SlideShare une entreprise Scribd logo
Chapter 11:
Project Risk Management
Information Technology Project Management,
Fourth Edition
2
Information Technology Project Management, Fourth Edition
Learning Objectives
 Understand what risk is and the importance of good
project risk management.
 Discuss the elements involved in risk management
planning and the contents of a risk management
plan.
 List common sources of risks in information
technology projects.
3
Information Technology Project Management, Fourth Edition
The Importance of Project Risk
Management
 Project risk management is the art and science of
identifying, analyzing, and responding to risk
throughout the life of a project and in the best interests
of meeting project objectives.
 Risk management is often overlooked in projects, but it
can help improve project success by helping select
good projects, determining project scope, and
developing realistic estimates.
4
Information Technology Project Management, Fourth Edition
Negative Risk
 A dictionary definition of risk is “the possibility
of loss or injury.”
 Negative risk involves understanding potential
problems that might occur in the project and
how they might impede project success.
 Negative risk management is like a form of
insurance; it is an investment.
5
Information Technology Project Management, Fourth Edition
Risk Can Be Positive
 Positive risks are risks that result in good things
happening; sometimes called opportunities.
 A general definition of project risk is an uncertainty
that can have a negative or positive effect on meeting
project objectives.
 The goal of project risk management is to minimize
potential negative risks while maximizing potential
positive risks.
6
Information Technology Project Management, Fourth Edition
Project Risk Management Processes
 Risk management planning: Deciding how to
approach and plan the risk management activities for the
project.
 Risk identification: Determining which risks are likely
to affect a project and documenting the characteristics of
each.
 Qualitative risk analysis: Prioritizing risks based on
their probability and impact of occurrence.
7
Information Technology Project Management, Fourth Edition
Project Risk Management Processes
(cont’d)
 Quantitative risk analysis: Numerically estimating
the effects of risks on project objectives.
 Risk response planning: Taking steps to enhance
opportunities and reduce threats to meeting project
objectives.
 Risk monitoring and control: Monitoring identified
and residual risks, identifying new risks, carrying out
risk response plans, and evaluating the effectiveness of
risk strategies throughout the life of the project.
8
Information Technology Project Management, Fourth Edition
Thu 15-12 Risk Management Planning
 The main output of risk management planning is a risk
management plan—a plan that documents the
procedures for managing risk throughout a project.
 The project team should review project documents and
understand the organization’s and the sponsor’s
approaches to risk.
 The level of detail will vary with the needs of the
project.
9
Information Technology Project Management, Fourth Edition
Table 11-2. Topics Addressed in a
Risk Management Plan
 Methodology tools
 Roles and responsibilities
 Budget and schedule
 Risk categories
 Risk probability and impact
 Risk documentation - formats
10
Information Technology Project Management, Fourth Edition
Broad Categories of Risk
 Market risk – is IT product useful?
 Financial risk – affordable? Available resources?
 Technology risk – HW, SW, network … available?
 People risk – people to complete the project?
 Structure/process risk –what changes will it
introduce? Interaction with other systems?
11
Information Technology Project Management, Fourth Edition
Risk Identification
 Risk identification is the process of understanding
what potential events might hurt or enhance a particular
project.
 Risk identification tools and techniques include:
 Brainstorming
 Interviewing
 SWOT analysis
12
Information Technology Project Management, Fourth Edition
Brainstorming
 Brainstorming is a technique by which a group
attempts to generate ideas or find a solution for a
specific problem by amassing ideas spontaneously and
without judgment.
 An experienced facilitator should run the brainstorming
session.
 Be careful not to overuse or misuse brainstorming.
 Psychology literature shows that individuals produce a
greater number of ideas working alone than they do
through brainstorming in small, face-to-face groups.
 Group effects often inhibit idea generation.
13
Information Technology Project Management, Fourth Edition
