring workshop (Campus Party Quito 2014)
Refactoring workshop (Campus Party Quito 2014)
 
Project Management - Report
Project Management - ReportProject Management - Report
Project Management - Report
 
Principles of New Media - Essay
Principles of New Media - EssayPrinciples of New Media - Essay
Principles of New Media - Essay
 
Responsive Environments - MoodMixer Presentation
Responsive Environments - MoodMixer PresentationResponsive Environments - MoodMixer Presentation
Responsive Environments - MoodMixer Presentation
 
Responsive Environments - Critical report
Responsive Environments - Critical reportResponsive Environments - Critical report
Responsive Environments - Critical report
 
New Media Management - Gantt chart
New Media Management - Gantt chartNew Media Management - Gantt chart
New Media Management - Gantt chart
 
New Media Management - Project plan
New Media Management - Project planNew Media Management - Project plan
New Media Management - Project plan
 
New Media Management - Presentation
New Media Management - PresentationNew Media Management - Presentation
New Media Management - Presentation
 
New Media Management - Report
New Media Management - ReportNew Media Management - Report
New Media Management - Report
 

Dernier

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 

Dernier (20)

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 

Project Management - Risk management

  • 1. Maria Gomez | 1 Risk Management Gray (2010, 211) defines Risk as “an uncertain event or condition that, if it occurs, has a positive or negative effect on project objectives”, where uncertain means something that could happen but we are not sure about it. Dealing with these uncertain events is what is called Risk Management and the Project Manager is the one responsible for it. Meredith (2010, 205) quoted the PMBOK Guide and define risk management as “the systematic process of identifying, analysing and responding to project risk”. Having a well prepared risk management plan is one of the factor that help a project to end successfully. In every project's life cycle we can find situation where the reality was not even close of what the plan says, and the project manager must be able to deal with the situation and/or mitigate the consequences where possible. Risk Management process Identification This phase is intended to identify and list the risks (as many as possible) that can be found in a particular project. A project is such an independent and unique entity there is no literature or past experiences (although they always help) that can provide the project manager with a list of “most common” risks (Maylor, 2010, 218-232). Therefore it is necessary to hold some kind of brainstorming meeting involving team's members, clients and/or stakeholders to identify potential risks. Some of the tools use during these meetings are: • Risk Breakdown Structures (RBSs): this model is based on the Work Breakdown Structure (WBS), used in the planning stage to organized the work to be done in order to success in the project. Following the same structure, a RBS would define all the areas where risks are likely to appear from a general point of view and going down as many levels as necessary increasingly detailing these areas (Hillson, 2002). These approach is more useful and easier to implement when the project has been planned used a WBS, as consulting the latter will help avoiding a risk event to be missed (Gray 2010, 212-234). Jan 2011
  • 2. Maria Gomez | 2 • Risk Profile: this is defined as a list of question to be hand in to the stakeholders that are based in previous experiences and refer to common areas of a project where risk are more likely to appear. These questions came normally from a Risk Management Data Bank, “a permanent record of identified risks, methods used to mitigate them, and the result of all risk management activities” (Meredith 2010, 207). Analysis In this stage the Project Manager has to analyse and prioritise the list of risks produced in the previous stage. Normally a good place to start is by assessing for each risk: • How likely the event to occur • What the impact would be if the event occurs. There are quite a few methods or techniques to do this. Maylor (2010, 223-232) divided them into two different approaches: Qualitative Approach Analysing every risk in terms of the two elements cited before (likelihood and impact) is the first step to take. The scale for each of them may vary and be specific for each project, but in general these tend to be numeric, going from 1 (very low probability / impact”) to 5 (very high probability / impact) . One way of representing is known as “Risk Severity Matrix” (Fig 1). Normally this matrix is generic for each organization, so the Project Manager only needs to allocate each event in their correct cell. Figure 1: Risk Severity Matrix (NASA, 2009) Jan 2011
  • 3. Maria Gomez | 3 As an extend of this method we have Failure Mode and Effect Analysis (FMEA), where we need to include to the above data a new variable: Detection difficulty, which can be defined as “the ability to detect a failure associated with each cause” (Meredith, 2010, 208). This new parameter needs to be scale as the other two. Once we have all the number, we can calculate the Risk Priority Number (RPN) for each event by using the equation: Severity x Likelihood x Difficulty. Quantity Approach We are talking here about statistical techniques that help by assessing the project's risk. This techniques may be mandatory for some project before they start as some companies or public organizations tend to decide if a project is worth to be execute based on the outcomes of these techniques. These techniques normally are executed by using simulation software. One of the most popular is called PERT (Program Evaluation and Review Technique) and it can be used to asses the overall risk of the project (Gray 2010, 219). Plan The third step in the Risk Management Process is to decide what the response would be for each risk. These can be classified in 4 groups (Gray 2010, 219-229): Mitigate There are two strategies to mitigate a risk and these are based on the parameters we have used to identify the risks: • Reduce the probability of the event to occur • Reduce the impact that the event can have in the project Avoid This implies removing the task that may cause the event. Obviously this cannot be the solution for all the risks as some of the tasks causing risks are essential for the project. Transfer This means to outsource the activities involve in the risk. The chosen third party will assume the responsibility of the risk if it occurs so it will not necessary mean that the risk will disappear. Jan 2011
  • 4. Maria Gomez | 4 Retain This involves accepting the loss or gain when the risk occurs. It is although necessary to have a contingency plan to be implemented when the risk falls into this category. This plan should include a detailed list of actions to be taken. Examples of this can be having a list of alternative suppliers or having a contingency fund. Monitoring Finally and once the project has started the Project Manager needs to constantly monitor the tasks where the risks are likely to occur and update the plan with new risks or any modification on the existing ones. It is useful to have what it is called a Risk Register which normally contains a list of the risks with description and the rest of the data that have been collected and calculated in the previous steps (likelihood, impact, response plan, etc.) (Maylor 2010, 222). Jan 2011
  • 5. Maria Gomez | 5 References - Gray, C., 2010. Project management : the managerial process 5th ed., Dubuque Iowa ;London: McGraw-Hill Contemporary Learning; McGraw-Hill [distributor]. - Hillson, D., 2002. Use a Risk Breakdown Structure (RBS) to Understand Your Risks. Available at: http://www.risk-doctor.com/pdf-files/rbs1002.pdf [Accessed January 22, 2011]. - NPR 8553.1B - NASA Environmental Management System - Chapter3: Planning. Available at: http://nodis3.gsfc.nasa.gov/displayDir.cfm? Internal_ID=N_PR_8553_001B_&page_name=Chapter3 [Accessed January 23, 2011]. - Maylor, H., 2010. Project management 4th ed., Harlow England; New York: Financial Times Prentice Hall. - Meredith, J., 2010. Project management : a managerial approach 7th ed., Hoboken N.J.: Wiley. Jan 2011