Project Quality & Risk Management-Manual
Project Quality & Risk Management-Manual
Ghazala Amin
Faculty of Project Management
Department of Management Sciences
1 of 7
Table of Contents
Introduction ....................................................................................................
03
Objective .......................................................................................................
03
03
04
Pre-Requisites ..............................................................................................
04
04
04
05
05
10
05
11
06
12
07
2 of 7
Introduction
An indispensable component of any advanced postgraduate study program in project management is to
acquaint the course participants with project management as it is being applied by different
organizations in different contexts. Supplementing the project internship, this course module will give
the course participants the valuable opportunity to learn from, and interact with, different project
management practitioners, both Pakistani and foreign, how their organizations apply project
management concepts, and the processes and tools developed to deliver a project which meets/exceeds
the customers expectations.
Objective
To introduce MSPM students to various Project Management Risk and Quality tools and
techniques.
This course would introduce MSPM students with Project Quality and Risk management
concepts.
Cell Phone:
Number XXXXXXXX
Prerequisites
As this is the second semester course in MS Project Management studies, therefore a thorough
knowledge of Project Management LINGO and concepts are mandatory for studying this course. Work
3 of 7
experience of leading or participation in project implementation and execution can also be beneficial
and/or necessary to gain the maximum benefit from this class.
Project Quality Management Processes, Models, Quality Control Tools and techniques:
Project quality managements terminology and project quality concepts are reviewed. Quality
dimensions between goods and services industry are emphasized. Project Quality Gurus; Demings
cycle (Plan, Do, check, Act); Dr. Jurans quality trilogy (Quality improvement, planning and
control); Dr. Crosbys (Four absolutes of quality) and other definitions are reviewed. Students get an
insight into why Quality is given so much emphasis in todays project management approach. The
importance of good quality management on project is highlighted and international standards like
ISO, CMMI, Six sigma, and PMIs Organizational Project Management Maturity Model (OPM3) are
discussed. Quality Planning; Quality Assurance and Quality Control are defined and their usage
along with the associated inputs and subsequent outputs along with the methods used are discussed.
4 of 7
manager to understand what the risks are and how the project should plan deal with them. The risk
management plan has direct impact on time and cost management.
Teaching Methodology
It is important to me that each of you is successful in this course. The topic as well as the concepts will
be discussed. During the semester, student will learn and be engaged in management theories, their
applications, and attempting of quizzes, participation in assignments, the midterm and final exam. The
assessment and evaluation of the students will be based on the below stated areas.
Assessment Scheme
Quiz #1 after 4 weeks
5%
10%
25%
5%
50%
Reading Materials
>=
90%
5 of 7
>=
80-89%
>=
70-79%
>=
60-69%
Being Prepared for Class: Student must review the prior weeks presentation and reference material
before listening to the next lecture. You should understand the concepts by different perspectives.
Academic Dishonesty
Academic dishonesty is an offence that will not be tolerated in any form. Any student who is involved
in any such activity will be penalised to the fullest extent possible allowed by university regulations. If
you have any doubts about whether an action constitutes academic dishonesty, before consult with your
virtual campus administrator before taking the action.
Plagiarism and Cheating: the presentation by a student as his or her own work but is actually stolen
from some one else. Whenever a student submits a piece of writing claiming it to be his own authorship,
it is generally understood that all the ideas, opinions, facts, figures, conclusions, revisions, words are the
students original work, unless he/she has explicitly indicated otherwise using citations, footnotes,
attribution in the text, and/or used quotation marks.
The use of unauthorised material during an examination in order to secure or give help will not be
tolerated. Academic dishonesty also encompasses unauthorised copying and distribution of
examinations, assignments, reports, projects or term papers or the presentation of unacknowledged
material as if it were the students own work. A person failing to acknowledge and recognise the
contribution of the original author will be held responsible under academic deception. Such action will
necessitate measures to discipline the student under the Universitys academic dishonesty policy. Any
academic dishonesty would call for swift punitive action by the faculty and the names of the students
involved would be reported to the concerned administrative incharge.
6 of 7
Module Contents
1-Project Quality Management Overview
2-Project Total Quality Management
3_Project Quality Management Processes
4- Project Quality Management QA & QC Tools
5_Troubled Projects and ways to minimize issues leading to failed projects
6_Project Quality Management (ISO 9000 and the series)
7_Project Quality Management Six Sigma
8_Project leadership and Habits of effective Manager
9- Project Risk Management10_ Project Risk Management- Quantitative and Qualitative Analysis
11-Project Risk Management Identification and Mitigation techniques
7 of 7
Lec#2
Project Quality Management
Ghazala Amin
Why Quality?
Why Quality ?
A good definition of project success is getting the project completed;
Requirements
Within time
Within time and cost
Within time, cost and technical performance requirements
Within time, cost, performance and accepted by the customer/user.
Quality
Schedule
Cost
What is Quality?
The Quality Movement
Quality is:
the totality of characteristics of an entity which
bear on its ability to satisfy stated or implied
needs
-ISO 9000 definition.
Quality is not:
What is Quality?
Operation
Reliability & durability
Conformance
Serviceability
Appearance
Perceived quality
Quality
Importance of Quality
Responsiveness
Competence
Tangibles
Understanding
Access
Courtesy
Security
1995 Corel Corp.
Credibility
10
Communication
11
Market Gains
Reputation
Volume
Price
Improved
Quality
Increased
Profits
Lower Costs
Productivity
Rework/Scrap
Warranty
12
13
14
16
Lec#3
Project Quality Management
Ghazala Amin
Requirements
http://ph.jobstreet.com/jobs/2008/8/i/20/1941336.htm?fr=J
Customer satisfaction:
Management responsibility:
Conformance to requirements
7
ISO 9000
International Organization for Standardization( ISO),
based in Geneva, Switzerland is a consortium of
industrial nations and standards.
Quality Movement
ISO Standards
10
ISO Standards
11
12
ISO 9000
Defines key terms and acts as road map for standards within the series
ISO 9001
Defines model for quality system when contractor demonstrates
capability to design, produce and install products.
ISO 9002
Quality system model for quality assurance in production and
installation
ISO 9003
Quality system model for quality assurance in final inspection and
testing
ISO 9004
Quality mgmt. guidelines for organization wishing to develop and
13
implement a quality system.
ISO -Wikipedia
ISO 9000 is a family of standards for quality management systems.
ISO 9000 is maintained by ISO, the International Organization for Standardization
and is administered by accreditation and certification bodies.
The rules are updated, as the requirements motivate changes over time.
Although the standards originated in manufacturing, they are now employed
across several types of organizations. A "product", in ISO vocabulary, can mean a
physical object, services, or software.
Some of the requirements in ISO 9001:2008 (which is one of the standards in the
ISO 9000 family) include;
A company or organization that has been independently audited and certified to
be in conformance with ISO 9001 may publicly state that it is "ISO 9001 certified"
or "ISO 9001 registered". Certification to an ISO 9001 standard does not
guarantee any quality of end products and services; rather, it certifies that
formalized business processes are being applied.
15
ISO 9000-Wikipedia
Lec#4
ISO-Wikipedia
Ghazala Amin
References
^ "So many standards to follow, so little payoff". Stephanie Clifford. Inc
Magazine, May 2005.
^ a b c "Good Business Sense Is the Key to Confronting ISO 9000" Frank
Barnes in Review of Business, Spring 2000.
^ a b "The 'quality' you can't feel", John Seddon, The Observer, Sunday
November 19, 2000
^ "A Brief History of ISO 9000: Where did we go wrong?". John Seddon.
Chapter one of "The Case Against ISO 9000", 2nd ed., Oak Tree Press.
November 2000. ISBN 1-86076-173-9
^ "Is ISO 9000 really a standard?" Jim Wade, ISO Management Systems
MayJune 2002
^ a b "ISO a GO-Go." Mark Henricks. Entrepreneur Magazine Dec 2001.
^ The ISO Survey 2005 (abridged version, PDF, 3 MB), ISO, 2005
^ Abrahamson, E. (1996). "Managerial fashion." Academy of Management
Review. 21(1):254-285.
ISO 9000-Wikipedia
ISO 9000-Wikipedia
ISO 9000 is a family of standards for quality
management systems.
ISO 9000 is maintained by ISO, the International
Organization for Standardization and is
administered by accreditation and certification
bodies.
The rules are updated, as the requirements
motivate changes over time.
3
ISO 9000-Wikipedia
ISO 9000-Wikipedia
ISO 9000-Wikipedia
ISO 9000-Wikipedia-Contents
Requirements is a document
of approximately 30 pages
which is available from the
national standards
organization in each country.
SCOPE
QUALITY MANAGEMENTS SYSTEM
MANAGEMENT RESPONSIBILITY
QUALITY POLICY
RESPONSIBILITY, AUTHORITY AND COMMMUNICATION
MANAGEMENT REVIEW
RESOURCE MANAGEMENT
INFRASTRUCTURE
WORK ENVIRONMENT
DESIGN AND DEVELOPMENT
PURCHASING
CONTROL MECHANISM
AUDITING
ISO 9000-Wikipedia-Certification
ISO 9000-Wikipedia-Certification
ISO 9000-Wikipedia-Advantages
ISO 9000-Wikipedia-Advantages
11
12
ISO 9000-Wikipedia-Problems
ISO 9000-Wikipedia-Problems
13
14
ISO 9000-Wikipedia-Problems
ISO 9000-Wikipedia-Problems
ISO 9000-Wikipedia
Summary
A good overview for effective use of ISO 9000 is
provided by Barnes:
"Good business judgment is needed to
determine its proper role for a company. Is
certification itself important to the marketing
plans of the company? If not, do not rush to
certification Even without certification,
companies should utilize the ISO 9000 model as
a benchmark to assess the adequacy of its
quality programs."
17
Lec#5
Project Quality Management
Total Quality Management (TQM)
Ghazala Amin
Employee Empowerment
Techniques
Support workers
Let workers make decisions
Build teams & quality circles
Senior Management
Project Manager
Project Staff
Customer
Vendors, suppliers, and contractors
Regulatory Agencies
Sales Gains
Improved response
Higher Prices
Improved reputation
Externally;
Improved
Quality
Internally;
Increased productivity
Lower rework and scrap costs
Lower warranty costs
Reduced Costs
Increased
Profits
Organizational Practices
Leadership
Mission statement
Effective operating procedure
Staff support
Training
Yields: What is important and what is to be
accomplished
Organizational Practices
Quality Principles
Employee Fulfillment
Customer Satisfaction
9
Employment Fulfillment
Quality Principles
Customer focus
Continuous improvement
Employee empowerment
Benchmarking
Empowerment
empowerment requires workers to assume
greater responsibility
Just-in-time
Tools of TQM
Yields: How to do what is important and to be
accomplished
10
Organizational commitment
Yields: Employees attitudes that they can
accomplish what is important and to be
accomplished
11
12
Customer Satisfaction
Winning orders
Repeat customers
Yields: An effective organization with a
competitive advantage
13
14
16
17
18
We are pleased to announce that, effective today, our name is changing from the Baldrige National Quality Program to the Baldrige
Performance Excellence Program and the Award name is changing to the Malcolm Baldrige Award.
As you know, over the more than 20 years since the inception of the program and the Award, the field of quality has evolved from a
focus on product, service, and customer quality to a broader, strategic focus on overall organizational quality. In line with this concept
of overall organizational excellence (which some people refer to as big Q quality), the Baldrige Criteria have evolved to stay on the
leading edge of validated enterprise management practice and needs. This commitment to evolution is a key reason that the Criteria are
increasingly seen as the standard for organizational performance excellence worldwide. It is also the reason that the Baldrige
Community has embraced performance excellence as the term that best reflects who we are and what we do, as indicated in an
independent branding study in 2007 that supported the changing of the Award and Program names.
With this in mind, the Obama Administration and our Congressional oversight committee made the name changes a part of an overall C
realignment that takes place this month. The public announcement of the realignment takes place today, so we are pleased to announce
the new names to you and other program stakeholders.
In the coming days, weeks, and months, you will see our new names appearing on our Website, in our publications, and in other public
communications.
To learn more about the name change, please visit us at www.nist.gov/baldrige. If you have any questions, feel free to contact us at
[email protected] or 301-975-2036.
Sincerely,
The Outreach and Communications Team
Baldrige Performance Excellence Program
20
Quality Gurus
Lec#6
Project Quality Management
Total Quality Management
Ghazala Amin
Quality Experts
Deming was famous for his work in rebuilding
Japan and his 14 Points for Management.
Juran wrote the Quality Control Handbook and ten
steps to quality improvement.
Crosby wrote Quality is Free and suggested that
organizations strive for zero defects.
Ishikawa developed the concepts of quality circles
and fishbone diagrams.
Taguchi developed methods for optimizing the
process of engineering experimentation.
Feigenbaum developed the concept of total quality
control.
Objectives
Methods
Act
Check
5.
Plan
6.
7.
8.
9.
10.
11.
Do
Against Objectives
How methods are executed
1.
2.
3.
4.
Train
Execute
12.
5
13.
14.
4.
5.
6.
7.
8.
9.
10.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
10
12
Continuous Improvement
Kaizen (Japanese)
Zero-defects
Six sigma
13
14
Zero Defects
16
Quality Circles
17
18
Just-in-Time (JIT)
Relationship to quality:
JIT cuts cost of quality
JIT improves quality
Better quality means less inventory and better,
easier-to-employ JIT system
19
20
Just-in-Time (JIT)
Pull system of production/purchasing
Customer starts production with an order
Unreliable
Vendors
Scrap
Capacity
Imbalances
23
Scrap
Capacity
Imbalances
22
Lecture #7
Project Quality Management
Quality Processes
Ghazala Amin
Quality Leadership
Reference:
Dr. Harold Kerzners PROJECT MANAGEMENT A SYSTEMS APPROACH TO PLANNING, SCHEDULING, AND CONTROLLING
Page 915: QUALITY LEADERSHIP
Teamwork
Strategic Integration
Continuous Improvement
Respect for people
Customer Focus
Management by Fact
Structured Problem Solving
Processes include:
Quality planning: Identifying quality requirements and/or
standards relevant to the project and documenting how
the project will demonstrate compliance.
Quality assurance: Periodically auditing overall project
quality control measurements to ensure that appropriate
quality standards are used.
Quality control: Monitoring and recording specific project
quality activities to assess performance and recommend
necessary changes.
Quality Planning
Quality Assurance
Quality Control
Planning
Execution
Control
Quality
Planning
Quality
Assurance
Quality Control
Closing
Knowledge
Areas
Quality
Management
Project managers are ultimately responsible for quality management on their projects.
Quality Planning
Quality Planning
Quality planning should be performed regularly
and in parallel with other project planning
processes. For example:
Quality Planning
10
12
13
14
Benefit/cost analysis
Benchmarking
Flowcharting
Design of experiments
Cost of Quality
15
16
Benchmarking
It involves comparing actual or planned project
practices to those of other projects (either within
the performing organization or external) to
generate ideas for improvement and to provide a
standard by which to measure performance.
17
18
19
20
Some commonly used tools & techniques employed for Quality planning
are;
Design of experiments
A statistical method that helps identify which factors might
influence specific variables.
Is applied most frequently to the product of the project .
22
Design of experiments
Can also be applied to project management issues such as
cost and schedule
tradeoffs.
Example: senior engineers will cost more than junior engineers
but will usually complete the assignment in less time. An
appropriately designed experiment which computes project
costs and duration for various combinations of senior and
junior engineers will often yield an optimal solution from a
relatively limited number of cases.
23
Cost of Quality
Refers to the total cost of all efforts to achieve
product/service quality.
Includes all work to ensure conformance to
requirements as well as all work resulting from
nonconformance to requirements.
24
Cost of Quality
Three types of incurred costs:
prevention,
appraisal, and
failure (where failure is)
internal cost
external costs.
25
26
Quality is never an
accident, it is always the
result of an intelligent
effort
Lecture #8
Project Quality Management
Quality Management Plan
Ghazala Amin
John Ruskin
1. DEFECTS / REJECTS
2.
COMPLAINTS
3.
CONSISTENCY
4.
PRECISION
5.
ACCURACY
6.
VARIATION
Fitness to Latent
Requirements
Fitness to
Cost
To build a product that
meets the needs of
customer.