Interviewing
 Interviewing is a fact-finding technique for collecting
information in face-to-face, phone, e-mail, or instant-
messaging discussions.
 Interviewing people with similar project experience is
an important tool for identifying potential risks.
14
Information Technology Project Management, Fourth Edition
SWOT Analysis
 SWOT analysis (strengths, weaknesses, opportunities,
and threats) can also be used during risk identification.
 Helps identify the broad negative and positive risks that
apply to a project.
15
Information Technology Project Management, Fourth Edition
Qualitative Risk Analysis
 Assess the likelihood and impact of identified risks
to determine their magnitude and priority.
 One of the most important risk quantification tools
and techniques is the Probability/impact matrixes
16
Information Technology Project Management, Fourth Edition
Probability/Impact Matrix
 A probability/impact matrix or chart lists the relative
probability of a risk occurring on one side of a matrix
or axis on a chart and the relative impact of the risk
occurring on the other.
 List the risks and then label each one as high, medium,
or low in terms of its probability of occurrence and its
impact if it did occur.
 Can also calculate risk factors:
 Numbers that represent the overall risk of specific events
based on their probability of occurring and the
consequences to the project if they do occur.
 Ex: HW – old, complex, no support
17
Information Technology Project Management, Fourth Edition
Figure 11-4. Sample
Probability/Impact Matrix
18
Information Technology Project Management, Fourth Edition
Table 11-6. Sample Probability/Impact Matrix
for Qualitative Risk Assessment
19
Information Technology Project Management, Fourth Edition
Quantitative Risk Analysis
 Often follows qualitative risk analysis, but both can be
done together.
 Large, complex projects involving leading edge
technologies often require extensive quantitative risk
analysis.
 One of the main techniques is Decision tree analysis
20
Information Technology Project Management, Fourth Edition
Decision Trees and Expected
Monetary Value (EMV)
 A decision tree is a diagramming analysis technique
used to help select the best course of action in
situations in which future outcomes are uncertain.
 Estimated monetary value (EMV) is the product of a
risk event probability and the risk event’s monetary
value.
 You can draw a decision tree to help find the EMV.
 Ex: which project to submit a proposal? 1, 2, both or
none?
21
Information Technology Project Management, Fourth Edition
Figure 11-6. Expected Monetary
Value (EMV) Example
22
Information Technology Project Management, Fourth Edition
Risk Response Planning
 After identifying and quantifying risks, you must
decide how to respond to them.
 Four main response strategies for negative risks:
 Risk avoidance (eliminating) – continue using
the same HW, SW
 Risk acceptance – contingency plan, backup
 Risk transference (shifting) - insurance for HW
 Risk mitigation (reducing) – competent
personnel, maintenance agreement
23
Information Technology Project Management, Fourth Edition
Response Strategies for Positive Risks
 Risk exploitation – fund computers to school, make news
coverage, this will lead to more business.
 Risk sharing – same example, but share news coverage
with school’s board, and make partnership for training
teachers on how to use PCs.
 Risk enhancement – changing the size of an opportunity
by using drivers. Get good public relations with students,
teachers, parents. Then they will make ads for project.
 Risk acceptance – do nothing, just assume the project
will result in good public relation.
24
Information Technology Project Management, Fourth Edition
Residual and Secondary Risks
 It’s also important to identify residual and secondary
risks.
 Residual risks are risks that remain after all of the
response strategies have been implemented.
 New and stable HW bought may fail
 Secondary risks are a direct result of implementing a
risk response.
 New and stable HW bought caused other peripheral
devices to work improperly.
25
Information Technology Project Management, Fourth Edition
Risk Monitoring and Control
 Involves executing the risk management process to
respond to risk events.
 Workarounds are unplanned responses to risk events
that must be done when there are no contingency plans.
 Main outputs of risk monitoring and control are:
 Requested changes.
 Recommended corrective and preventive actions.
 Updates to the risk register, project management plan,
and organizational process assets.

