Lec 13 06012021 040137pm
Lec 13 06012021 040137pm
By
Tanveer Khan
Understand what risk is and the importance of
good project risk management
2
Describe the process of identifying risks and be
able to create a risk register
3
Explain the quantitative risk analysis process and
how to apply decision trees, simulation, and
sensitivity analysis to quantify risks
Provide examples of using different risk response
planning strategies to address both negative and
positive risks
Discuss what is involved in monitoring and
controlling risks
Describe how software can assist in project risk
management
4
Project risk management is the art and science of
identifying, analyzing, and responding to risk
throughout the life of a project and in the best
interests of meeting project objectives
5
A dictionary definition of risk is “the possibility of
loss or injury”
6
Positive risks are risks that result in good things
happening; sometimes called opportunities
7
Risk utility or risk tolerance is the amount of
satisfaction or pleasure received from a potential
payoff.
The project may be accepted if the risks are within
tolerances and are in balance with the rewards
that may be gained by taking the risks.
Some organizations or people have a neutral
tolerance for risk, some have an aversion to risk,
and others are risk-seeking.
These three preferences are part of the utility
theory of risk
8
◦ There are three types of risk preferences:
1. Risk-Averse:
Utility rises at a decreasing rate for a risk-averse person. In
other words, when more payoff or money is at stake, a
person or organization that is risk-averse gains less
satisfaction from the risk, or has lower tolerance for the risk.
2. Risk-Seeking:
Those who are risk-seeking have a higher tolerance for
risk, and their satisfaction increases when more payoff is at
stake.
A risk-seeking person prefers outcomes that are more
uncertain and is often willing to pay a penalty to take risks.
9
3. Risk-Neutral
A risk-neutral person achieves a balance between risk and
payoff.
For example:
A risk-averse organization might not purchase hardware
from a vendor who has not been in business for a specified
period of time.
10
Figure 11-2 shows the basic difference between
risk-averse, risk-neutral, and risk-seeking
preferences.
The y-axis represents utility, or the amount of
pleasure received from taking a risk.
The x-axis shows the amount of potential payoff or
dollar value of the opportunity.
11
12
Planning risk management: deciding how to
approach and plan the risk management activities for
the project
13
Performing quantitative risk analysis:
numerically estimating the effects of risks on project
objectives
Planning risk responses: taking steps to enhance
opportunities and reduce threats to meet project
objectives
Monitoring and controlling risks: monitoring
identified and residual risks, identifying new risks,
carrying out risk response plans, and evaluating the
effectiveness of risk strategies throughout the life of
the project
14
15
The main output of risk management planning is a
risk management plan, a plan that documents
the procedures for managing risk throughout a
project
16
Methodology: How will risk management be performed on this
project? What tools and data sources are available and
applicable?
Roles and Responsibilities: Who are the individuals responsible
for implementing specific tasks and providing deliverables related
to risk management?
Budget and Schedule: What are the estimated costs and
schedules for performing risk-related activities?
Risk Categories: What are the main categories of risks that
should be addressed on this project? Is there a risk breakdown
structure for the project?
Risk Probability and Impact: How will the probabilities and
impacts of risk items be assessed? What scoring and
interpretation methods will be used for the qualitative and
quantitative analysis of risks?
Risk Documentation: What reporting formats and processes will
be used for risk management activities?
Chapter 11 – Project Risk Management 17
Contingency plans are predefined actions that the
project team will take if an identified risk event occurs
Fallback plans are developed for risks that have a
high impact on meeting project objectives and are put
into effect if attempts to reduce the risk are not
effective
Contingency reserves or allowances are provisions
held by the project sponsor or organization to reduce
the risk of cost or schedule overruns to an acceptable
level
18
Many organizations develop their own risk questionnaires.
Some of the categories of risk might include:
◦ Market risk – Will the new service or product be useful to the
organization or marketable to others? Will the users accept it?
Will someone else create a better product?
◦ Financial risk – can the organization afford to undertake the
project? Will the project meet NPV, ROI and payback estimates?
◦ Technology risk – is the project technically feasible? Is it
leading edge or bleeding edge technology?
◦ People risk – Are people with appropriate skills available to help
complete the project? Does senior management support the
project?
◦ Structure/process risk – What is the degree of change the new
project will introduce into user areas and business procedures?
With how many other systems does a new project/system need
to interact?