Fitness to
Use
Fitness to
Standards
To build a product that meets the
specifications set by the designer.
http://perspectives.avalution.com/2009/what-is-management-system/
http://perspectives.avalution.com/2009/what-is-management-system/
Quality Management
All activities of the overall management
function that determine the quality
policy, objectives and responsibilities
and implement planning, quality control,
quality
assurance
and
quality
improvement within the quality system
(ISO 840)
http://www.mamk.fi/instancedata/prime_product_julkaisu/mamk/embeds/mamkwwwstructure/eb245bc19a2177d0e943c128d91b7e2607c60110.jpg
10
11
12
TABLE OF CONTENTS
INTRODUCTION
QUALITY MANAGEMENT APPROACH
QUALITY REQUIREMENTS / STANDARDS
QUALITY ASSURANCE
QUALITY CONTROL
QUALITY CONTROL MEASUREMENTS
http://www.projectmanagementdocs.com/project-planning-templates/quality-management-plan.html 14
Lecture #9
Project Quality Management
Quality ProcessesQuality Assurance and Quality Control
Ghazala Amin
Quality Assurance
Poor
Quality
Project
3
Quality Control
QUALITY ASSURANCE
Quality Assurance
Dr. Harold Kerzners PROJECT MANAGEMENT A SYSTEMS APPROACH TO PLANNING, SCHEDULING, AND CONTROLLING
Page 988 and 989: QUALITY ASSURANCE AND QUALITY CONTROL
Quality Assurance
Quality Audit
10
Quality Audit
Quality audits
A structured review of all quality management
activities.
11
12
Quality improvement
Includes taking action to increase the effectiveness
and efficiency of the project to provide added benefits
to the project stakeholders.
In most cases will require preparation of change
requests or taking corrective action and will be
handled according to the procedures for integrated
change control.
14
Quality Control
Quality Control
15
16
Quality Control
Quality Control
Work results
Quality management plan
Operational definitions
Checklists
17
Quality Control
18
Quality Control
Inspection:
Inspection
Control charts
Pareto diagram
Statistical sampling
Flowcharting
Trend analysis
19
20
Results in;
What is Rework?
Quality improvement
Acceptance decisions
Rework
Action taken to bring a defective or nonconforming
item into
compliance with requirements or specifications.
Rework, especially
unanticipated, is a frequent cause of project overruns
in most application areas.
The project team should make every reasonable effort
to minimize rework.
Rework
21
22
Process adjustments
Quality control
Quality Control is primarily concerned with the
correctness of work results.
23
24
Analysis
Data
Tables
Pareto
Analysis
Lec#10
Histograms
Scatter
Diagrams
Trend
Analysis
Control
Charts
Ghazala Amin
1
Data Table
Tools of TQM
Tools for generating ideas
Defects
Proces Proces
sA
sB
Proces Proces
sC
sD
Total
Incorrect Invoice
Incorrect Inventory
Damaged Material
10
Total
13
34
Histograms
Statistical process control chart
3
Time
Machine Method
Effect
Material
Major
Defect
Energy
Measure
People
Environ.
Scatter Diagram
Y
X
Plot the results of two variables. Used to determine the
relationship between two or more pieces of corresponding
data. The data are plotted on an X-Y chart to determine correlation
Show distribution around Central tendency
Highlight Exceptions (out of tolerance condition)
Source of data for the Pareto Chart
7
Pareto Analysis
Pareto Diagram
Primary Purpose:
Focus improvement efforts on the most important causes
15
10
5
0
Noise
Wobble
Pressure
Other
Pareto's rule:
A large number of defects are the result of a small number of causes. Fix the problems
that are causing the greatest number of defects first. Does not account for severity
of the defects
9
10
Acceptance Sampling
12
Statistical Sampling
Statistical sampling involves choosing part of a
population of interest for inspection.
Statistical Sampling
Prevention
Keep Errors out of production
Keep defects from reaching customers
Attribute Sampling
Conformance or non-conformance
Statistical Sampling
14
15
16
Control Chart
10
8
6
4
2
0
-2
-4
-6
-8
-10
Time
Process results over time
Process is in control when the number of defects fall within
upper and lower control limits.
Process adjustments are immediate corrective actions based on
QC measure.
Process can be improved to meet tighter control limits:
Processes in control should not be adjusted.
18
20
Hugging control limit: a series (run) of points that are close to a control
limit. Requires correction to prevent data points from going outside the
control limit.
Rule of Thumb: Considered abnormal if two of three, three of seven,
or four of ten data points fall within the outer one-third of the chart.
21
22
23
24
Types of Tests
Unit testing tests each individual component (often a
program) to ensure it is as defect-free as possible.
Integration testing occurs between unit and system
testing to test functionally grouped components.
System testing tests the entire system as one entity.
User acceptance testing is an independent test
performed by end users prior to accepting the
delivered system.
25
26
MPM Internal
QUALITY ASSURANCE
DOCUMENT
No.
1 (8)
MPM/Doc-12Error! Unknown
Date
Rev
Reference
document property
name.
A
Checked
1
Quality Assurance Plan Template
Items that are intended to stay in as part of your document are in bold;
explanatory comments are in Italic text, describing the intent of each section.
Organizational responsibility
Date
2 (8)
No.
MPM Internal
QUALITY ASSURANCE
DOCUMENT
Checked
MPM/Doc-12Error! Unknown
Date
Rev
Reference
document property
name.
A
Table of Contents
1 INTRODUCTION.. 3
2 REFERENCE DOCUMENTS............................................................................................ 3
3 MANAGEMENT..ORGANIZATION.....................................................
3.1 ORGANIZATION................................................................................................................. 3
3.2 ROLES AND RESPONSIBILITIES............................................................................................ 3
4 STANDARDS TO BE USED............................................................................................. 4
4.1 PRODUCT STANDARDS...................................................................................................... 4
4.2 PROCESS STANDARDS....................................................................................................... 4
5 COACHING AND MENTORING ACTIVITIES .................................................................. 4
6 REVIEWS AND AUDITS....................................................................................................5
6.1 W ORK PRODUCT REVIEWS.................................................................................................5
6.2 PROCESS REVIEWS ...........................................................................................................5
6.3 QUALITY ASSURANCE PROGRESS REVIEWS ....................................................................... .6
6.4 QUALITY ASSURANCE LESSONS LEARNED REVIEW...............................................................6
6.5 INDEPENDENT REVIEW OF QUALITY ASSURANCE..................................................................6
6.6 SCHEDULE OF QUALITY ASSURANCE ACTIVITIES..................................................................6
7 FEEDBACK AND REPORTS .............................................................................................6
8 PROBLEM REPORTING AND CORRECTIVE ACTION ....................................................7
9 TOOLS, TECHNIQUES, AND METHODS...........................................................................7
10 QUALITY ASSURANCE MEASURES...............................................................................7
11 SUPPLIER CONTROL.......................................................................................................8
12 RECORDS COLLECTION, MAINTENANCE AND RETENTION.......................................8
13 TRAINING...........................................................................................................................8
14 RISK MANAGEMENT.........................................................................................................8
MPM Internal
QUALITY ASSURANCE
DOCUMENT
No.
3 (8)
MPM/Doc-12Error! Unknown
Date
Rev
Reference
document property
name.
A
Checked
1. INTRODUCTION
Describe the scope of this Quality Assurance Plan, identifying which project(s),
Product, and/or the portion of the project life cycle are covered by the plan.
Describe the quality objectives for this project, with any measures being used to
quantify the objectives.
2. REFERENCE DOCUMENTS
Provide a complete list of documents that provided input to this plan or that must
be read to understand this plan.
3 MANAGEMENT ORGANIZATION
Describe the organization, tasks, and responsibilities of the people who will
contribute to the quality assurance efforts for this project. Also describe the
organization of the project overall, or provide a reference to where that
information can be found.
3.1 ORGANIZATION
Depict the organizational structure for the group that performs the quality
assurance function for this project. Show how the quality assurance staff relates
to the project development staff, and discuss the level of independence of the
quality assurance staff from those responsible for development.
3.2 ROLES AND RESPONSIBILITIES
Describe the primary roles and responsibilities of the quality assurance staff.
Indicate activities such as mentoring or coaching the project, auditing work
products, auditing processes, participating in project reviews, etc. Often a table of
roles and responsibilities is a useful way to depict the information; extend as
needed.
Name
Role
Responsibilities
4 (8)
No.
MPM Internal
QUALITY ASSURANCE
DOCUMENT
Checked
MPM/Doc-12Error! Unknown
Date
Rev
Reference
document property
name.
A
4 STANDARDS TO BE USED
4.1 PRODUCT STANDARDS
Identify any product standards that must be followed by the project, as well as
any other product conventions and measures that will be applied. Describe how
compliance with these items is to be monitored and assured.
4.2 PROCESS STANDARDS
Identify process standards to be followed by the project, as well as any other
process related conventions and measures that will be applied. Describe how
compliance with these items is to be monitored and assured. Include the basic
design, development, testing, and deployment considerations, including
standards such as the following:
a) Documentation standards
b) Enterprise, process, technical, and or data rchitecture standards
c) Coding and naming standards
d) Testing standards and practices
e) Organization or project product and process measures
5 (8)
No.
MPM Internal
QUALITY ASSURANCE
DOCUMENT
Checked
MPM/Doc-12Error! Unknown
Date
Rev
Reference
document property
name.
A
When Reviewed by
Quality Assurance
(Status or Criteria)
How Reviewed by
Quality Assurance
(Standards or Method)
When Reviewed by
Quality Assurance
(Status or Criteria)
How Reviewed by
Quality Assurance
6 (8)
No.
MPM Internal
QUALITY ASSURANCE
DOCUMENT
Checked
MPM/Doc-12Error! Unknown
Date
Rev
Reference
document property
name.
A
7 (8)
No.
MPM Internal
QUALITY ASSURANCE
DOCUMENT
Checked
MPM/Doc-12Error! Unknown
Date
Rev
Reference
document property
name.
A
Provided to
Provided
Provided
Records
Whom
When
How
8 (8)
No.
MPM Internal
QUALITY ASSURANCE
DOCUMENT
Checked
MPM/Doc-12Error! Unknown
Date
Rev
Reference
document property
name.
A
11 SUPPLIER CONTROL
Describe the approach for monitoring the quality assurance activities of any
supplier who is providing software components for the project. At a minimum the
supplier should prepare and implement a Quality Assurance Plan in accordance
with this template.
13 TRAINING
Identify the training activities necessary to ensure that the quality assurance staff
meet the needs of this plan.
14 RISK MANAGEMENT
Describe how risks to the quality assurance will be identified, prioritized, and
managed during the execution of this plan.
CRITICAL QUALITY
ISSUES IN
PAKISTAN
Education in Pakistan: The Key Issues, Problems and The New Challenges
Ghulam Rasool Memon,
Department of Education, University of Karachi
The Education Sector in Pakistan suffers from insufficient financial input, low
levels of efficiency for implementation of programs, and poor quality of
management, monitoring, supervision and teaching. As a result, Pakistan has
one of the lowest rates of literacy in the world, and the lowest among
countries of comparative resources and social/economic situations.
With a per capita income of over $450 Pakistan has an adult literacy rate of
49%, while both Vietnam and India with less per capita income have literacy
rates of 94% and 52%, respectively (Human Development Centre, 1998).
An educational system of poor quality may be one of the most important
reasons why poor countries do not grow.
Poor Carrot Production in Toba Tek Singh Cross-sectional data were used to determine the effects of ground water on carrot
production. Results of production function analysis indicated that poor quality of
ground water in Toba Tek Singh was significantly decreasing the carrot production.
The consistent use of poor quality water not only deteriorates chemical and physical
properties of soil (World Bank, 1994) but also results in loss of agriculture production
of the order of 14000 million rupees per annum (Pato, 1998)
The result indicates that one percent increase in application of poor quality of the
ground water could further decline carrot yield by 0.153%. Carrot crop is sensitive to
poor quality of the ground water and application of this type of water results in
substantial losses in carrot production.
Cause
Analysis
Time
Data
Tables
Pareto
Analysis
Cause
and
Effect
Analysis
Trend
Analysis
Machine Method
Effect
Material
Major
Defect
Histograms
Energy
Scatter
Diagrams
Measure
People
Environ.
Control
Charts
OVERVIEW OF QA PLAN
OVERVIEW OF QA PLAN
1.
2.
3.
4.
5.
6.
7.
8.
10
Introduction
Reference Documents
Management Organization
Standards to be Used
Coaching & Mentoring Activities
Reviews & Audits
Feed Back & Reports
Problems Reporting & Corrective Actions
11
12
Quality Processes
Ghazala Amin
Quality Nodes
Quality Processes
The quality of a system is highly influenced by the quality
of the process used to acquire, develop and maintain it.
Requirements
People
Quality
Quality
Schedule
Cost
Process
Technology
Quality Nodes
Schedule
Requirements
People
Quality
Quality
Cost
Process
Technology
No time to improve
Constantly in reactive mode rather than proactive
Firefighters get burned easily !!!!
Embers may rekindle later.
Probability of success
Benefits of predicting
Project performance
b.
10
c.
Time/Rs.$/
11
Organizational Influences
14
Organizational Influences,
Workplace Factors, and Quality
Study by DeMarco and Lister showed that organizational
issues had a much greater influence on programmer
productivity than the technical environment or
programming languages.
Programmer productivity varied by a factor of one to ten
across organizations, but only by 21 percent within the
same organization.
Study found no correlation between productivity and
programming language, years of experience, or salary.
A dedicated workspace and a quiet work environment
were key factors to improving programmer productivity.
16
18
19
20
Maturity Models
21
22
24
26
Reference:
Dr. Harold Kerzners PROJECT MANAGEMENT A SYSTEMS APPROACH TO PLANNING, SCHEDULING, AND CONTROLLING
Page 929: Project Management Maturity Model
Continuous Improvement
Bottom Line
Process improvement should be done to help the business
not for its own sake.
27
Reference:
28
Dr. Harold Kerzners PROJECT MANAGEMENT A SYSTEMS APPROACH TO PLANNING, SCHEDULING, AND CONTROLLING
Page 941: Continuous Improvement
Creating
Customer
Value
Lec#13
Project Quality Processes
Ghazala Amin
Exceeding
customer
expectations
Employee
Empowerment
Leadership
As Joseph M. Juran said in 1945, It is
most important that top management be
quality-minded. In the absence of sincere
manifestation of interest at the top, little
will happen below.
Cost Of Quality
Media Snapshot*
*McGuire, David, Report: Spam Costs Are Rising at Work, Washington Post (June 7, 2004).
7
Quality is Free
1964, IBM published its first report included poor-quality cost for internal
component mfg, subassembly, final
assembly, final machine test, system test,
& first 12 months at customer location for
1620 system. called
Q-100 Report
10
Cost of Quality-Wikipedia
11
12
Description
Cost of Non-Conformance-Wikipedia
Examples
Cost Areas
Prevention Costs
Quality Planning
Investment in quality-related
information
Quality training and workforce
Systems development and
management
Product design verification
Appraisal Cost
Description
Examples
Scrap
Rework
Material procurement
costs
Complaints in warranty
Complaints out of
warranty
Product service
Product liability
Product recall
Loss of reputation
13
14
15
Planning
Training and
indoctrination
Product
Design/Validation
Process Validation
Test and Evaluation
Quality Audits
Maint./Calibration
Field Testing
Non-Conformance
Scrap
Rework
Material cost
(additional)
Warranty repairs
Complaint handling
Liability Judgments
Product recall
Field Service
Expediting
17
18
Cost of Non-compliance
Failure costs
Internal losses - scrap, rework
External losses - warranty work, customer
complaint departments, litigation, product recalls
19
20
Quality of conformance
minimize and control process variation to
satisfy the design specifications every time
Quality of service
The customer must come first
21
22
References
Ghazala Amin
http://www.ge.com/sixsigma/SixSigma.
pdf
Six Sigma
Six Sigma
DMAIC
Define
Measure
Analyze
Improve
Control
DMAIC
p. 7.
**Ibid. p. 9.
10
Reference: http://media.techtarget.com/searchSoftwareQuality/downloads/SixSigmaContImprove.pdf
Percent of
Population
Defective Units
Per Billion
Within Range
15
68.27
317,300,000
95.45
45,400,000
99.73
2,700,000
99.9937
63,000
99.999943
57
99.9999998
16
The Six Sigma convention for determining defects is based on the above
conversion table. It accounts for a 1.5 sigma shift to measure the number of
defects per million opportunities instead of the number of defects
per unit.
17
The Roadmap
to Customer
Impact
High
INTENSITY
Low
1990
TIME
...the Customer
Delighting Customers
Customers are the center of GEs universe: they define quality. They expect
performance, reliability, competitive prices, on-time delivery, service, clear and correct
transaction processing and more. In every attribute that influences customer perception,
we know that just being good is not enough. Delighting our customers is a necessity.
Because if we dont do it, someone else will!
...the Process
Outside-In Thinking
Quality requires us to look at our business from the customers perspective, not ours. In other
words, we must look at our processes from the outside-in. By understanding the transaction
lifecycle from the customers needs Customers
View of GEs
and processes, we can discover
Contribution
what they are seeing and feeling.