Contenu connexe

Similaire à presentation project risk management description

project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
avisha23
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and Effectiveness
Invensis Learning
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
SAJJAD KHUDHUR ABBAS
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
Glen Alleman
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
GeorgeKabongah2
 
Risk assesment template
Risk assesment templateRisk assesment template
Risk assesment template
Glen Alleman
 
UCISA Toolkit - Effective Risk Management for Business Change and IT Projects
UCISA Toolkit - Effective Risk Management for Business Change and IT Projects UCISA Toolkit - Effective Risk Management for Business Change and IT Projects
UCISA Toolkit - Effective Risk Management for Business Change and IT Projects
Mark Ritchie
 
Project risk management notes bagamoyo 12.10.2017 final v1
Project risk management  notes bagamoyo 12.10.2017 final v1Project risk management  notes bagamoyo 12.10.2017 final v1
Project risk management notes bagamoyo 12.10.2017 final v1
EMAC Consulting Group
 
Project risk management - Methodology and application
Project risk management - Methodology and applicationProject risk management - Methodology and application
Project risk management - Methodology and application
Marco De Santis, PMP, CFPP
 
978285452340_11.pptx
978285452340_11.pptx978285452340_11.pptx
978285452340_11.pptx
sahilgupta499
 
9. Risk.ppt
9. Risk.ppt9. Risk.ppt
9. Risk.ppt
9. Risk.ppt9. Risk.ppt
9. Risk.ppt
RajeevRanjan338430
 
9. Risk.ppt
9. Risk.ppt9. Risk.ppt
9. Risk.ppt
HinaAsghar16
 
9. Risk.ppt
9. Risk.ppt9. Risk.ppt
9. Risk.ppt
HemaLatha208756
 
9. Risk.ppt
9. Risk.ppt9. Risk.ppt
9. Risk.ppt
HinaAsghar16
 
9. Risk.ppt
9. Risk.ppt9. Risk.ppt
9. Risk.ppt
AyidAlmgati
 
9. Risk.ppt
9. Risk.ppt9. Risk.ppt
9. Risk.ppt
AayushSharma261
 
project managment.ppt
project managment.pptproject managment.ppt
project managment.ppt
HinaAsghar16
 
Pmi 19 26
Pmi 19 26Pmi 19 26
Pmi 19 26
Nawzad Bilal
 
Project Management Day 5 Risk R02.pdf
Project Management Day 5 Risk  R02.pdfProject Management Day 5 Risk  R02.pdf
Project Management Day 5 Risk R02.pdf
Dr Mohamed Elfarran
 

Similaire à presentation project risk management description (20)

project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and Effectiveness
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptxFinal Class Presentation on Determining Project Stakeholders & Risks.pptx
Final Class Presentation on Determining Project Stakeholders & Risks.pptx
 
Risk assesment template
Risk assesment templateRisk assesment template
Risk assesment template
 
UCISA Toolkit - Effective Risk Management for Business Change and IT Projects
UCISA Toolkit - Effective Risk Management for Business Change and IT Projects UCISA Toolkit - Effective Risk Management for Business Change and IT Projects
UCISA Toolkit - Effective Risk Management for Business Change and IT Projects
 
Project risk management notes bagamoyo 12.10.2017 final v1
Project risk management  notes bagamoyo 12.10.2017 final v1Project risk management  notes bagamoyo 12.10.2017 final v1
Project risk management notes bagamoyo 12.10.2017 final v1
 
Project risk management - Methodology and application
Project risk management - Methodology and applicationProject risk management - Methodology and application
Project risk management - Methodology and application
 
978285452340_11.pptx
978285452340_11.pptx978285452340_11.pptx
978285452340_11.pptx
 
9. Risk.ppt
9. Risk.ppt9. Risk.ppt
9. Risk.ppt
 
9. Risk.ppt
9. Risk.ppt9. Risk.ppt
9. Risk.ppt
 
9. Risk.ppt
9. Risk.ppt9. Risk.ppt
9. Risk.ppt
 
9. Risk.ppt
9. Risk.ppt9. Risk.ppt
9. Risk.ppt
 
9. Risk.ppt
9. Risk.ppt9. Risk.ppt
9. Risk.ppt
 
9. Risk.ppt
9. Risk.ppt9. Risk.ppt
9. Risk.ppt
 
9. Risk.ppt
9. Risk.ppt9. Risk.ppt
9. Risk.ppt
 
project managment.ppt
project managment.pptproject managment.ppt
project managment.ppt
 