Chapter 11 – Project Risk Management 19
20
Identifying risks is the process of understanding
what potential events might hurt or enhance a
particular project
Risk identification tools and techniques include:
◦ Brainstorming
◦ The Delphi Technique
◦ Interviewing
◦ SWOT analysis
21
Brainstorming is a technique by which a group
attempts to generate ideas or find a solution for a
specific problem by gathering ideas spontaneously
and without judgment
An experienced facilitator should run the
brainstorming session
Be careful not to overuse or misuse brainstorming
◦ Psychology literature shows that individuals produce a
greater number of ideas working alone than they do
through brainstorming in small, face-to-face groups
◦ Group effects often inhibit idea generation
22
The Delphi Technique is used to derive a
agreement among a panel of experts who make
predictions about future developments
23
Interviewing is a fact-finding technique for
collecting information in face-to-face, phone, e-
mail, or instant-messaging discussions
24
SWOT analysis (strengths, weaknesses,
opportunities, and threats) can also be used
during risk identification
25
The main output of the risk identification process is a list
of identified risks and other information needed to begin
creating a risk register
A risk register is:
◦ A document that contains the results of various risk
management processes and that is often displayed in a
table or spreadsheet format
◦ A tool for documenting potential risk events and related
information
Risk events refer to specific, uncertain events that may
occur to the detriment or enhancement of the project
26
An identification number for each risk event
A rank for each risk event
The name of each risk event
A description of each risk event
The category under which each risk event falls
The root cause of each risk
27
Triggers for each risk; triggers are indicators or
symptoms of actual risk events
Potential responses to each risk
The risk owner or person who will own or take
responsibility for each risk
The probability and impact of each risk occurring
The status of each risk
28
29
Information Technology Project Management, Sixth Edition
Assess the likelihood and impact of identified
risks to determine their magnitude and priority
Risk quantification tools and techniques include:
◦ Probability/impact matrixes
◦ The Top Ten Risk Item Tracking
◦ Expert judgment
30
A probability/impact matrix or chart lists the
relative probability of a risk occurring on one side of
a matrix or axis on a chart and the relative impact of
the risk occurring on the other
List the risks and then label each one as high,
medium, or low in terms of its probability of
occurrence and its impact if it did occur
Can also calculate risk factors
◦ Numbers that represent the overall risk of specific events
based on their probability of occurring and the
consequences to the project if they do occur
31
32
Top Ten Risk Item Tracking is a qualitative risk
analysis tool that helps to identify risks and
maintain an awareness of risks throughout the life
of a project
Establish a periodic review of the top ten project
risk items
List the current ranking, previous ranking, number
of times the risk appears on the list over a period
of time, and a summary of progress made in
resolving the risk item
33
34
A watch list is a list of risks that are low priority
but are still identified as potential risks
35
Often follows qualitative risk analysis, but both can
be done together
Large, complex projects involving leading edge
technologies often require extensive quantitative
risk analysis
Main techniques include:
◦ Decision tree analysis
◦ Simulation
◦ Sensitivity analysis
36
A decision tree is a diagramming analysis
technique used to help select the best course of
action in situations in which future outcomes are
uncertain
Estimated monetary value (EMV) is the product of
a risk event probability and the risk event’s
monetary value
You can draw a decision tree to help find the EMV
37
38
After identifying and quantifying risks, you must
decide how to respond to them
39
Four main response strategies for negative risks
◦ Risk avoidance
◦ Risk acceptance
◦ Risk transference
◦ Risk mitigation
40
RISK AVOIDANCE
Risk avoidance or eliminating a specific threat, usually
by eliminating its causes.
41
RISK ACCEPTANCE
Risk acceptance or accepting the consequences if a risk
occurs.
42
RISK TRANSFERENCE
Risk transference or shifting the consequence of a risk
and responsibility for its management to a third party.
43
RISK MITIGATION
Risk mitigation or reducing the impact of a risk event by
reducing the probability of its occurrence.
44
45
Risk exploitation
Risk sharing
Risk enhancement
Risk acceptance
46
RISK EXPLOITATION
Risk exploitation or doing whatever you can to make
sure the positive risk happens.
47
RISK SHARING
Risk sharing or allocating ownership of the risk to
another party.
49
RISK ACCEPTANCE
Risk acceptance also applies to positive risks when the
project team does not take any actions toward a risk.
50
It’s also important to identify residual and
secondary risks.
Residual risks are risks that remain after all of
the response strategies have been implemented.
For example, even though a stable hardware
product may have been used on a project, there
may still be a risk that it fails to function properly.
Secondary risks are a direct result of
implementing a risk response.
For example, using the more stable hardware
may have caused a risk of peripheral devices
failing to function properly.
51
Involves executing the risk management process to
respond to risk events
Workarounds are unplanned responses to risk
events that must be done when there are no
contingency plans
Main outputs of risk monitoring and control are:
◦ Risk register updates
◦ Organizational process assets updates
◦ Change requests
◦ Updates to the project management plan and other
project documents
52
Risk registers can be created in a simple Word or
Excel file or as part of a database
You can purchase add-ons for Excel and Project
2007 to perform simulations
53
Unlike crisis management, good project risk
management often goes unnoticed
Well-run projects appear to be almost effortless, but
a lot of work goes into running a project well
Project managers should strive to make their jobs
look easy to reflect the results of well-run projects
54
Project risk management is the art and science of
identifying, analyzing, and responding to risk
throughout the life of a project and in the best
interests of meeting project objectives
Main processes include:
◦ Plan risk management
◦ Identify risks
◦ Perform qualitative risk analysis
◦ Perform quantitative risk analysis
◦ Plan risk responses
◦ Monitor and control risks
55