A
B
C
With this knowledge, we can
Customer
Process
identify areas where we can add
GE Process
significant value or improvement
from their perspective.
GEs View
...the Employee
of Its
Contribution
Leadership Commitment
People create results. Involving all employees is essential to GEs quality approach. GE is
committed to providing opportunities and incentives for employees to focus their talents and
energies on satisfying customers.
All GE employees are trained in the strategy, statistical tools and techniques of Six Sigma
quality. Training courses are offered at various levels:
Master Black Belt, Black Belt and Green Belt Training: in-depth quality training
that includes high-level statistical tools, basic quality control tools, Change Acceleration
Process and Flow technology tools.
Design for Six Sigma (DFSS) Training: prepares teams for the use of
statistical tools to design it right the first time.
Quality is the responsibility of every employee. Every employee must be involved, motivated
and knowledgeable if we are to succeed.
Defect:
Process Capability:
Variation:
Stable Operations:
Design for Six Sigma: Designing to meet customer needs and process capability
Tree Diagram Graphically shows any broad goal broken into different levels of detailed actions. It encourages
team members to expand their thinking when creating
solutions.
Quality Terms
Black Belt Leaders of team responsible for measuring, analyzing, improving and controlling key processes
that influence customer satisfaction and/or productivity
growth. Black Belts are full-time positions.
Control The state of stability, normal variation and predictability. Process of regulating and guiding operations
and processes using quantitative data.
CTQ: Critical to Quality (Critical Y) Element of
a process or practice which has a direct impact on its
perceived quality.
19991438-1
PROJECT QUALITY
MANAGEMENT
STUDY NOTES
PMBOK 2000 based, Version 6
In Preparation For
PMP Certification Exam
Publishing Information
This publication has been produced using Lotus Word Pro 96.
Trademarks
The following are trademarks of International Business Machines Corporation in the United
States, or other countries, or both: IBM
Lotus, Lotus Notes, Lotus Word Pro, and Notes are trademarks of Lotus Development
Corporation in the United States, or other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft
Corporation of the United States, or other countries, or both.
The following are certification, service, and/or trademarks of the Project Management Institute,
Inc. which is registered in the United States and other nations: PMI is a service and
trademark, PMI Logo and "PMBOK", are trademarks, PMP and the PMP logo are
certification marks.
Other company, product, and service names may be trademarks or service marks of others.
Disclaimer
PMI makes no warranty, guarantee, or representation, express or implied, that the successful
completion of any activity or program, or the use of any product or publication, designed to prepare
candidates for the PMP Certification Examination, will result in the completion or satisfaction of any
PMP Certification eligibility requirement or standard., service, activity, and has not contributed any
financial resources.
Initially Prepared By: Kim Ulmer
Edited By: Peter Dapremont
Quality Management
Study Notes
"PMBOK" is a trademark of the Project Management Institute, Inc. which is registered in the United States and other nations.
PMI is a service and trademark of the Project Management Institute, Inc. which is registered in the United States and other nations.
PMP and the PMP logo are certification marks of the Project Management Institute which are registered in the United States and other
nations.
5-3
Key Definitions
Control
Control Charts
Corrective Action
Cost of Conformance
Cost of
Nonconformance
Cost of Quality
Grade
Monitoring
Monte Carlo Analysis
Pareto Diagram
Paretos Law
Performance Reporting
Project Quality
Management
Quality
Quality Assurance (QA)
Quality Plan
Quality Policy
Quality Planning
Rework
Total Quality
Management (TQM)
5-5
Includes the processes required to ensure that the project will satisfy the needs for
which it was undertaken.
Includes all activities of the overall management function that determine the quality
policy, objectives, and responsibilities and implements these by means such as quality
planning, quality assurance, quality control, and quality improvement within the quality
system.
Must address both the management of the project and the product or service of the
project.
Failure to meet quality requirements in either dimension can have serious negative
consequences for the project stakeholders. For example:
Meeting customer requirements by overworking the project team may produce
negative consequences in the form of increased employee attrition.
Meeting project schedule objectives by rushing planned quality inspections may
produce negative consequences when errors go undetected.
Modern quality management complements project management. For example, both
disciplines recognize the importance of:
Customer satisfaction:
Understanding, managing, and influencing needs so that customer
expectations are met.
Requires a combination of conformance to requirements and fitness for
use. (the product/service must satisfy real needs)
Prevention over inspection: the cost of preventing mistakes is always much
less than the cost of correcting the mistakes, as revealed by inspection.
Management responsibility: success requires the participation of all members
of the team, but it remains the responsibility of management to provide the
resources needed to succeed.
Processes within phases: the repeated plan-do-check-act cycle described by
Deming and others is highly similar to the Project Management Processes.
(described in Chapter 3 of the PMBOK Guide.)
Quality:
Is the totality of characteristics of an entity that bear on its ability to satisfy stated or
implied needs. Stated and implied needs are the inputs to developing project
requirements.
Should not be confused with grade. Grade is a category or rank given to entities having
the same functional use but different technical characteristics. Low quality is always a
problem; low grade may not be. For example:
A software product may be of high quality (very few defects, a readable users
manual) but of low grade meaning it has a limited number of features.
Or, a software product may be of low quality but of high grade meaning it has
many defects but lots of customer features.
The process of identifying which quality standards are relevant to the project and
determining how to satisfy them.
One of the key facilitating processes during project planning, meaning it should be
performed regularly and in parallel with other project planning processes. For example:
The changes in the project product/service required to meet identified quality
standards may require cost or schedule adjustments.
The desired product/service quality may require a detailed risk analysis of an
identified risk source.
Quality should be planned in, not inspected in.
Inputs include: Quality policy, scope statement, product description, standards and
regulations, and other process outputs.
Quality policy:
The overall intentions and direction of an organization with regard to
quality, as formally expressed by top management.
When a formal quality policy is not available, or in the case of joint
ventures involving multiple performing organizations, the project
management team will need to develop a quality policy for the project.
Regardless of origin, the project management team is responsible for
ensuring that the project stakeholders are fully aware of the quality policy.
Other process outputs: outputs from other knowledge areas that should be
considered as part of quality planning. For example, procurement planning may
identify contractor quality requirements.
Methods used during quality planning include: benefit/cost analysis, benchmarking,
flowcharting, and design of experiments.
Benefit/cost analysis:
Must consider benefit/cost tradeoffs during quality planning.
The primary benefit of meeting quality requirements is less rework which
translates to higher productivity, lower costs, and increased stakeholder
satisfaction.
The primary cost of meeting quality requirements is the expense
associated with project quality management activities.
The benefits of the quality management discipline outweigh the costs.
Benchmarking: involves comparing actual or planned project practices to those
of other projects (either within the performing organization or external) to
generate ideas for improvement and to provide a standard by which to measure
performance.
5-7
5-9
The process of monitoring specific project results to determine if the results comply with
relevant quality standards and identifying ways to eliminate causes of unsatisfactory
performance.
Should be performed throughout the project.
Project results include both product results such as deliverables and project
management results such as cost and schedule performance.
Often, although not always, provided by a Quality Control Department or similarly titled
organization.
Project management team should have a working knowledge of statistical quality
control, especially sampling and probability, to help evaluate quality control outputs.
The team may find it useful to know the differences between:
Prevention: keeping errors out of the process, versus,
Inspection: keeping errors out of the hands of the customer.
Attribute sampling: the result either conforms or it does not, versus,
Variables sampling: the result is rated on a continuos scale that measure that
degree of conformity.
Special causes: unusual events, versus,
Random causes: normal process variation.
Tolerances: the result is acceptable if it falls within the range specified by the
tolerance, versus,
Control limits: the process is in control if the result falls within the control limits.
Note: Result can be within the control limits of a process but out of tolerance.
Inputs include: work results (both process and product results), Quality Management
Plan, operational definitions, and checklists.
.
Methods used during quality control include: inspection, control charts, pareto
diagrams, statistical sampling, flowcharting, and trend analysis.
Inspection:
Includes activities such as measuring, examining, and testing undertaken
to determine whether results conform to requirements.
May be conducted at any level (e.g., the results of a single activity may be
inspected or the final project product).
May be called reviews, product reviews, audits, and walkthroughs.
Note: in some application areas these terms have narrow and specific
meanings.
Control charts:
Graphic displays of the results over time of a process.
Used to determine if the process is in control (e.g., are differences in the
results attributed to random variations or unusual events whose causes
must be identified and corrected?)
Although most frequently used to track repetitive activities such as
manufacturing lots, control charts may be used to monitor any type of
5-11
Pareto diagrams:
Histograms ordered by frequency of occurrence that display how many
results were generated by type or category of an identifiable cause.
Rank ordering is used to guide corrective action with the assumption
that the project team should take action to fix the problems that are
causing the greatest number of defects, first.
Are conceptually related to Paretos Law which holds that a relatively
small number of causes will typically produce a large majority of the
problems or defects. This is commonly referred to as the 80/20
principle where 80% of the problems are due to 20% of the causes.
Statistical sampling:
Involves choosing a population of interest for inspection. (e.g.,
selecting ten engineering drawings at random from a list of
seventy-five).
Appropriate sampling can often reduce the cost of quality control.
In some application areas, the project management team must be
familiar with a variety of sampling techniques.
Trend analysis:
Uses mathematical techniques to forecast future outcomes based on
historical results.
Often used to monitor technical performance (how many errors or
defects have been identified, how many remain uncorrected) as well
as cost and schedule performance (how many activities per period
were completed with significant variances.)
Outputs include: quality improvement, acceptance decisions, rework, completed
checklists, and process adjustments.
Acceptance decisions: Decisions to either accept or reject the inspected items.
Rejected items may require rework.
Rework: Action taken to bring a defective or nonconforming item into
compliance with requirements or specifications. Rework, especially
unanticipated, is a frequent cause of project overruns in most application areas.
The project team should make every reasonable effort to minimize rework.
Process adjustments: Immediate corrective or preventive action as a result of
quality control measurements. In some cases, the process adjustment may
need to be handled according to procedures for integrated change control.
Quality is the totality of features and characteristics of a product or service that bear on
its ability to satisfy stated or implied needs.
Some goals of quality programs include:
Fitness for use. (Is the product or service capable of being used?)
Fitness for purpose. (Does the product or service meet its intended purpose?)
Customer satisfaction. (Does the product or service meet the customers
expectations?)
Conformance to the requirements. (Does the product or service conform to the
requirements?)
Quality Movements:
5-13
Malcolm Baldrige
The Malcolm Baldrige National Quality Improvement Act was established in
Aug. 20, 1987.
Purpose of the act was to promote quality awareness; to recognize quality
achievements of U.S. companies, and to publicize successful quality strategies.
Covers the following seven categories: (See Ireland, Appendix B)
1. Leadership
2. Information and Analysis
3. Strategic Quality Planning
4. Human Resources
5. Quality Assurance
6. Results
7. Customer Satisfaction
Juran
Attitude breakthrough
Identify vital new projects
Knowledge breakthrough
Conduct the analysis
Institute change
Overcome resistance and institute controls
5-15
Zero Defects
Implies that there is no tolerance for errors within the system.
The goal of all processes is to avoid defects in the product or service.
Similar to six sigma: almost zero defects
The Customer is the Next Person in the Process
The internal organization has a system that ensures the product or service is
transferred to the next person in the process in a complete and correct manner.
The product or service being built is transferred to another internal party only
after it meets all the specifications and all actions at the current work station.
Avoids incorrectly assembled components and poor workmanship.
Do the Right Thing Right the First Time (DTRTRTFT)
Implies that it is easier and less costly to do the work right the first time than it is
to do it the second time.
Entails the training of personnel to ensure sufficient skills and tools to correctly
complete the work.
Continuous Improvement Process (CIP) (From Japanese word, Kaizen)
A concept which recognizes that the world is constantly changing and any
process that is satisfactory today may well be unsatisfactory tomorrow.
A sustained, gradual change to improve the situation.
Differs from innovation -- does not make a sudden jump to a plateau where it
matures over time. (see Ireland, I-6)
Focuses on 11 principles: constancy of purpose, commitment to quality,
customer focus and involvement, process orientation, continuous improvement,
system-centered management, investment in knowledge, teamwork,
conservation of human resources, total involvement, and perpetual commitment.
Rather than manage the output of the project, the focus is on managing the total
process and subprocesses. The process is held constant only after it has been
proven capable of the work. Hence, the product naturally meets the
requirements.
CIP steps:
Define and standardize processes (and subprocesses).
Assess process performance.
Improve processes.
Measure progress.
5-17
Cost of quality is the total price of all efforts to achieve product or service quality. This
includes all work to build a product or service that conforms to the requirements as
well as all work resulting from nonconformance to the requirements.
Quality programs also have costs that are not apparent. The general categories of
additional direct costs include:
Cost to build right the first time
Training programs
Statistical Process Control (SPC) Costs
Cost of a quality system is often viewed as a negative cost because errors in work have
been traditionally accepted as a cost of doing business.
Cost of Conformance:
Planning
Training and indoctrination
Process control
Field testing
Product design validation
Process validation
Test and evaluation
Inspection/Quality audits
Maintenance and calibration
Cost of Nonconformance
Scrap
Rework
Expediting
Additional material or inventory
Warranty repairs or service
Complaint handling
Liability judgments
Product recalls
Product corrective actions
Cost of non-quality is estimated to be 12-20% of sales versus the should cost of 3-5%
of sales for a quality program.
Waste of time and materials
Rework of poor quality products and additional material for rework
Delays in schedule
Product and service image
Corporate image
5-19
Prevention Cost - cost to plan and execute a project so that it will be error-free
Appraisal Cost - cost of evaluating the processes and the outputs of the processes to
ensure the product is error-free
Internal Failure Cost - cost incurred to correct an identified defect before the customer
receives the product
External Failure Cost - cost incurred due to errors detected by the customer. This
includes warranty cost, field service personnel training cost, complaint handling, and
future business losses.
Measurement and Test Equipment - capital cost of equipment used to perform
prevention and appraisal activities.
Method used to measure variability in a product for evaluation and corrective actions
Normal Distribution Curve or Bell Curve
Six standard deviations (+/- 3 Sigma) encompass 99.73% of area
Four standard deviations (+/- 2 Sigma) encompass 95.46% of area
Two standard deviations (+/- 1 Sigma) encompass 68.26% of area
Sigma () = Standard Deviation
5-21
Acceptance Sampling
Used when expensive and time-consuming to test 100%. Random sampling
may be used to check the characteristics and attributes of a given lot of goods.
Determines whether or not the lot conforms to the specifications or standards
necessary to support the overall project requirements.
Inspection and test standards must be established to ensure that procedures are
adequate to determine whether a lot is conforming or nonconforming to
specifications.
Standards must also be set for qualification of the sampled lot.
Important to select a sample size that will provide sufficient information about the
larger lot of goods without costing a great deal of money.
Must determine in advance the number of allowable defects before the lot is
rejected. (see Ireland V-8)
Histograms
Shows frequency of occurrence of items within a range of activity.
Can be used to organize data collected for measurements done on a product or
process.
Pareto Diagram
Ranks defects in order of frequency of occurrence to depict 100% of the defects.
(Displayed as a histogram)
Defects with most frequent occurrence should be targeted for corrective action.
80-20 rule: 80% of problems are found in 20% of the work.
Does not account for severity of the defects
Cause and Effect Diagrams (fishbone diagrams or Ishikawa diagrams)
Analyzes the inputs to a process to identify the causes of errors.
Generally consists of 8 major inputs to a quality process to permit the
characterization of each input. (See Ireland, V-13)
Scatter diagrams
Used to determine the relationship between two or more pieces of corresponding
data.
The data are plotted on an X-Y chart to determine correlation (highly positive,
positive, no correlation, negative, and highly negative) (See Ireland, V-14)
Other Tools
Graphs
Check sheets (tic sheets) and check lists
Flowcharts
5-23
Sample Questions
1.
2. The process of monitoring specific project results to determine if they comply with relevant
quality standards is called:
A. Quality Assurance
B. Quality Control
C. Quality Planning
D. Quality Review
3. A histogram ordered by frequency of occurrence that shows how many results were
generated by each identified cause is:
A. Statistical Histogram
B. Juran Histogram
C. Fishbone Diagram
D. Pareto Diagram
4. Tools and techniques used during the Quality Planning process include:
A. Benefit/cost analysis
B. Benchmarking
C. Quality audits
D. a and b
5. Top managements overall intentions and direction with regard to quality is formally
expressed in the:
A. Quality Plan
B. Quality Statement
C. Quality Policy
D. TQM
6. CIP is:
A. Synonymous with innovation
B. A sustained, gradual change
C. A substantial change which matures over time
D. The same as DTRTRTFT
7. The practice of ceasing mass inspections and ending awards based on price is credited to:
A. Edward Deming
B. Philip Crosby
C. Juran
D. Pareto
5-25
5-27
Answer Sheet
1.