Pmi 19 26
Pmi 19 26Pmi 19 26
Pmi 19 26
 
Project Management Day 5 Risk R02.pdf
Project Management Day 5 Risk  R02.pdfProject Management Day 5 Risk  R02.pdf
Project Management Day 5 Risk R02.pdf
 

Dernier

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 

Dernier (20)

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 

presentation project risk management description

  • 1. Chapter 11: Project Risk Management Information Technology Project Management, Fourth Edition
  • 2. 2 Information Technology Project Management, Fourth Edition Learning Objectives  Understand what risk is and the importance of good project risk management.  Discuss the elements involved in risk management planning and the contents of a risk management plan.  List common sources of risks in information technology projects.
  • 3. 3 Information Technology Project Management, Fourth Edition The Importance of Project Risk Management  Project risk management is the art and science of identifying, analyzing, and responding to risk throughout the life of a project and in the best interests of meeting project objectives.  Risk management is often overlooked in projects, but it can help improve project success by helping select good projects, determining project scope, and developing realistic estimates.
  • 4. 4 Information Technology Project Management, Fourth Edition Negative Risk  A dictionary definition of risk is “the possibility of loss or injury.”  Negative risk involves understanding potential problems that might occur in the project and how they might impede project success.  Negative risk management is like a form of insurance; it is an investment.
  • 5. 5 Information Technology Project Management, Fourth Edition Risk Can Be Positive  Positive risks are risks that result in good things happening; sometimes called opportunities.  A general definition of project risk is an uncertainty that can have a negative or positive effect on meeting project objectives.  The goal of project risk management is to minimize potential negative risks while maximizing potential positive risks.
  • 6. 6 Information Technology Project Management, Fourth Edition Project Risk Management Processes  Risk management planning: Deciding how to approach and plan the risk management activities for the project.  Risk identification: Determining which risks are likely to affect a project and documenting the characteristics of each.  Qualitative risk analysis: Prioritizing risks based on their probability and impact of occurrence.
  • 7. 7 Information Technology Project Management, Fourth Edition Project Risk Management Processes (cont’d)  Quantitative risk analysis: Numerically estimating the effects of risks on project objectives.  Risk response planning: Taking steps to enhance opportunities and reduce threats to meeting project objectives.  Risk monitoring and control: Monitoring identified and residual risks, identifying new risks, carrying out risk response plans, and evaluating the effectiveness of risk strategies throughout the life of the project.
  • 8. 8 Information Technology Project Management, Fourth Edition Thu 15-12 Risk Management Planning  The main output of risk management planning is a risk management plan—a plan that documents the procedures for managing risk throughout a project.  The project team should review project documents and understand the organization’s and the sponsor’s approaches to risk.  The level of detail will vary with the needs of the project.
  • 9. 9 Information Technology Project Management, Fourth Edition Table 11-2. Topics Addressed in a Risk Management Plan  Methodology tools  Roles and responsibilities  Budget and schedule  Risk categories  Risk probability and impact  Risk documentation - formats
  • 10. 10 Information Technology Project Management, Fourth Edition Broad Categories of Risk  Market risk – is IT product useful?  Financial risk – affordable? Available resources?  Technology risk – HW, SW, network … available?  People risk – people to complete the project?  Structure/process risk –what changes will it introduce? Interaction with other systems?
  • 11. 11 Information Technology Project Management, Fourth Edition Risk Identification  Risk identification is the process of understanding what potential events might hurt or enhance a particular project.  Risk identification tools and techniques include:  Brainstorming  Interviewing  SWOT analysis
  • 12. 12 Information Technology Project Management, Fourth Edition Brainstorming  Brainstorming is a technique by which a group attempts to generate ideas or find a solution for a specific problem by amassing ideas spontaneously and without judgment.  An experienced facilitator should run the brainstorming session.  Be careful not to overuse or misuse brainstorming.  Psychology literature shows that individuals produce a greater number of ideas working alone than they do through brainstorming in small, face-to-face groups.  Group effects often inhibit idea generation.