16.
2.
17.
3.
18.
4.
19.
5.
20.
6.
21.
7.
22.
8.
23.
9.
24.
10.
25.
11.
26.
12.
27.
13.
28.
14.
29.
15.
30.
5-29
Answers
1
2
3
4
5
6
7
8
A
B
D
D
C
B
A
D
9
10
11
12
13
A
C
B
D
C
14 B
15
16
17
18
19
20
21
22
23
24
25
26
27
28
A
D
D
B
A
C
C
B
A
C
C
A
B
D
29 C
30 B
Number
_________
_________
_________
_________
_________
_________
_________
_________
_________
_________
Total
_________
5-31
Lecture # 17
PRM 702
Project Risk Management
Ghazala Amin
Risk Definition
Project Risk:
An uncertain event or condition that, if it
occurs, has a positive or a negative effect on
a project objective.
It includes both threats to the project
objectives and opportunities to improve on
those objectives.
PMBOK Guide, 2000
Risk Identification-Category
Category is the risk category based on:
Technology (TE)
Risk Identification
Typical Risk Categories
deliverable, project management,
organizational, external
schedule, cost, quality, scope
management, external, technology
high, medium, low
technical, market
catastrophic (show-stopper) 1
Calculating severity
Description
Category
Root
Cause
Triggers
Potential
Responses
Risk
Owner
Probabilit
y
Impact
Severity
Problem
No.
Rank
R44
Status
Staff
R21
R7
Expectation
6
5
5
Impact
5
8
5
Severity
30
40
25
15
16
RBS
Risk Map
Risk Assessment
Qualification model
Spring 2007
MST 512
Project Management
Risk Management
Organizations have been practicing risk assessment and risk management since the 17th
century, and since the beginning of recorded history, gambling the very essence of risk-taking
has been a popular pastime and often an addition (Bernstein 1998). Yet, most companies do
not formalize their risk management plan. Risk management should be a systematic process to
identify, analyze, treat and monitor all possible risks. There are many different descriptions of
this systematic process, but they all have these fundamental steps:
1. Identify making a list of all possible risks that could happen.
2. Analyze/Assess give each risk identified a probability and impact it could have.
3. Plan create risk management plan.
4. Track & control continuously monitor the risk and respond when it actually happens.
Identify
There are many commonly used techniques for risk identification.
Such as
These
techniques will produce a long list of risks that will have to be processed. This unorganized
laundry list of risks does not provide the big picture view of the project risks.
The Risk Breakdown Structure (RBS) is similar to the Work Breakdown Structure
(WBS) commonly used in estimating the work required to get a project done. Its a top-down
breakdown of the risks faced by a project. A RBS is a source-oriented grouping of project risks
that organizes and defines the total risk exposure of the project.
represents an increasingly detailed definition of sources of risk to the project (Hillson 2002).
Just as in WBS where we have a big picture of work needed but can also dig down to see the
details of each item, RBS does exactly the same thing for risk identification. This creates a more
organized list of risks to aid in their comprehension and interpretation (see Figure 1). Since not
all projects are the same, organizations wanting to use the RBS should develop their own
specialized RBS, either one generic one covering all the projects or specialized ones depending
on the project types.
Page 1 of 5
D. Kurniawan
Spring 2007
MST 512
Project Management
RBS is used in risk identification phase, brainstorming process where project members
try to identify all the risks at the first and second levels of the RBS. Once this is done, you can
convert it to a risk checklist by taking the lowest level risks of the RBS this is equivalent with
the risk list that you would gather if you used the previously mentioned common techniques.
Working in reverse, you could also take a risk list gathered by other methods, and put it in the
RBS structure. This could reveal some holes or duplications in your original risk list.
By using the RBS structure when identifying risks, it will give you perspective of where
are the risks coming from, concentrated at, and also dependencies between risks.
This
information should help in focusing risk response efforts in the high risk areas.
Page 2 of 5
D. Kurniawan
Spring 2007
MST 512
Project Management
Analyze
To identify the risk concentration areas, the number of risks identified is not enough of an
indicator. There could be a lot of minor risks in one area that is still not as important as a single
major risk that could halt the project entirely. A common method of giving a risk score to
each risk is the Probability Impact scoring. Each risk identified in the previous step is assessed
by giving it a probability of it happening and the amount of impact to the project. A ProbabilityImpact Matrix (see Figure 2) should be used to help you prioritize the risks and spend the
appropriate amount of time depending on the severity of the risk.
At first glance, one might think that all risks are random, but the reality is, there are
random and non-random (learnable) risks. Random risks are risks that no matter how much you
try, you wont be able to gain any more insight of that risk. The free market is an example of
random risk no one can consistently predict where the stock market will go. Non-random risks
are risks that can be learned or understood to reduce its uncertainty. One novel idea is the
concept of Risk Intelligence (Apgar 2006) its the measure of our ability compared to
competitors to assess the risk.
Page 3 of 5
D. Kurniawan
Spring 2007
MST 512
Project Management
Page 4 of 5
D. Kurniawan
Spring 2007
MST 512
Project Management
of the project. As you reach big milestones within the project, plan to repeat these four steps
again. Situations changed that might introduce new risks and eliminate ones weve prepared for.
To be successful, risks needs to be managed proactively.
As risks occur or not, the risk plan needs to be updated; a risk database should be kept
and risk checklists should be updated for future projects.
management plan is to continuously go through the process throughout the life of your project.
References
Apgar, David. Risk Intelligence: learning to manage what we don't know. Boston: Harvard
Business School Publishing, 2006.
Bernstein, Peter. Against the gods: The remarkable story of risk. Canada: John Wiley & Sons,
1998.
Elyse. Risk Response Planning. http://www.anticlue.net/archives/000820.htm. Anticlue, 2007.
Hillson, David. Using a Risk Breakdown Structure (RBS) to Understand Your Risks.
Proceedings of the Project Management Institute Annual Seminars & Symposium, Oct. 2002.
Project Management Institute. A Guide to the Project Management Body of Knowledge
(PMBOK Guide), 2000 Edition. Newton Square: Project Management Institute, 2000.
Rosenberg, L., Hammer, T. and Gallo, R. Continuous Risk Management at NASA. Applied
Software Measurement conference, 1999.
Stout, Pen. Increase Your Rewards: Guidelines for Project Risk Management Part III. CHIPS
magazine, Fall 2003.
Thomsett, Rob. Radical project management. Upper Saddle River: Prentice Hall PTR, 2002.
Verzuh, Eric. The Fast Forward MBA in Project Management. Hoboken: John Wiley & Sons,
2005.
Wikipedia, "Risk Management," Wikipedia, http://en.wikipedia.org/wiki/Risk_management
Page 5 of 5
D. Kurniawan
the process which will be used to identify, analyze and manage risks both initially
and throughout the life of the project;
how often risks will be reviewed, the process for review and who will be
involved;
the initial snapshot of the major risks, current grading, planned strategies for
reducing occurrence and Severity of each risk (mitigation strategies) and who will
be responsible for implementing them
This Register should be kept throughout the project, and will change regularly as existing
risks are re-graded in the light of the effectiveness of the mitigation strategy and new
risks are identified. In smaller projects the Risk Management Table is often used as the
Risk Management Plan.
Why would you develop a Risk Management Plan and Risk Management Table?
A Risk Management Plan and Risk Management Table are developed to:
provide a useful tool for managing and reducing the risks identified before and
during the project;
Other MBT supporting documentation from IRB, and the Blueprint Development
team (CMBT)
Optional:
Risks should be analyzed and evaluated in terms of occurrence of occurring and Severity
of impact if they do occur. Firstly, assess the occurrence of the risk occurring and give
this a rating of Low (L), Medium (M) or High (H) occurrence. Once you have rated the
occurrence, assess the Severity of the impact of the risk if it did occur and rate at Low
(L), Medium (M) or High (H) Severity.
Using your ratings for occurrence and Severity you can then determine a current grading
for each risk that in turn provides a measure of the project risk exposure at the time of the
evaluation.
Table 1 provides a standard method for calculating a grading for each risk based upon the
combination of the occurrence and Severity ratings.
Severity
Occurrence
low
medium
high
low
medium
high
Occurrence
Severity
Grade
Status
1.1
Inadequate funding to
complete the project
medium
medium
INCREASING
1.2
high
high
NEW
Key:
Change to Grade since last assessment
Grading decreased
No change to Grade
Grading increased
In the case of larger or more complex projects, the matrix should be expanded to ensure
an A Grading is automatically assigned to any risks defined as extremely high Severity.
Severity
low
medium
high
EXTREME
low
medium
high
Occurrence
Depending upon the size and nature of the project, some choose to use numerical scales
for this analysis and evaluation.
The resulting grades of risk help the project team to focus on treating the most important
risks, once evaluated and prioritized, and to mitigate them before the project progresses
much further into the MANAGE Phase.
Step 3: How will you manage or 'treat' the Risks?
Using the Grading Table in Step 3, for your entire Grade A and B risks and those rated
Extreme it is really important to have identified mitigation strategies very early in your
project. Risk mitigation strategies reduce the chance that a risk will be realized
and/or reduce the Severity of a risk if it is realized. Grade C Risks should be
continually monitored and have planned mitigation strategies ready to be implemented if
appropriate. These plans need to be recorded on your Risk Management Table.
There are three broad types of risk mitigation strategies:
Avoidthespecificthreat,usuallybyeliminatingthecause.(e.g.;conductastudyor
developaprototype)
Mitigatethespecificthreatbyreducingtheexpectedmonetaryorscheduleimpactof
therisk,orbyreducingtheprobabilityofitsoccurrence.
Manage(accept)theconsequencesoftherisk.
Once a risk has occurred, recovery actions to allow you to move on should be built into
the WBS for your project. In other words, what should you do when?
For each action in the Risk Management Table, it is necessary to specify:
What are the costs associated with each action (for larger projects in particular)?
Your Risk Management Table may now look something like this:
Id Description
of Risk
L S G Change Date
1.1 Inadequate
funding to
complete the
project
M M C
1.2 Lack of
H H A NEW
technical skills
in Client
Business Unit
Action
Re-scope project
focusing on time
and resourcing
Develop training
plan
Who
PM
Cost WBS
$$$
Consultant $$$
This example is in brief and more detail would be added as required. For example, in larger projects
separate documentation might be developed for each major risk providing much more detail regarding
mitigation strategies and costings.
Sponsor, potential business owners and working groups. It is important that they know
what they are watching out for, and reporting potential risks is a significant part of their
role.
The Project Manager is responsible for monitoring and managing all aspects of the risk
management process, such as:
the development of the Risk Management Plan and n Risk Management Plan
the continual monitoring of the project to identify any new or changing risks;
In large projects, the Project Manager may choose to assign risk management activities to
a separate risk manager, but they should still retain responsibility. It should be noted that
large projects are a risk in themselves, and the need for the Project Manager to reassign
this integral aspect of project management may be an indication that the project should be
re-scoped, or divided into several sub-projects overseen by a Project Director.
Who has ultimate accountability?
While the Project Manager is responsible for the management of risks, the Executive
Sponsor/Senior Manager has ultimate responsibility to ensure that an effective Risk
Management Plan for the project is in place.
Who approves the Risk Management Plan?
Generally, the Risk Management Plan would be approved or endorsed by the Steering
Committee/Executive Sponsor or Senior Manager, depending upon the size of the
project.
Once the Risk Management Plan has been approved, it is important to:
add the actions into the Project Plan with the appropriately assigned resource(s);
and
add the costs for the actions into the Project Budget.
for
Accenture
Document Information
Edition Information:
Type of Document:
Status of Document:
Final
Effective Date:
9/26/2005
Title of Document:
Program Name:
OAKS
Originator:
Andrew W. Gordon
Document File
Location:
Document Control:
Andrew W. Gordon
Phone:
614-387-3001
E-mail Address:
Date
Version
8/5/2005
1.0
9/9/2005
1.1
9/22/2005 1.2
Description of Change
Document Created
Incorporated updates from Shirley Whaley
Incorporated updates resulting from official state
review
"Document
Deliverable Tracking
Table of Contents
1
INTRODUCTION ...................................................................................................................1
1.1
1.2
1.3
1.4
1.5
1.6
1.7
Table of Figures
Table of Tables
Table 1 - Risk Data Captured in Risk Management Tool............................................................12
Table 2 - Standard Risk Notices and Reports.............................................................................25
1 Introduction
1.1
Document Overview
The OAKS Risk Management Plan (RMP) is a living document providing the OAKS Program a
method for managing risks to ensure program success. A risk is defined as any concern that
could impact the ability of the OAKS Program to meet its schedule, and cost objectives. Risk
has two components:
Risks are measured in terms of severity as determined by probability of occurring and affecting
the program. Unlike issues (which are problems involving a significant choice between two or
more alternative for an event that is happening now), risks relate to events that could occur and
may affect the programs schedule, or cost objectives.
The risk management process will enable the OAKS Program to create strategies that
effectively address potential barriers to program success. The risk management process
involves identifying, assessing, mitigating, and managing the program's risks. Actions taken to
address risk may lead to decisions that affect reporting or the development of the business
capability or affect the management of the program. The RMP serves as a guide to all team
members in managing program-wide and Integrated Project Team (IPT)-level risks.
1.2
Scope
Risk management is executed at all levels within the program and IPT. The risk management
process ensures that risks are mitigated at the appropriate level and communicated as
appropriate. This plan provides guidance on managing all levels of risks. These processes are
implemented within the individual teams and IPTs that comprise the program.
1.3
Objectives
Successful management of the OAKS Program requires informed, proactive, and timely
management of risks. The specific objectives of the OAKS RMP and approach are listed below:
Ensure critical risks impacting schedule, cost, and/or performance are identified to
communicate, escalate, and mitigate risks in a timely manner.
Ensure the probability and impact of risks is reduced to an acceptable level through an
effective mitigation process.
Focus attention on key risks affecting the program versus individual teams or IPTs.
Provide risk information for milestone decisions.
Produce meaningful information that allows program management to focus efforts on the
right risks (e.g., very high and high probability or impact) with an effective coordination
of effort to mitigate the risk.
Ensure that appropriate stakeholders are informed and, if applicable, participate in the
mitigation.
Page 1 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
1.4
Ensure that the stakeholders understand the implication of accepting certain risks and
are comfortable with accepting these risks.
Provide an audit trail of discussions and mitigation of program risks.
Guiding Principles
To be successful, the principles listed below guide the use and implementation of the risk
management process:
1.5
The risk management process emphasis will be placed on effectiveness and simplicity.
A single owner will be assigned responsibility for each risk even if several people work to
mitigate it.
Effort and communication will be focused on the most severe risks.
Realistic due dates for mitigation steps will be set to meet these dates.
Risks will be mitigated at the appropriate organizational level (e.g., program, IPT).
Risk owners will evaluate the initial risk severity and impact levels of risks they are
assigned.
Planned risk mitigation history and actual mitigation of each risk will be documented.
This documentation can serve as key input to root cause analysis, key learning, metrics,
and risk analysis.
The RMP was prepared by the OAKS Risk Management Leads, who are also responsible for
updating it with any significant changes, and making sure that all project members adhere to all
risk management processes. The risk management plan will be updated at least once per
quarter and submitted to the client for reviews at that time.
1.6
The information contained in the OAKS Risk Management Plan both affects, and is affected by
the following project plans and processes.
1.7
Referenced Documents
OAKS
Identify
Risks
Validate
Risks
Assign
Risks
Mitigate
Risks
Manage
Risks
2.1
To maintain the integrity of the risk database, the risk database administrator will be responsible
for entering and updating data into the database, as well as doing regular maintenance to the
Risk Management tool. Regular maintenance includes:
These individuals are also responsible for creating reports for the team lead project status
meetings, setting schedules for the Risk Management (RM) Working Group meetings, and
producing custom reports as required. The Risk Database Administrators are Shirley Whaley
([email protected]) and Andrew Gordon ([email protected]).
The risk managers are also responsible for:
2.2
Risk Originator
The Risk Originator is any person in the OAKS Program who identifies an OAKS Program risk.
The Risk Originator will submit the risk to his or her risk administrator by filling out the new risk
entry form located on the risk section of the BI Designer website (OAKS\Cabinets\Project
Management\Risk Management\Risk Job Aids\OAKS Risk Entry Form.xls). Members of the
following groups may recommend new risks:
OAKS PMO
OAKS State Team Members
OAKS Contractor Team Members (Lead contractor and subs)
2.3
Risk Owner
The Risk Owner is the person to whom the responsibility for mitigating the risk is assigned. Risk
Owners should be the people who will be most affected if the risk occurs (becomes realized).
The Risk Owner has the following responsibilities:
2.4
Create a risk mitigation plan, as required and a contingency plan, as directed, in the
event the risk occurs
Update risk information, as necessary
Ensure the risk is being mitigated
Execute the Contingency Plan, as required
Recommend risk closure to the appropriate group
Present risk status as required
A Risk POC has responsibility for answering risk-related questions his or her team members
may have about the Risk Management Process, along with compiling recommendations for the
risk management working group meetings. The OAKS POCs are as follows:
2.5
The Project Team Leads have overall responsibility for the risk management process. Each
Project Team Lead will be responsible for all risks that fall within his or her release. Basic
responsibilities of Project Team Leads include:
Page 4 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
2.6
The executive program managers are also referred to as the Executive Leadership (EL) and
include:
The responsibilities of the OAKS EL in the risk management process include the following:
2.7
The OAKS project team members have been assigned to the OAKS project on a full time basis
and responsibilities would include the following:
2.8
The Business and Technical Advisory Group members include EL, project managers, team
leads, IPT leads, and part time module business owners, and responsibilities would include the
following:
Page 5 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
2.9
Risks will be communicated to the PMO through the weekly status meeting. Slides will be
created that identify new risks, summarize red risks, and summarize all risks (by color). The
OAKS PMO responsibilities in the risk management process include the following:
OAKS
Figure 2 depicts the high level risk management process steps in direct relation to the risk
management overview shown in Figure 1. Subsequent sections detail each process step,
describe the data elements tracked for each risk, the escalation procedure, the current RM
Working Group meeting schedule, and an overview of the feedback and reporting process is
provided.
No
High Medium
Im
pa
Low
ct Medium
Low Very Low
Low
High
Very High
Medium
High
Low
Medium
Medium
High
Risk
Mitigated?
Yes
Risk
Retired
(Reporting)
Execute Response
Actions (Mitigation and
Reporting)
Probability
Identified Risk
(Planning/
Identification)
Determine Risk
Category and Risk
Level (Assessment)
Risk
Yes
Level Medium
or High?
Develop
Mitigating Actions
(Analysis)
No
Risk Put on Watch
List (Reporting)
OAKS
consequence if that risk occurs. The two variables are combined to assess the risk as shown in
Figure 2.
Impact
5 Very High
3
4 High
2
3 Medium
2 Low
1 Very Low
Risks that fall into area 1 (green) can be categorized as Low and should be monitored. Risks
that fall into area 2 (yellow) can be categorized, as Medium and a mitigation plan should be
prepared for implementation in case the risk increases in probability or impact. Risks that fall
into area 3 (red) are categorized as High and active steps should be taken to prevent them
(create mitigation and contingency plan).
Page 8 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
OAKS
3.1
3.1.1
S cope
S tatem ent
S taffing
M anagem ent
P lan
W BS &
A ctivity List
R isk
E valuation &
P lanning
Tem plates
P rocurem ent
P rocess
A ssign Facilitator
for R isk E valuation
D eterm ine
P articipants
R isk S tatus
R eporting
Identify &
D ocum ent P roject
R isks
R ate R isk by
P robability &
S everity
A ssign O w nership
of R isk
E valuate need
for action plan
No
P lace R isk in
"w atch" status
Y es
D evelop S trategies
to reduce
P robability &
S everity
T ailored
P robablity/
O utcom e Table
R isk D atabase
Identified A ction
Item s
Q uality A ssurance
R eview
(see Q uality P lan)
Figure 4 outlines the detailed flow of initial risk evaluation and planning. During the startup of
the Risk Management Process, existing risks must be identified quickly to begin timely
mitigation. Three alternatives to identify existing risks initially are:
Risk Workshops
Risk POCs working within their groups to identify risks
Combination of Risk Workshop and Risk POC Group meetings
Once initial risks are identified, an ongoing process for timely capture and management of risks
will be established in several ways:
The Project Team Leads will hold regular meetings where risks will be constantly
submitted and reviewed.
Page 10 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
3.1.3
A risk entry form (Excel spreadsheet) will be available for users to enter data. This form
is located on BI Designer at OAKS\Cabinets\Project Management\Risk
Management\Risk Job Aids. The data will be sent via e-mail to the Risk Administrator
where they will then be entered into the Risk Management tool.
Risk Assessment and Categorization of Risks
3.1.3.1 Cost
Cost-based risks outline the non-achievement of the financial benefits of the project detailed in
the project objectives or key success factors (such as the Cost Performance Index (CPI).
Typical cost risks include external contractor overspend, additional costs in changing/solving
design, or application project problems.
3.1.3.2 Schedule
Schedule-based risks focus on the non-achievement of the project's products or benefits within
the specified time frame. Typical schedule-based risks arise from extensions from scope
changes, resource unavailability, market opportunities missed, and additional schedule
extensions from solving those risks outlined in 'Cost' above.
3.1.3.3 Technological
Technology-based risks consider the non-achievement of the application specifications and
benefits expected. Typical risks include new/non-standard platform technology, integration
problems with existing other systems, migration problems, performance expectations not
achieved, environment complexity and functionality, and system operability.
3.1.3.4 External
External-based risks consider the 'environmental' factors largely outside of the control of the
Project Management, which can directly/indirectly affect the successful delivery of the Project.
Typically, risks arising from legislative regulations, legal requirements, communication to the
State, lack of market sophistication, and the strategic direction and priority conflicts of a
controlling body, are profiled under this category.
The Cost and Schedule risk sources are known as the risk 'indicators', as they are often the
most tangible measure of overall progress towards Project objectives or goals. The
Technological, and External risk sources are referred to as risk 'drivers', as these are the
sources of all Project risks, which additionally drive the Cost and Schedule risks.
The recognition that the management of the sources of Technological, and External risk is interrelated to the management of Cost and Schedule risks is an important link in effectively
responding and reporting risk-reducing activities.
Page 11 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
OAKS
3.1.4
Risk Data
Data necessary to create and track the risk in the Risk Management tool is identified in the table
below. The data fields are defined along with the list of values, if applicable. This data maps
directly to the fields in the risk management tool, Risk Radar (see Section 4).
Table 1 - Risk Data Captured in Risk Management Tool
FIELD NAME
DEFINITION
LIST OF VALUES
Risk Title
Risk ID
Uniquely identifies
each risk.
Rank
Risk
Statement/
Description
Date
Identified
Status
Status Name
Definition
New
Assigned
Mitigated
Page 12 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
OAKS
FIELD NAME
DEFINITION
Critical Path
Impact Time
Frame
Probability of
Occurrence
LIST OF VALUES
Retired
Monitor
Realized
Date
Definition
Beginning Impact
Date
Ending Impact
Date
Probability
Definition
Very High
81-99%
High
61-80%
Medium
41-60%
Low
21-40%
Very Low
1-20%
Page 13 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
OAKS
FIELD NAME
DEFINITION
Impact
(specified for
Cost,
Schedule,
Technical,
and Other)
Program
Areas
LIST OF VALUES
Impact
Severity
Level
Level
Definition
Very High
High
Medium
Low
Very Low
Releases
Definition
Program Wide
Change Management
Financials 1
Financials 2a
Financials 2b
HCM 1
HCM 2
Technology
Page 14 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
OAKS
FIELD NAME
DEFINITION
LIST OF VALUES
Affected
Phase
Responsible
Person
Risk Area
Control
Risk
Mitigation
Description
Risk
Mitigation
Step
Step Number
Risk Description
Person
Due Date
Complete
Contingency
Plan
Page 15 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
OAKS
FIELD NAME
DEFINITION
History Event
Log
LIST OF VALUES
Date
Person
Event
3.1.5
Process Steps
This section describes each step in the risk management process as depicted in Figure 2.
Title
Description
Probability
Impact
Status (defaults to New)
Earliest Impact Date
Latest Impact Date
Source Person
Point of Contact
Program Areas
Affected Phase
Risk Category
Page 16 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
OAKS
Control
Risk Source
In assessing the risk, the Risk Originator first assesses the Probability of Occurrence using
Figure 5 as a reference. The Risk Originator assesses the Severity of Impact in each of the
three impact areas noted in Table 1.
Once the Risk Originator determines the initial Probability of Occurrence and the Severity of
Impact, the Risk tool will calculate the overall Risk Exposure Level. Then the Risk Exposure
Level will fall into one of the following three Risk Rating categories:
81%-99%
0.81 0.99
1.62 - 1.98
2.43 - 2.97
3.24 - 3.96
4.05 - 4.95
High
61%-80%
0.61 0.80
1.22 - 1.60
1.83 - 2.40
2.44 - 3.20
3.05 - 4.00
41%-60%
0.41 0.60
0.82 - 1.20
1.23 - 1.80
1.64 - 2.40
2.05 - 3.00
Low
21%-40%
0.21 0.40
0.42 - 0.80
0.63 - 1.20
0.84 - 1.60
1.05 - 2.00
Very Low
1%-20%
0.01 0.20
0.02 - 0.40
0.03 - 0.60
0.04 - 0.80
0.05 - 1.00
Very Low
Low
Medium
High
Very High
Medium
Probability of
Occurrence
Severity of Impact
Probability of
Occurrence
Very
High
81%-99%
Low
Medium
High
High
Very High
High
61%-80%
Low
Medium
Medium
High
High
Medium
41%-60%
Low
Medium
Medium
Medium
High
Low
21%-40%
Low
Low
Low
Medium
Medium
Very Low
1%-20%
Very
Low
Low
Low
Low
Medium
Very
Low
Low
Medium
High
Very High
Severity of Impact
For example, a risk has been identified and assessed with a Probability of Occurrence of
medium and a Severity of Impact of high. The overall Risk Severity Level is medium.
Using this same example to show how the Risk Exposure Level is calculated, Risk Exposure
uses Probability of Occurrence and Severity of Impact to compute the overall impact of the risk.
The Risk Exposure Level also is used to rank risks in the risk management tool. For example,
the Probability of Occurrence is 60% and the Severity of Impact is Level 4. The following
formula is applied:
Risk Exposure Level = Prob. Of Occurrence * Severity of Impact
The Probability of Occurence 60% and the Severity of Impact 4 are multiplied making the
overall Risk Exposure Level of 2.4 (4 *0.60 = 2.4). Figure 5 shows that a risk with a Risk
Exposure level of 2.4 falls approximately in the Yellow Risk Rating category.
Note that the conversion from Risk Exposure Level to Risk Rating is not an exact process; some
cells in Figure 5 have the same value but are given a different Assessment (different color). For
instance, using Figure 5, the risk exposure value of 2.4 can be located in the Yellow/Medium
Risk Rating and the Red/High Risk Rating; it depends on the value of the Probability of
Occurence.
Risk Ratings are used to determine what actions must be executed. Generally, three actions will
be taken, as determined by each risks Risk Rating:
If the Risk Rating is Green (Very Low/Low level risks), the risk should be monitored and
maintained in the risk watch list; for Green Risks, mitigation plans are not required;
If the Risk Rating is Yellow (Medium level risks), the risk requires a Risk Mitigation Plan
with implications that the mitigation actions will be able to complete the tasks within
current costs and schedule constraints. It should be documented how each mitigation
step will affect the risks probablity and impact (a successful mitigation should reduce risk
exposure).
If the Risk Rating is Red (High/Very High level risks), the risk requires a Risk Mitigation
Plan (Document how each mitigation step will affect the risks probability and impact [a
successful mitigation should reduce risk exposure]) and also a Contingency Plan
because there is a higher probability that the mitigation actions will not be sufficient
enough to maintain cost and schedule constraints, and therefore a Contingency Plan is
required.
Milestones
Risk Milestones are the trigger points or drop dead dates when a Contingency Plan execution
is triggered unless the risk has been successfully mitigated. The trigger points must be
incorporated in the WBS so they can be tracked. All of the risks containing a Risk Rating of Red
potentially have risk milestones. The client and the RM Working Group will work together to
determine which risks in the Red Risk Rating category will have risk milestones.
Page 18 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
Once the Risk Originator identifies and assesses the risk, the Project Team Lead or RM
Working Group evaluates the risk to ensure it fits the RMP definition of a risk. If the risk does
not meet the risk definition or duplicates another risk, the RM Working Group deletes it and
notifies the Risk Originator. If the risk is judged valid, but the analysis is incomplete, the Project
Team Lead or RM Working group will work with the Risk Originator and others to complete the
analysis and recommendations. Should the Project Team Lead or RM Working Group have any
questions or need further clarification, they will contact the Risk Originator to obtain the
necessary information.
Page 19 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
OAKS
Risk
Evaluation &
Planning
Process
Scope
Statement
Communication
Plan
WBS &
Activity Lists
Procurement
Process
Monitor Identified
Risks
Track Triggers of
"Watch" Risks
Follow-up on
"Elevated" Risks
o
o
o
Control Risks
Review Status
Communication with Project Team
Re-Planning, as required
Risk
Triggered?
Yes
Execute Mitigating
Action Plan
No
o
o
o
Risk Reporting
Update Risk Summary
Status Updates with Project Team
Update Risk Database
o
o
This is intended to cover any short-term exposure first, before considering overall project risk
reduction. Overall, project risk response analysis covers five characteristic responses:
Page 20 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
Avoidance
Avoidance-based responses are employed at any point in the development lifecycle where
future-planning work is performed. Typically, most risk avoidance occurs during the project
definition and planning phases of a project, where objectives, scope, key success factors, work
breakdown, and project outputs or deliverables are defined. An example of risk avoidance is
the use of a stable, established technical solution in preference to an untried, or complex new
technology. However, risk avoidance solutions may limit the ability to achieve high-level project
objectives, by unnecessarily constraining a desirable solution.
Transfer
Transfer-based responses target the party who are best placed to analyze and implement the
response to the risk, based on their expertise, experience, and suitability. Typical transfer
responses include the sub-contracting to external suppliers who are able to reduce the overall
risk exposure.
Control
Control-based responses occur at all points throughout the development lifecycle, and are
typically the most common response. They identify an action or product that becomes part of
the development effort, and which are monitored and reported as part of the regular
performance analysis and progress reporting of the project.
Acceptance/Assumption of Risk
These describe the factors that may directly affect the success of the project, but are outside of
the sphere of influence of the Project Management, and can therefore only be 'accepted'. In
addition, acceptance of risks as a response may be based on the cost-ineffectiveness of any
available response or solution. An example: acceptance response could be created from a
legislative or legal risk, over which no control could be leveraged.
Investigation/Research
Investigation-based responses do not define any mitigation for reducing an individual risk. They
are responses to risks where no clear solution is identified, and further research is required.
However, investigative responses will not be ignored, as they immediately and directly lead to a
greater aggregated project risk. This is because the probability quantifier for each risk includes
the effect of the applied response, for which there is none, and the level of control quantifier
indicates the level of influence to apply that response, which is low.
Hi
Hi V.Hi
Lo Med Med Hi
Lo
Lo
V.Lo Lo
Lo Med
Lo Med Med
Lo
Lo Med
Hi
Hi
Lo Med Med Hi
V.Hi
Hi
Lo
V.Lo Lo
Lo Med
Lo Med Med
Lo
Lo Med
Hi
Hi
Lo Med Med Hi
Hi
V.Hi
Hi
Lo
V.Lo Lo
Lo Med Med
Lo
Lo
Med
The Risk Owner provides status updates as they occur to the Project Team Lead and before the
RM Working Group Meetings. The updates include:
When the Risk Owner has mitigated the risk or completed contingency actions, the Risk Owner
informs the Project Team Lead and recommends that the risk either be retired or remain open
but be put on a watch list until a date specified in the future.
Page 23 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
If the Project Team Lead or RM Working Group decides the risk mitigation is not satisfactory,
the risk remains open and the Risk Owner must re-apply mitigation to the risk. This process
includes reviewing the mitigation strategies/techniques and the Risk Mitigation Plan to
determine what additional steps must be taken to mitigate the risk to its targeted severity level.
Once a risk is completed but remains open, the risk remains in the "Monitoring" status until a
later date at which time the status will be reassessed. This status does not mean the risk is
"closed," "not applicable anymore," "unimportant," or "inactive." Rather, it means the risk is still
valid and could still affect program cost or schedule.
In the event a mitigated risk has been retired but is later reassessed as a valid risk, any Team
Lead or RM Working Group participant can recommend the risk be re-opened at the next
meeting. Once the risk is re-opened, it will be treated as all other risks and will require a new
mitigation plan depending on color.
3.2
Escalation decisions can be made at the Project Lead level and higher to escalate decisions to
the PMO or EL. Risks with Very High severity levels are elevated to the OAKS BOA Group
through the Weekly Status Meeting. Additionally, the Project Team Leads and RM Working
Group escalate to the EL, through the PMO, those issues determined to need crossorganization involvement, are controversial, or require OAKS EL decisions.