  • 13. 13 Information Technology Project Management, Fourth Edition Interviewing  Interviewing is a fact-finding technique for collecting information in face-to-face, phone, e-mail, or instant- messaging discussions.  Interviewing people with similar project experience is an important tool for identifying potential risks.
  • 14. 14 Information Technology Project Management, Fourth Edition SWOT Analysis  SWOT analysis (strengths, weaknesses, opportunities, and threats) can also be used during risk identification.  Helps identify the broad negative and positive risks that apply to a project.
  • 15. 15 Information Technology Project Management, Fourth Edition Qualitative Risk Analysis  Assess the likelihood and impact of identified risks to determine their magnitude and priority.  One of the most important risk quantification tools and techniques is the Probability/impact matrixes
  • 16. 16 Information Technology Project Management, Fourth Edition Probability/Impact Matrix  A probability/impact matrix or chart lists the relative probability of a risk occurring on one side of a matrix or axis on a chart and the relative impact of the risk occurring on the other.  List the risks and then label each one as high, medium, or low in terms of its probability of occurrence and its impact if it did occur.  Can also calculate risk factors:  Numbers that represent the overall risk of specific events based on their probability of occurring and the consequences to the project if they do occur.  Ex: HW – old, complex, no support
  • 17. 17 Information Technology Project Management, Fourth Edition Figure 11-4. Sample Probability/Impact Matrix
  • 18. 18 Information Technology Project Management, Fourth Edition Table 11-6. Sample Probability/Impact Matrix for Qualitative Risk Assessment
  • 19. 19 Information Technology Project Management, Fourth Edition Quantitative Risk Analysis  Often follows qualitative risk analysis, but both can be done together.  Large, complex projects involving leading edge technologies often require extensive quantitative risk analysis.  One of the main techniques is Decision tree analysis
  • 20. 20 Information Technology Project Management, Fourth Edition Decision Trees and Expected Monetary Value (EMV)  A decision tree is a diagramming analysis technique used to help select the best course of action in situations in which future outcomes are uncertain.  Estimated monetary value (EMV) is the product of a risk event probability and the risk event’s monetary value.  You can draw a decision tree to help find the EMV.  Ex: which project to submit a proposal? 1, 2, both or none?
  • 21. 21 Information Technology Project Management, Fourth Edition Figure 11-6. Expected Monetary Value (EMV) Example
  • 22. 22 Information Technology Project Management, Fourth Edition Risk Response Planning  After identifying and quantifying risks, you must decide how to respond to them.  Four main response strategies for negative risks:  Risk avoidance (eliminating) – continue using the same HW, SW  Risk acceptance – contingency plan, backup  Risk transference (shifting) - insurance for HW  Risk mitigation (reducing) – competent personnel, maintenance agreement
  • 23. 23 Information Technology Project Management, Fourth Edition Response Strategies for Positive Risks  Risk exploitation – fund computers to school, make news coverage, this will lead to more business.  Risk sharing – same example, but share news coverage with school’s board, and make partnership for training teachers on how to use PCs.  Risk enhancement – changing the size of an opportunity by using drivers. Get good public relations with students, teachers, parents. Then they will make ads for project.  Risk acceptance – do nothing, just assume the project will result in good public relation.
  • 24. 24 Information Technology Project Management, Fourth Edition Residual and Secondary Risks  It’s also important to identify residual and secondary risks.  Residual risks are risks that remain after all of the response strategies have been implemented.  New and stable HW bought may fail  Secondary risks are a direct result of implementing a risk response.  New and stable HW bought caused other peripheral devices to work improperly.
  • 25. 25 Information Technology Project Management, Fourth Edition Risk Monitoring and Control  Involves executing the risk management process to respond to risk events.  Workarounds are unplanned responses to risk events that must be done when there are no contingency plans.  Main outputs of risk monitoring and control are:  Requested changes.  Recommended corrective and preventive actions.  Updates to the risk register, project management plan, and organizational process assets.