3.3
The RM Working Group meetings are conducted on a quarterly basis, and are facilitated by the
State or Contractor Risk Manager. Meeting schedules may vary with the need for them. The
OAKS RM Working Group roles are considered part-time roles. For meeting attendees unable
to attend in person, a dial-up telephone number will be available. Regular meeting attendees
include:
During the RM Working Group meeting, the Group will discuss all the new and past due risks.
New or modified Mitigation and Contingency plans will be reviewed for concurrence. The risk
originators will provide or present (as requested) new risks to the RM Working Group and
provide necessary details. The risk owners will provide updates for all other risks, either in
person or through the appropriate Risk POC. Any additional action items or updates to their
status will be communicated to the action item owner. Upon completion of the meeting, the RM
Working Group will generate a Risk Report to be provided to OAKS management with updated
metrics and what changes occurred during the meeting.
In addition to the RM Working Group meeting, the Risk Managers will brief the OAKS Program
Manager on a regular basis, as determined by the Program Manager.
Page 24 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
OAKS
3.4
The Risk Database Administrators generate standard reports as part of the day-to-day risk
management process. Risks (and issues) are discussed in the projects team lead weekly
meetings. In preparation for these meetings, the Risk Administrators prepare a Risk Watch List
(see Table 3) listing the risks for review (i.e., new, past-due, mitigation steps past due). After
such meetings, the Project Team Leads notifies the Risk Administrators of the results of the
meetings (i.e., status of new risks submitted, new risk assignments, etc.) so that he or she can
make the appropriate updates to the risk database. These reports, RM Work Group meeting
minutes, and risk listings will be placed in the BI Designer risk folders for accessibility. A
summary of standard notices and reports is listed below.
These reports are an initial draft of recommended risk reports. This list is subject to change
based on the project team leads, and project managers risk reporting requirements.
REPORT
SENDER
AUDIENCE
TIMING
New Risks
Risk Radar
Administrator
All
Risk Radar
Administrator
All
Risk Radar
Administrator
All
Risk Radar
Administrator
All
Risk Radar
Administrator
All
Risk Radar
Administrator
All
Risk Radar
Administrator
All
Risk Radar
Administrator
All
Page 25 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
3.5
Within two business days of the meeting, the RM Working Group publishes via email, a Risk
Meeting report summarizing all action items taking place at the RM Working Group meeting.
3.6
The OAKS Program Risk Administrators maintains an e-mail distribution list used to mail risk
reports to the individuals applicable for each release. The mailing list is located at:
OAKS\Cabinets\Project Management\Risks\Risk Mailing List.
4.1
While the Risk Radar is the primary repository for the Risk data, the risk management folder is
available for all risk reports and risk related resources, including a read-only copy of the Risk
Radar database. The path to the risk section of BI Designer is OAKS\Cabinets\Project
Management\Risk Management. This website allows all the team members to submit risks as
well as review risk information. The Risk Administrators regularly reviews and updates data on
this website, by publishing new reports and posting the latest version of the Risk Radar for readonly access.
4.2
The risk entry form allows users to enter the risk data into a spreadsheet. They must then email
the spreadsheet to a Risk Database Administrator to be entered into the Risk database. The
Risk Entry Form can be found on the Risk Management Section of BI Designer. New risks must
first be validated before they are active in the system. Please consult with your co-workers or
Page 26 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
supervisor before submitting a new risk request. Furthermore, new risks are reviewed in weekly
and daily status meetings. Be sure your immediate reporting official is aware of the new risks
so that he or she can discuss the risk when it is brought up at the status meeting. Or, if you
routinely attend such status meetings, be prepared to discuss your rationale for creating the
new risk.
4.3
Viewing Risks
Risks can be viewed on the Risk section of the BI Designer website, by downloading the
appropriate risk report. Only the Risk Administrators will have Read/Write access to risk
information. Everyone else will have read-only access, and can create their own reports by
running queries using the Risk Radar Database.
4.4
Updating Risks
In order to update risk information, risk owners should simply e-mail a risk administrator with the
required update information, since only Risk Administrators can update the Risk Radar
database.
Risk Area of
Concern
MANAGEMENT APPROACH
PROJECT MANAGEMENT
Risk Questions
Is the project managed according to the plan?
Do people routinely get pulled away to fight fires?
Is re-planning (change control) done when disruptions occur?
Are people at all levels included in planning their own work?
Are there contingency plans for known risks?
Is there a mechanism in place to determine when to activate the
contingencies?
Are long-term issues being adequately addressed?
Are project members at all levels aware of their status versus plan?
Do people feel it is important to keep to the plan?
Does management feel it's important to keep to the plan?
Does management consult with people before making decisions that
affect their work?
Is the quality assurance function adequately staffed on this project?
Do you have defined mechanisms for assuring quality?
Y/N
Page 27 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
ROLES/SKILLS
RESOURCES
SCHEDULE
PROJECT MANAGEMENT
CO
ST
Page 28 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
COMMUNICATION
ENGAGEMENT
MANAGEMENT
CONTRACT
ENGAGEMENT
MANAGEMENT
CULTURE
Page 29 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
POLITICS
STATE
USE SUBS
INTERFACES
Page 30 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
ARE A SUB
VENDORS
SCOPE
REQUIREMENTS
Page 31 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
DEVELOPMENT PROCESS
CHANGE CONTROL
DEVELOPMENT METHODOLOGY
DEVELOP
MENT
ENVIRON
MENT
Page 32 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
DESIGN
DEVELOPMENT METHODOLOGY
Does the development system support all aspects of the project (e.g.,
requirements analysis, performance analysis, design, coding, test,
documentation, configuration management, management tracking,
requirements traceability)?
Do people find the development system easy to use?
Is there good documentation of the development system?
Have people used these tools and methods before?
Is the system considered reliable (e.g., compiler, development tools,
hardware)?
Are the people trained in the use of the development tools?
Do you have access to experts in use of the system?
Do the vendors respond to problems rapidly?
Are you delivering the development system to the State?
Have adequate budget, schedule, and resources been allocated for this
deliverable?
Is the development computer the same as the target computer?
Are there compiler differences between the development and target
computer?
Are there any specified algorithms that may not satisfy the requirements?
Will development of database be difficult to match physical design?
Are any of the algorithms or designs marginal with respect to meeting
requirements?
Do you determine the feasibility of algorithms and designs (e.g., using
prototyping, modeling, analysis or simulation)?
Does any of the design depend on unrealistic assumptions?
Does any of the design depend on optimistic assumptions?
Are there any requirements or functions that are difficult to design?
Will the complexity of functions or databases be a factor?
Are the internal interfaces well defined (software-to-software and
software to hardware)?
Is there a process for defining internal interfaces?
Are there any problems with performance (e.g., throughput; scheduling
asynchronous real-time events; real-time response; recovery timelines;
response time; database response, contention or access)?
Has a performance analysis been done?
Do you have a high level of confidence in the analysis?
Do you have a model to track performance through design and
implementation?
Does the architecture, design or code create any maintenance
difficulties?
Are the maintenance people involved early in the design?
Is the product documentation adequate for maintenance by an outside
organization?
Are reliability requirements allocated to the software?
Are availability requirements allocated to the software?
Are recovery timelines any problems?
Page 33 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
CODING
PACKAGES & REUSE
DEVELOPMENT METHODOLOGY
Page 34 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
TESTING
PROTOTYPES
DEVELOPMENT METHODOLOGY
Page 35 of 35
State of Ohio OAKS Project
i:\common share\signed accenture deliverables\deliverable 9\pm129 oaks risk management plan.doc
Version Control Number: 1.2 9/26/2005
<Insert
Company Logo
Here>
<Project Title>
Version:
Date:
Status:
24/08/98
<Draft or Approved>
Approved by:
Approvers name:
Approvers title:
Approvers section:
<Name>
<Title>
<Section>
Preface
For more information on this procedure, contact <Name>,
<Title>, <Section/Division>. Tel: (nn) nnnn nnnn, Fax: (nn)
nnnn nnnn.
This document was produced using <Microsoft Word>.
Revision History
Date
<Date>
Ver.
Author
Comments
<Name>
Contents
1.0 Introduction
5.0 Summary
1.0 Introduction
1.1 Scope and purpose of document
<This paragraph shall summarise the purpose and contents of
this document and shall describe any security or privacy
considerations associated with its use.>
1.3 Responsibilities
<This paragraph shall identify the owner of the major risks to
the project. This usually rests with the Project Manager, but
on larger projects, it may be the responsibility of the Sponsor,
or Project Steering Committee.>
Risk Item
size estimates too
low
funding will be lost
technology will not
meet expectations
high staff turnover
Category
PS
Probability
60%
Impact
2
CU
TE
40%
30%
1
1
ST
60%
Where:
Category is the risk category based on:
Product size
PS
Business impact
BU
Customer characteristics
CU
Process definition
PR
Development environment
DE
Reference
Technology
TE
ST
Mitigation
<This paragraph describes the plan for avoiding risk by
effective pro-active mitigation activities. When mitigation
activities have not been implemented, and the project is
expected to manage the risk, a RISK MEMO should be created
to record the fact.>
Monitoring
This paragraph describes the risk monitoring activities to be
used on the project.>
Management
This paragraph describes the risk management and
contingency plan. It assumes that the avoidance or mitigation
strategy has failed, and the risk has become a reality.>
5.0 Summary
<This section will summarise the current status of the Risk
Management Plan.>
CONSEQUENCES
LIKELIHOOD
Almost
certain
Likely
Catastrophic
5
Major
4
Moderate
3
Minor
2
Insignificant
1
10
5
4
Possible
3
Unlikely
2
Rare
1
Risk Score
9-10
7-8
Extreme
High
5-6
Moderate
2-4
Low
CONSEQUENCES:
Catastrophic
Major
Moderate
Minor
Insignificant
LIKELIHOOD:
Almost Certain
Likely
Possible
Unlikely
Rare
Likelihood
Consequences
A-
B-
C-
D-
E-
1 Insignificant
2 Minor
3 Moderate
4 Major
5 Catastrophic
Significant non-permanent
injury.
Overnight hospitalisation
(inpatient)
Death.
Permanent disabling injury
(eg blindness, loss of hand/s,
quadriplegia)
High (H)
Moderate (M)
Low (L)
Low (L)
Low (L)
High (H)
High (H)
Moderate(M)
Low (L)
Low (L)
Extreme (X)
High (H)
High (H)
Moderate(M)
Moderate (M)
Extreme (X)
Extreme (X)
Extreme (X)
High (H)
High (H)
Extreme (X)
Extreme (X)
Extreme (X)
Extreme (X)
High (H)
Act immediately to mitigate the risk. Either eliminate, substitute or implement engineering control measures.
If these controls are not immediately accessible, set a timeframe for their implementation and establish interim
risk reduction strategies for the period of the set timeframe.
Medium
Take reasonable steps to mitigate the risk. Until elimination, substitution or engineering controls can be
implemented, institute administrative or personal protective equipment controls. These lower level controls
must not be considered permanent solutions. The time for which they are established must be based on risk.
At the end of the time, if the risk has not been addressed by elimination, substitution or engineering controls a
further risk assessment must be undertaken.
Low
Take reasonable steps to mitigate and monitor the risk. Institute permanent controls in the long term. Permanent
controls may be administrative in nature if the hazard has low frequency, rare likelihood and insignificant
consequence.
Hierarchy of Control
Controls identified may be a mixture of the hierarchy in order to provide minimum operator exposure.
Elimination
Substitution
Provide an alternative that is capable of performing the same task and is safer to use.
Engineering Controls
Administrative Controls
Develop policies, procedures practices and guidelines, in consultation with employees, to mitigate the risk. Provide training, instruction and supervision about the hazard.
Analyse Risks
Hazards/Issues/Risks
Consequence
Date:
Issue No.
Review date:
Evaluate Risks
Likelihood
Risk
level
Effectiveness of our
strategies
New
risk
level
Courtesy of:
Scitor Corporation
256 Gibraltar Drive Sunnyvale, CA 94089
800/533-9876
Page 1 of 5
Courtesy of:
Scitor Corporation
256 Gibraltar Drive Sunnyvale, CA 94089
800/533-9876
Furthermore, an atmosphere of fear (fear of the truth) brings on such denial. The successminded manager must remove the emotional elements from the business evaluation and
promote methods that require objective analyses of the entire business case. To do
otherwise, puts the liar, the bully, (and the myopic) at an unfair advantage. The result,
understandably, is the improper selection of business opportunities and a deleterious
effect on the corporate bottom line. To put it even more strongly, the failure to select the
best business opportunities may eventually cause the business to loose its market
position, and eventually cause a fatal collapse.
So why, knowing all of this, do we fail to require the objective analysis and management
of risk? It can't be because the process is difficult. Actually there are many approaches
and processes for risk evaluation. All are simple and valid (except for the pain of
admitting that something can go wrong (that denial thing, again). The key thing to realize
is that all of the available approaches are simple, down-to-earth methods, certainly not in
the realm of rocket science. We will discuss these methods in a sequel to this article.
The solution must consist of a total risk management system. Such a system, as part of a
project management system, must contain all of the necessary elements that we would
have in our PM system. This includes a risk management process, tools to support the
risk management process, training in the process and use of the tools, and clear support
for the process at all levels of management. An enlightened, risk management-aware
senior management must demand to see the entire picture (rather than just the good stuff)
and must play the role of the devil's advocate until the entire picture is presented. Yet, in
my experience, executives have done just the opposite. They often give the impression
that they don't want to know the potential downside, or that if they do learn the true risks
that they will squash the proposal (which in many cases would be the proper action). We
must discourage the common environment where we tend to "kill the messenger" of
"bad" news. Under this deleterious environment, we reward those that ignore or hide the
truth and penalize those that are diligent about risk analysis and honest about potential
project risk exposure.
Page 2 of 5
Courtesy of:
Scitor Corporation
256 Gibraltar Drive Sunnyvale, CA 94089
800/533-9876
payback starts to accumulate. Usually, this payback analysis is a key component of the
decision to proceed with the project.
Now, consider this. Let's say that a project was to cost ten thousand dollars per month,
with expected completion in two years. Let's also say that the cost of money is 8% per
year and that the project will generate an income of $10,000 per month, starting
immediately upon completion. The projected payback time would be about 50 months
(from project initiation).
What do you think would happen to the payback time if the project ran just 4 months
over, at a cost overrun of 15 percent per month? The payback time is extended by a
whopping 18 months. If a truthful risk analysis indicated that there was a high probability
of this extension to the payback time, might this be enough to sour the executives on the
value of this project?
Let's further consider that this project was the average IT/IS project that was surveyed by
the Standish Group, several years ago. That survey noted that the average IT/IS project
ran 50% longer than planned at a cost overrun of 186%. If we apply this to our subject
project, it would make it a three year job, at a cost of $686,000 (not including the time
value of the investment). In this case, the payback time would be 99 months. I wonder
how many executives would approve the project, if the risk assessment showed a good
probability that the payback time would be 99 months, rather than 50 months?
The "Effect on payback time" concept is so simple that it can be done on the proverbial
"back of the envelop". I created a simple example in an Excel spreadsheet, in less than an
hour. I am amazed that I rarely see anyone evaluating the effect of delays and cost
overruns on "return on investment". Yet, if we use the Standish data, such an evaluation
would show that the typical project would, based on such performance, extend the
payback time to more than twice the original plan. Of course, this is another example of
downside potential. And in todays business environment, such bad news is more likely
to be swept under the rug, rather than to have the project rejected because of the risk.
Unfortunately, hiding the risk does not prevent it from happening.
Page 3 of 5
Courtesy of:
Scitor Corporation
256 Gibraltar Drive Sunnyvale, CA 94089
800/533-9876
Page 4 of 5
Courtesy of:
Scitor Corporation
256 Gibraltar Drive Sunnyvale, CA 94089
800/533-9876
Page 5 of 5
Courtesy of:
Sciforma Corporation
http://www.sciforma.com
8 0 0 / 5 3 3 -9 8 7 6
Page 1 of 5
Courtesy of:
Sciforma Corporation
http://www.sciforma.com
8 0 0 / 5 3 3 -9 8 7 6
The earlier paper offered some insight into the psychology that traps us from dealing with risk
and suggests a few ways to take control of risk. In this paper, we look at a few additional tricks
to help master risk. One of the aids to risk appraisal is the use of a Risk Breakdown Structure
(RskBS).
Page 2 of 5
Courtesy of:
Sciforma Corporation
http://www.sciforma.com
8 0 0 / 5 3 3 -9 8 7 6
Page 3 of 5
Courtesy of:
Sciforma Corporation
http://www.sciforma.com
8 0 0 / 5 3 3 -9 8 7 6
Summary
More people have written about risk management than have practiced it. Risk
Management is a way of dealing with uncertainty in projects. Every project has some
degree of uncertainty. Therefore, every project requires risk management.
o Risk Assessment & Management (RAM) requires a structured, proactive
approach.
o A risk WBS is a valuable element of a structured RAM system.
o Someone needs to be responsible for Risk Assessment & Management. Consider
having a Chief Risk Officer and requiring the CRO to sign-off on all proposed
projects.
An "accurate estimate" is an oxymoron.
o How reliable is your information?
How sensitive is the project to the risks?
o What is the ability to absorb impacts?
o For example: Being late for a dinner reservation can be tolerated. Being late for a
cruise ship departure cannot.
Avoid redundant or cumulative contingency.
o Contingency is important. Without it you will finish late and over budget.
However, there is a tendency to pile on contingencies so that they are redundant.
To avoid this, consider shared contingency. Apply contingency to groups rather
than individual items. For Instance: apply schedule contingency for a string of
tasks rather than to each task. Apply cost contingency to work packages, not
individual line items.
A guarantee against all risk may not be practical or economically feasible.
Risk is dynamic
o The probability and impact of risk can change as the project progresses. Consider
the time dimensions of risk and when to address the risk issues.
Maintain a Risk Issues directory
o Log all risk items. Identify a responsible party for each risk issue. Maintain an
audit trail of all communications and actions. Flag open risk items.
Dont forget the big picture.
Page 4 of 5
Courtesy of:
Sciforma Corporation
http://www.sciforma.com
8 0 0 / 5 3 3 -9 8 7 6
o Consider risk issues at the project level. How well is the organization situated to
do this project? What is the organizations risk culture? What risk guidelines have
been established at the strategic level?
Harvey A. Levine, with 43 years of service to the project management industry, is founder of The Project
Knowledge Group, a consulting firm specializing in PM training, PM software selection, evaluation &
implementation, and PM using microcomputers. He has implemented or enhanced the project
management capabilities of numerous firms, often combined with the selection or implementation of
computerized project management tools. For more information on Harvey Levine or the Project
Knowledge Group, please visit http://home.earthlink.net/~halevine/.
Mr. Levine is the leading consultant to the project management software industry and is recognized as
the leading expert in tools for project management. He has been Adjunct Professor of Project
Management at Rensselaer Polytechnic Institute and Boston University. He has conducted project
management public seminars for ASCE, AMA, IBM, PMI.
Mr. Levine is the author of books, articles and videos on Project Management. His 2002 book, "Practical
Project Management: Tips, Tactics, and Tools", is still available from John Wiley & Sons. Mr. Levine's
new book, "Project Portfolio Management, A Practical Guide to Selecting Projects, Maintaining Portfolios,
and Maximizing Benefits", Jossey-Bass, was released in July, 2005. Mr. Levine is past president of the
Project Management Institute, a recipient of PMI's 1989 Distinguished Contribution to Project
Management award, and has been elected a Fellow of PMI.
Mr. Levine has offices in Saratoga Springs, NY and San Diego, CA. His e-mail address is:
[email protected].
Page 5 of 5
Project Risk
External
Internal
Organizational
Customer
Process
Culture
Stability
Planning
Financial
Managerial
Initiation
Communication
Labor
Close
Technology
Environment
Requirements
Culture
Requirements
Physical
Financial
Stability
Regulatory
Contractual
Communication
Social
Performance
Application
Complexity
Limits
Organizational
Experience
Conditions of Use
Technological
Maturity
Skillset required
Uncertainty
Costs
Physical
Resources
Execution
Control
This RBS is meant to provide guidance on risk identification. It is not meant to be all
inclusive and there may be project risk categories not included on it. Please ensure
stakeholder and subject matter expert participation when conducting risk
identification and consider ALL project risks.
RPM204v0607
2007 Seattle Childrens Hospital Research Institute
Lecture # 26
PRM 702
Project Quality and Risk Management
Ghazala Amin
Three Definitions
Risk
A possible future event which if it occurs will
lead to an undesirable outcome.
Project Risk
The cumulative effect of the chances of an
uncertain occurrence that will adversely affect
project objectives.
Risk Management
A systematic and explicit approach for
identifying, quantifying, and controlling project
risk.
What is Risk?
Risk and uncertainty are
equivalent
DEFINITION
PROJECT RISK MANAGEMENT IS THE ART AND SCIENCE OF
IDENTIFYING, ASSESSING, AND RESPONDING TO PROJECT
RISK THROUGHOUT THE LIFE OF A PROJECT AND IN THE
BEST INTERESTS OF ITS OBJECTIVES
PROJECT RISK IS THE CUMULATIVE EFFECT OF THE CHANCES OF
UNCERTAIN OCCURRENCES ADVERSELY AFFECTING PROJECT
OBJECTIVES
ISSUES
PROCESS
OUTPUT
FEEDBACK LOOP
THIS PROCESS VITAL TO EFFECTIVE PROJECT CONTROL, HOWEVER
Ways to Avoid
Risk Management
Project Risk
NO
Information
Partial
Information
(Unknown
unknowns)
(Known
unknowns)
GENERAL
TOTAL
UNCERTAINTY UNCERTAINTY
SPECIFIC
UNCERTAINTY
Complete
Information
Integration
Communication
Scope
(Knowns)
TOTAL
CERTAINTY
Time
Project Risk
Quality
Procurement
Human Resources
*Note: in this range the information to be sought is known
Cost
INTEGRATING RISK
PROJECT
MANAGEMENT
INTEGRATION
SCOPE
Requirements
Standards
PROJECT
RISK
Time Objectives,
Restraints
TIME
INFORMATION /
COMMUNICATIONS
Ideas, Directives,
Data Exchange Accuracy
Expectations
Feasibility
QUALITY
Availability
Productivity
HUMAN
RESOURCES
Cost Objectives,
Restraints
CONTRACT /
PROCUREMENT
COST
Risk Classification
Positives
Negatives
Some Considerations
Real information is the key.
The relationship between uncertainty and
information is inverse.
For the project manager, conditions of relative
uncertainty (partial information) are the rule.
There is a natural resistance to formal risk
analysis.
Risks should only be taken to achieve a project
objective.
SUMMARY
PROJECTS ARE LAUNCHED TO TAKE ADVANTAGE OF OPPORTUNITIES,
BUT OPPORTUNITIES ARE ASSOCIATED WITH UNCERTAINTIES WHICH
HAVE RISKS ATTACHED
RISK CAN NEVER BE 100% ELIMINATED
FOR THE PROJECT TO BE VIABLE, THE EXPECTED VALUE RESULTING
FROM A FAVORABLE PROBABILITY OF GAIN MUST BE HIGHER THAN
THE CONSEQUENCES AND PROBABILITY OF LOSS
THEREFORE, THE RISKS ASSOCIATED WITH A PROJECT MUST RECEIVE
CAREFUL EXAMINATION IN THE CONTEXT OF THE ORGANIZATION'S
WILLINGNESS OR AVERSION TO TAKING RISKS
THIS IS THE DOMAIN OF PROJECT RISK MANAGEMENT, WHICH FORMS
A VITAL AND INTEGRAL PART OF PROJECT MANAGEMENT
PRM 702
Project Risk Management
Lecture #27
Key Definitions
Certainty, Risk, Uncertainty
Business Risk, Insurable(Pure) Risk
Technical Risks, Project Management Risks,
Organizational Risks, External Risks, Internal Risks,,
Legal Risks
Known Risks, Unknown Risks
Expected Monetary Value (EMV)
Trigger (a.k.a Risk symptom or Warning sign)
Contingency Plan, Fallback Plan
Contingency Reserve, Management Reserve
Delphi technique
Workaround
What is a risk?
A risk is a potential event or a future situation that may negatively affect
the project.
Risks associated with project integration are usually the smallest during the projects
initiation and charter approval phase of the project life cycle.
6
Planning
Execution
Control
Closing
Knowledge Areas
Risk
Management
Risk
Managemen
t Planning
Risk
Monitoring
and
Control
Risk
Identificatio
n
Qualitative Risk
analysis
Quantitative
Risk
analysis
Risk Response
Planning
Project Risk Management is the process of being proactive rather than reactive.
11
Risk - Definitions
Risk Preference and Utility Theory
Certainty
All information for making the right decision is available
Can predict the outcome with confidence
Risk
The totality of the occurrence can be described within
established confidence limit
Expected payoff can be mathematically calculated
Uncertainty
Meaningful assignments of probabilities are not possible
Management decision can be made applying one of 4
criteria
10
12
Laplace Criterion
13
15
Decision Trees
E i =j =1 Pij pj,
Where
E i = expected payoff for strategy i
P = Payoff element
p = Probability of event
E 1 = (50)(0.25)+40(0.25)+90(0.5) = 67.50
E 2 = (50)(0.25)+50(0.25)+60(0.5) = 55
E 3 = (100)(0.25)+80(0.25)+(-50)(0.5) = 20
Based on the Expected payoff value, Strategy 1 should
be used.
14
16
18
19
PRM 702
Project Risk Management
Lecture #28
Outputs
Risk Identification
Risk Identification
Risk Identification
Documentation reviews
Information gathering techniques
Checklists analysis
Assumption analysis
Diagramming techniques
Expert judgment
SWOT Analysis
Outputs
Risks register
11
Inputs
Risk register
Risk management plan
Project scope statement
Organizational process assets
It includes:
Qualitative Risk Analysis
Quantitative Risk Analysis
10
12
Moderate
Has potential to cause some disruption as above,
will probably overcome difficulties
Low
Has little potential to cause disruption to
schedule, cost or degradation of performance
13
15
Outputs
14
16
Inputs
17
19
18
20
Inputs
Acceptance
Avoidance
Mitigation
Transfer
21
23
22
24
Reserves
Outputs
Management Reserve
25
27
Insurance Strategies
Reserves
Contingency Reserve
A separately planned quantity used to allow for
future situations which may be planned for only in
part
Also known as known unknowns
May involve cost, schedule or both
26
28
Inputs
Outputs
Risk register
Project management plan
Work performance information
Performance reports
29
30
31
Published in PM World Today -November 2006 (Vol. VIII, Issue 11) "Connecting the World of Project Management"
Time Add to the schedule a percent above the estimated time to delivery
based on risk of delivery.
Money Increase budget to include potential additional staff, tools, and time
to potential project costs.
Page 1
Published in PM World Today -November 2006 (Vol. VIII, Issue 11) "Connecting the World of Project Management"
Daniel Galorath
Page 2
Published in PM World Today - November 2006 (Vol. VIII, Issue 11) "Connecting the World of Project Management"
Page 1
Published in PM World Today - November 2006 (Vol. VIII, Issue 11) "Connecting the World of Project Management"
risk, plug that risk into the network as wellas an appropriate percentage
probability as judged by the team in risk workshops.
The resulting network, with risk and uncertainty parameters attached, can then
be modelled. At a basic level, the process of simply constructing the model
yields valuable insights. It might be discovered that most of the risk occurs in
the latter stages of the project, for example, or in a particular branch of the
network. At the very least, it is possible to quantify the number of risks that a
project faces, at which stages in the project they might impact, and the range of
possible project cost and timescale outcomes. This in itself is no mean feat,
given the cumulative nature of project activities, and their linked
interdependencies.
But the real payback comes from simulation. Advanced probability-based Monte
Carlo mathematical modelling techniques and tools can run potentially many
hundreds or even thousands of individual simulations, building up a picture of
the projects risk profile.
The result? Businesses are able to determine, with considerable certainty, both
the most likely risks affecting their overall project, as well as the risks with the
greatest consequences.
This information can be leveraged in a number of ways. Although there are no
hard and fast rules on how to treat such insights, many project managers
typically choose to create a list of the Top 10' risks faced by a project.
Alternatively, through a process of weightings, the most likely risks and the risks
with the greatest consequences can be combined in order to create whats
known as the projects risk exposureanother common technique.
At this point, the most significant benefits of the process can be realized. For a
start, there is an opportunity to manage expectations better. From our
observations, it seems that the sponsors of many high-profile project failures
the sort of IT, aerospace or construction disasters that appear on our
newspapers front pageshad no idea how risky their projects were, or where
those risks lay.
Yet more importantly, there is a major opportunity to actually manage those risk
scenarios better. One obviousand highly cost-effectiveway of doing this is
through closer monitoring of the risk areas. But there is also an opportunity to
deploy that snipers rifle, to apply resources in a focused manner to mitigate
against specific risks. In itself, this can prove a powerful reality check: if
mitigation resources are being applied to areas not on the list of critical Top 10'
risks, for instance, its time to ask some pointed questions as to why.
Indeed, we often find that there may bea disconnect between mitigation
resources and risk areasboth at the project level, and the portfolio level. Are
resources being allocated on the basis of risk, for exampleor on the basis of
quieting those who are shouting loudest? Is the level of mitigation preciselycalculated to be appropriate to the exposureor is it a figure plucked from the
air, with no real sense as to whether it is adequate, or represents good value for
money? Such questions can yield significant savings, as well as sharply
Page 2
Published in PM World Today - November 2006 (Vol. VIII, Issue 11) "Connecting the World of Project Management"
Sarim Khan
Page 3
Definition
Definition
Intangible risk management identifies a new type of risk- a risk that has 100%
probability of occurring but is ignored by the organization due to lack of
identification ability. For example, knowledge risk occurs when deficient
knowledge is applied. Relationships risk occurs when collaboration
ineffectiveness occurs. Process-engagement risk occurs when operational
ineffectiveness occurs. These risks directly reduce the productivity of
knowledge workers, decrease cost effectiveness, profitability, service, quality,
reputation, brand value, and earnings quality. Intangible risk management
allows risk management to create immediate value from the identification and
reduction of risks that reduce productivity.
Case Study:
Road sections
Bridge Sections
Tunnel Sections
Installed power systems
Installed conduit systems
Construction Problems
Sources of Risk
Contract
Design
Bidding
Construction
Operation
Contractual Risks
Deficiencies/Current Standard
Contracts
Impact of CAD Modeling
Owner Acceleration
Delay Claims
Design Risks
Programming
Site Selection
Geotechnical Survey
Schematic
Scope Definition and Control
Detailed Design
Bidding
Estimate Development
Estimating Accuracy
Schematic Design: -20% to +20%
Design Development: -15% to +15%
Construction Documents: -10% to +10%
Drawings
Specifications
Scope Translation
Construction
Transfer
Avoidance
Reduction (aka Mitigation)
Acceptance (aka Retention)
Risk Transfer
Means causing another party to accept the risk, typically
by contract or by hedging. Insurance is one type of risk
transfer that uses contracts. Other times it may involve
contract language that transfers a risk to another party
without the payment of an insurance premium. Liability
among construction or other contractors is very often
transferred this way. On the other hand, taking offsetting
positions in derivatives is typically how firms use hedging
to financially manage risk.
* Taken from Wikipedia.org
Risk Reduction
Modern software development methodologies reduce risk
by developing and delivering software incrementally.
Early methodologies suffered from the fact that they only
delivered software in the final phase of development; any
problems encountered in earlier phases meant costly
rework and often jeopardized the whole project. A current
trend in software development, spearheaded by the
Extreme Programming community, is to reduce the size of
increments to the smallest size possible, sometimes as
little as one week is allocated to an increment.
* Taken from Wikipedia.org
Late/Defective Design
Late Payment v. Progress
Disputed Change Orders/Payment
Schedule Confusion
Field Coordination Problems
Excessive Requests For Information
Late/Defective Owner supplied materials or
equipment
Unresolved Unforeseen Conditions
Qualifications/Turnover of owners project personnel
Absence of Owners Maintenance/Operations team
To Terminate or Not to
Terminate
Review adequacy of supporting documentation
Check reliability of information sources
Evaluate the impact of termination on the overall
Project:
Completion Options
Percentage of Project completion
Lender requirements
Dates for turnover to key tenants
Industry conditions availability of a Replacement
Contractor and adequate Labor
Status of long lead-time items
Ability to retain key Subcontractors/Suppliers
Owner Post-Termination
Issues
Determine Best Completion Option
Assume Subcontracts and Purchase Orders
(Owners option)
Operation
Training
Operability
Maintainability
Reliability
Contractors Response to
Termination
Substantial Performance by Contractor
Improper Notice of Termination
Failure to allow Contractor a
reasonable opportunity to Cure
Project Design Problems
Differing Site Conditions
Contractors Response to
Termination
Owner Interference failure to
"cooperate"
Improper/Inadequate Contract
Administration by Owner
Impossibility/Impracticability of
Performance
Disguised Termination for Convenience
Recognizing Risk
Contact Us!
Post & Schell PC
Gary Wilson, Esquire
Four Penn Center
1600 John F. Kennedy Boulevard
Philadelphia, PA 19103
T. 215.587.1000
www.PostSchell.com
MDCSystems
Robert C. McCue, P.E.
300 Berwyn Park, Suite 115
Berwyn PA 19312
T. 610.640.9600
www.MDCSystems.com
PROJECT RISK
MANAGEMENT
STUDY NOTES
PMBOK 2000 based, Version 6
In Preparation For
PMP Certification Exam
Publishing Information
This publication has been produced using Lotus Word Pro 96.
Trademarks
The following are trademarks of International Business Machines Corporation in the United
States, or other countries, or both: IBM
Lotus, Lotus Notes, Lotus Word Pro, and Notes are trademarks of Lotus Development
Corporation in the United States, or other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft
Corporation of the United States, or other countries, or both.
The following are certification, service, and/or trademarks of the Project Management Institute,
Inc. which is registered in the United States and other nations: PMI is a service and
trademark, PMI Logo and "PMBOK", are trademarks, PMP and the PMP logo are
certification marks.
Other company, product, and service names may be trademarks or service marks of others.
Disclaimer
PMI makes no warranty, guarantee, or representation, express or implied, that the successful
completion of any activity or program, or the use of any product or publication, designed to prepare
candidates for the PMP Certification Examination, will result in the completion or satisfaction of any
PMP Certification eligibility requirement or standard., service, activity, and has not contributed any
financial resources.
Initially Prepared By: Kim Ulmer
Edited By: Peter Dapremont
"PMBOK" is a trademark of the Project Management Institute, Inc. which is registered in the United States and other nations.
PMI is a service and trademark of the Project Management Institute, Inc. which is registered in the United States and other nations.
PMP and the PMP logo are certification marks of the Project Management Institute which are registered in the United States and other
nations.
8-3
Key Definitions
Amount at Stake
Assumptions
Assumptions analysis
Brainstorming
Business Risk
Checklist
Contingency Planning
Contingency Reserve
Decision Tree
Analysis
Deflection
Expected Monetary
Value
8-5
Threats
Total Certainty
Total Uncertainty
Triggers
Uncertainty
Workaround
Project Risk:
8-7
Is the process of deciding how to approach and plan the risk management activities for
a project.
Planning for subsequent risk management processes helps ensure that the level, type,
and visibility of risk management are commensurate with both the risk and importance
of the project to the organization.
Inputs include:
Project charter
Organizations risk management policies (predefined approaches to risk
analysis and response)
Defined roles and responsibilities (predefined roles, responsibilities, and
authority levels for decision-making will influence planning)
Stakeholder risk tolerances:
Different organizations and different individuals have different tolerances
for risk.
These may be expressed in policy statements or revealed in actions.
Template for the organizations risk management plan
WBS.
Methods used during risk management planning include: planning meetings
Outputs include: Risk Management Plan.
Describes how risk identification, qualitative and quantitative analysis, response
planning, monitoring, and control will be structured and performed during the
project life cycle.
Does not address responses to individual risks -- this is accomplished in the risk
response plan.
May include:
Methodology: Defines the approaches, tools, and data sources that
may be used to perform risk management on the project. Different types
of assessments may be appropriate, depending upon the project stage,
amount of information available, and flexibility remaining in risk
management.
Roles and responsibilities: Defines the lead, support, and risk
management team membership for each type of action in the risk
management plan. Risk management teams organized outside of the
project office may be able to perform more independent, unbiased risk
analyses of project than those from the sponsoring project team.
Budgeting: Establishes a budget for risk management for the project.
Timing: Defines how often the risk management process will be
performed throughout the project life cycle. Results should be
developed early enough to affect decisions. The decisions should be
revisited periodically during a project execution.
Scoring and interpretation: The scoring and interpretation methods
appropriate for the type and timing of the qualitative and quantitative risk
analysis being performed. Methods and scoring must be determined in
advance to ensure consistency.
The process of determining which risks are likely to affect the project and documenting
the characteristics of each.
Where feasible, participants in the risk identification process generally include: the
project team, the risk management team, subject matter experts from other parts of the
company, customers, end users, other project managers, stakeholders, and outside
experts.
Risk identification is an iterative process.
Inputs include:
Risk Management Plan
Project planning outputs:
Risk identification requires an understanding of the projects mission,
scope, and objectives of the owner, sponsor, or stakeholders.
Outputs of other processes should be reviewed to identify possible risks
across the entire project. These may include, but are not limited to: the
project charter, WBS, product description, schedule and cost estimates,
resource plan, procurement plan, and assumption and constraint lists.
Risk categories. These categories should be well defined and should reflect
common sources of risk for the industry or application area. These categories
include the following:
Technical, quality or performance risks - such as reliance on
unproven or complex technology, unrealistic performance goals,
changes to the technology used or to industry standards during the
project.
Project-management risks - such as poor allocation of time and
resources, inadequate quality of the project plan, poor use of project
management disciplines.
Organizational risks - such as cost, time, and scope objectives that are
internally inconsistent, lack of prioritization of projects, inadequacy or
interruption of funding, and resource conflicts with other projects in the
organization.
8-9
Assumptions analysis:
Every project is conceived and developed based on a set of
hypotheses, scenarios, or assumptions. Assumptions analysis is a
technique that explores whether or not the assumptions are valid.
Identifies project risks from inaccuracy, inconsistency, or
incompleteness of assumptions.
Diagramming techniques:
Cause-and-effect diagrams (also known as Ishikawa or fishbone
diagrams)
System or process flow charts
Influence diagrams - a graphical representation of a problem
showing causal influences, time ordering of events, and other
relationships among variables and outcomes.
Outputs include:
Risks: Uncertain events or conditions that, if occur, have a positive or negative
effect on project objectives.
Triggers: Indications that a risk has occurred or is about to occur. Also called
risk symptoms or warning signs. For example, failure to meet intermediate
milestones may be an early warning of an impending schedule delay.
Inputs to other processes: Risk identification may identify a need for further
action in another area. For example, the WBS may not have sufficient detail to
allow adequate identification of risks, or the schedule may not be complete or
entirely logical.
8-11
Inputs include:
Risk Management Plan
Identified risks from the risk identification process.
Project status: The uncertainty of a risk often depends on the projects
progress through its life cycle. For instance, in the early stages of the project,
the design may be immature and changes are likely to occur, making it likely
that more risks will be discovered.
Project type: More common or recurrent type projects tend to have better
understood probability of occurrence of risk events and their consequences
versus state-of-the-art or leading-edge technology projects.
Data Precision: Describes the extent to which a risk is known and understood
by measuring the extent of data available as well as the reliability of the data.
The source of the data that was used to identify the risk must be evaluated.
Scales of probability and impact:
Probability scale: Scale runs from 0.0 (no probability) to 1.0
(certainty). Assessing risk may be difficult because historical data is not
often available. An ordinal scale representing relative probability values
from very unlikely to almost certain, or, a general scale with specific
probabilities such as 0.1, 0.3, 0.5, 0.7, etc., could be used.
Impact scale: Scale reflects the severity of its effect on the project
objective. Impact can be ordinal or cardinal, depending on the culture of
the organization performing the analysis. Ordinal scales are
ranked-order values such as very low, low, moderate, high, and very
high. Cardinal scales assign values, either linear or nonlinear, to these
impacts. Example of linear values: 0.1, 0.3, 0.5, 0.7, 0.9. Example of
nonlinear values: 0.05, 0.1, 0.2, 0.4, 0.8. Nonlinear values may be used
when an organization desires very much to avoid high-impact risks.
Assumptions identified during the risk identification process are evaluated as
potential risks.
Methods used during qualitative risk analysis include:
Risk probability and impact:
Risk probability is the likelihood that a risk will occur. Risk impact (or
consequences) is the effect on project objectives if the risk event occurs.
These two dimensions of risk are applied to specific risk events, not to
the overall project.
This technique helps identify those risks that should be managed
aggressively.
8-13
The process of measuring the probability and consequences of risks and estimating
their implications for project objectives.
Aims to analyze numerically the probability of each risk and its consequence on project
objectives, as well as the extent of overall project risk.
Uses techniques such as Monte Carlo simulation and decision analysis to:
Determine the probability of achieving a specific project objective.
Quantify the risk exposure for the project and determine the size of cost and
schedule contingency reserves that may be needed.
Identify risks requiring the most attention by quantifying their relative
contribution to project risk.
Identify realistic and achievable cost, schedule, or scope targets.
The quantitative and qualitative risk analysis processes can be used separately or
together.
Trends in the results when quantitative analysis is repeated can indicate the need for
more or less risk management action.
Inputs include:
Risk Management Plan
Identified risks
List of prioritized risks
List of risks for additional analysis and management
Historical information
Expert judgment
Other planning outputs
The methods used in quantitative risk analysis include:
Interviewing:
Interviewing techniques are used to quantify the probability and
consequences of risks on project objectives.
A risk interview with project stakeholders and subject-matter experts may
be the first step in quantifying risks.
The information needed depends upon the type of probability
distributions that will be used. For instance, information would be
gathered on the optimistic (low), pessimistic (high) and the most likely
scenarios if triangular distributions are used, or on mean and standard
deviation for the normal and log normal distributions. (see PMBOK
Guide Figures 11-4, 11-5, and 11-7)
For effective risk response strategies, it is important to document the
rationale of the risk ranges.
Sensitivity analysis:
Helps determine which risks have the most potential impact on the
project.
Examines the extent to which the uncertainty of each project element
affects the objective being examined when all other uncertain elements
are held at their baseline values.
8-15
Mitigation:
Seeks to reduce the probability and/or consequences of an adverse risk
event to an acceptable threshold.
Taking early action helps reduce the probability of an adverse risk
occurring and/or the severity of the impact and is more effective than
repairing the consequences after the risk has occurred.
Must take into consideration the mitigation costs given the likely probability
of the risk and its consequences.
Examples of mitigation include: adopting less complex processes,
conducting more engineering tests, choosing a more stable seller,
developing prototypes, adding more skilled resources, etc.
Acceptance:
Project team makes a conscious decision to not change the project plan to
handle the risk.
Project team may not be able to identify any other suitable response
strategy other than accepting the risk.
Active acceptance may include developing a contingency plan to
execute, should a risk occur.
Passive acceptance requires no action, leaving the project team to deal
with the risks as they occur.
A contingency plan is applied to identified risks that arise during the
project. Developing a plan in advance can greatly reduce the cost of an
action should the risk occur.
A fallback plan is developed if the risk has a high impact, or if the
selected strategy may not be fully effective. This could include allocation
of a contingency amount, development of alternative options, or changing
the project scope.
The most usual risk acceptance response is to establish a contingency
allowance or reserve which includes amounts of time, money, or
resources to account for known** risks. The allowance should be
determined by the impacts, computed at an acceptable level of risk
exposure, for the accepted risks.
** Authors note: In the Project and Program Risk Management by Max
Wideman, these types of risk are referred to as known unknowns.
8-17
Outputs include:
Risk response plan: a detailed plan which describes the actions that will be
taken in regards to handling/accepting risk. It is also called the risk register
and should include some or all of the following:
Identified risks and descriptions, areas of the affected project (e.g., WBS
element), causes of identified risks, and impact on project objectives.
Risk owners and assigned responsibilities.
Results from the qualitative and quantitative risk analysis processes.
Agreed responses including avoidance, transference, mitigation, or
acceptance for each risk in the risk response plan.
The level of residual risk expected to be remaining after the strategy is
implemented.
Specific actions to implement the chosen response strategy.
Budget and times for responses.
Contingency plans and fallback plans.
Residual risks:
Risks that remain after the execution of avoidance, transfer, or mitigation
responses.
Also include minor risks that have been accepted and addressed via
contingency planning.
Secondary risks:
Risks that arise as a direct result of implementing a risk response.
Should be identified and have responses planned.
Contractual agreements: Should specify each partys responsibility for
specific risks. (example: insurance)
Contingency reserve amounts needed: the amount of buffer or contingency
needed to reduce the risk of overruns of project objectives to a level acceptable
to the organization.
Inputs to other processes: Alternative strategies must be fed back into the
appropriate processes in other knowledge areas.
Inputs to a revised project plan: Results of risk response planning should be
incorporated into the project plan.
The process of keeping track of the identified risks, monitoring residual risks and
identifying new risks, ensuring the execution of risk plans, and evaluating their
effectiveness in reducing risks.
Records risk metrics that are associated with the implementation of contingency plans.
Is an ongoing process for the life of the project.
Provides information that assists with effective decision making in advance of the risk
occurrence.
The purpose of risk monitoring is to determine whether or not:
Risk responses have been implemented as planned.
Risk response actions are as effective as expected, or if new responses should
be developed.
8-19
Outputs include:
Workaround plans:
Unplanned responses to emerging risks that were previously unidentified
or accepted.
Must be properly documented and incorporated into the project plan and
risk response plan.
Corrective action: Execution of the contingency plan or workaround.
Project change requests: Change requests to the project plan as a result of
implementing contingency plans or workarounds.
Updates to the risk response plan:
Risk events that do occur should be documented as such and evaluated.
Implementation of risk controls may reduce the impact or probability of
identified risks.
Risk rankings must be reassessed so that new, critical risks may be
properly controlled.
Risk events that do not occur should be documented as such and closed
in the risk response plan.
Risk database:
A repository that provides for collection, maintenance, and analysis of
data gathered and used in the risk management processes.
Use of this database will assist risk management throughout the
organization and form the basis of a risk lessons learned program over
time.
Updates to risk identification checklists: Checklists updated from experience
will help risk management of future projects.
Scope of Project Risk Management: (ref: Project and Program Risk Management
by Wideman from PMI, pg. I-2)
Scope of project risk management lies somewhere between the two extremes of total
certainty and total uncertainty
Spectrum: Total Uncertainty, General Uncertainty, Specific Uncertainty, and Total
Certainty
Spectrum: Unknown Unknowns (no information), Known Unknowns (partial
information), and Knowns (complete information)
Management Reserves handle unknown unknowns while contingency reserves
handle known unknowns**
** PMBOK Guide considers these as knowns.
8-21
Sample Questions
1
2. Using the PMBOK Guide definition of contingency reserve, which of the following
statements about contingency reserves is false?
A. A contingency reserve is a separately planned quantity of money or time that has been
set aside to allow for future situations which may be planned for only in part.
B. Contingency reserves are used to reduce the risks of overruns of project objectives to
a level acceptable to the organization.
C. Contingency reserves may be set aside for known risks.
D. Contingency reserves can be included in the projects cost and schedule estimates
without any identifying documentation.
3. Which of the following is not a tool or technique used during the Quantitative Risk Analysis
process?
A. Earned value analysis
B. Interviewing
C. Decision Trees
D. Sensitivity Analysis
4. Which of the following statements regarding pure risk is false?
A. The risk can be deflected or transferred to another party through a contract or
insurance policy. Also referred to as insurable risk.
B. Pure risks involve the chance of both a profit and a loss.
C. No opportunities are associated with pure risk, only threats.
D. Pure risk could be classified as a known-unknown risk.
5. A contingency plan is:
A. A planned response that defines the steps to be taken if an identified risk event should
occur.
B. A workaround
C. A comprehensive listing of many possible risks that might occur on a project.
D. a and b
6. The inherent chances for both profit or loss associated with a particular endeavor is called:
A. Favorable risk
B. Opportunity risk
C. Pure risk
D. Business risk
8-23
17. The independence of two events in which the occurrence of one is not related to the
occurrence of the other is called:
A. Event phenomenon
B. Independent probability
C. Statistical independence
D. Statistical probability
18. Which of the following documents is primarily used as an input into the Risk Identification
Process?
A. Risk Management Plan
B. WBS
C. Scope Statement
D. Contingency Plan
Risks are accepted when:
A. The project team decides to transfer the risk to a third party.
B. The project team decides not to change the project plan to deal with a risk or is unable
to identify any other suitable response strategy.
C. The project team reduces the probability and consequences of an adverse risk event
to an acceptable threshold.
D. Risks are never accepted.
8-24 Project Risk Management
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Task A
p=0.1
Task B
p=0.2
Task C p=0.15
8-25
P=0.7
P=0.4
P=0.1
P=0.2
P=0.6
A.
B.
C.
D.
Option A
Option B
Option C
Option D
8-27
Answer Sheet
1.
16.
2.
17.
3.
18.
4.
19.
5.
20.
6.
21.
7.
22.
8.
23.
9.
24.
10.
25.
11.
26.
12.
27.
13.
28.
14.
29.
15.
30.
Answers
1 C
2 D
3 A
4 B
5 A
6
7
8
9
10
11
12
13
D
C
D
D
B
B
A
C
14 D
15 A
16 C
17
18
19
20
21
22
23
24
C
A
B
C
B
B
C
D
25
26
27
28
29
30
C
D
D
B
B
C
8-29
Number
_________
_________
_________
_________
_________
_________
_________
_________
_________
_________
Total
_________