SlideShare a Scribd company logo
1 of 54
Project Risk Management 
Dr. A.K.Panigrahi 
1
2
3
What is Risk? 
• Risk is the possibility of suffering loss 
• Risk is a measure of the probability and 
consequence of not achieving a defined 
project goal. 
• Possible – but not certain, so it is 
expressed as probability 
• Risks change though out the life of a 
project 
• Loss - is any unwanted consequence that 
might occur 4
Risk in Projects 
• In a development project, the loss 
describes the impact to the project which 
could be in the form of diminished quality 
of the end product, increased costs, 
delayed completion, or failure. 
5
6 
Possible Risks in a Project 
• Creeping user requirements 
• Excessive schedule pressure 
• Low quality 
• Cost overruns 
• Poor estimates 
• Low customer satisfaction 
• Long schedules
Project Risk 
Project Risk 
Scope 
Integration 
Communication 
Human Resources 
Cost 
Procurement 
Quality 
Time
The Importance of Project Risk Management 
• Project risk management is the art and science of 
identifying, analyzing, and responding to risk throughout the 
life of a project and in the best interests of meeting project 
objectives 
• Risk management is often overlooked in projects, but it can 
help improve project success by helping select good 
projects, determining project scope, and developing realistic 
estimates 
• Unfortunately, crisis management has higher visibility due to 
the obvious danger to the success of the project but it’s risk 
management that helps a project have fewer problems to 
begin with. 
8
9
Risk Can Be Positive 
• Positive risks are risks that result in good 
things happening; sometimes called 
opportunities 
• A general definition of project risk is an 
uncertainty that can have a negative or 
positive effect on meeting project objectives 
• The goal of project risk management is to 
minimize potential negative risks while 
maximizing potential1 0positive risks
11 
Risk Management 
• Risk management is the act or practice of 
dealing with risk. 
• Risk management is proactive rather than 
reactive. 
• Risk management is not a separate 
activity but rather on aspect of sound 
project management.
Elements of Risk Management 
• Effective Risk Management is made up of: 
– Risk Assessment: identify, analyze, prioritize 
– Risk Control: planning, resolution, monitoring 
RISK 
ASSESSMENT 
12 
RISK 
MANAGEMENT 
RISK 
CONTROL 
IDENTIFICATION 
ANALYSIS 
PRIORITIZATION 
PLANNING 
RESOLUION 
MONITORING
13 
Common Mistakes in Risk 
Management 
• Not understanding the benefits of Risk 
Management 
• Not providing adequate time or resources 
for Risk Management 
• Not identifying and assessing risk using a 
standardized approach
Project Risk Management 
Processes 
• Risk management planning: deciding how 
to approach and plan the risk management 
activities for the project 
• Risk identification: determining which risks 
are likely to affect a project and documenting 
the characteristics of each 
• Qualitative risk analysis: prioritizing risks 
based on their probability and impact of 
occurrence 14
Project Risk Management Processes 
• Quantitative risk analysis: numerically estimating 
the effects of risks on project objectives 
• Risk response planning: taking steps to enhance 
opportunities and reduce threats to meeting project 
objectives 
• Risk monitoring and control: monitoring 
identified and residual risks, identifying new risks, 
carrying out risk response plans, and evaluating 
the effectiveness of risk strategies throughout the 
life of the project 
15
Project Risk Management 
Summary 
16
Risk Management 
• Four Main Steps 
Risk 
Identification 
Risk 
Risk Response 
Development 
Assessment 
Risk Response 
Control 
• Before these activities? 
Plan Risk Management Process 
17
Risk Identification 
• The possible risk is determined by a number of 
interrelated factors such as: 
– Nature of the Project 
– Aggressive or Conservative Schedule/Budget 
– Skills and motivation of the Project Team 
18
19 
Risk Identification 
• The need to proactively identify risks. 
– When an event happens it is too late to plan. 
• Tools for identifying risk 
– Brainstorming 
– Nominal Group Technique 
• Each member identifies their ideas 
• Each member writes an idea on the board until all 
ideas are listed
20 
Risk Identification 
• The group discusses each idea 
• Each individual ranks each of the ideas 
• The group then ranks all the ideas 
• Each individual ranks all the ideas again 
• Rankings are summarized 
– Delphi technique 
• Experts asked individually to provide input 
• Input summarized and distributed 
• Experts rank input
21 
Risk Identification 
– Strength, Weakness, Opportunities, Threats 
– Cause and effect diagrams 
– Past Projects
Likelihood 
• What is the likelihood of risk? 
– Expressed as a Probability (Percentage) 
– Example – There is a 5% chance of a programmer 
breaking their big toe whilst coding in any 6 month 
period 
22
Impact 
• What impact will it have on the project? 
– Example – A broken toe on average results in the loss of 20 
working days for a programmer 
– Expected Value of Loss/Profit 
• Expected Value = Loss/Profit x Likelihood 
• -20 x 0.05 = -1 
• So we will lose 1 day of coding per programmer on a 6 month 
project 
23
Urgency 
• How urgently do we need to deal with it? 
– Immediate remedy or Can it wait? 
– Additional means of prioritising action 
24
Example Risk Assessment 
Team Conflict and Injuries 
Description: Teammates in the group might have conflicts with one another 
throughout the semester. Injuries might result from conflict, accidents, 
and other mishaps throughout the semester. 
How to 
Avoid It: 
If any of the teammates show signs of conflict against one another, we 
need to mediate between them in order to make our team working 
smoothly and such throughout the whole semester. Thus that will reduce 
a factor for injury. However, for the other factors of injury, we need to 
make sure that we take good care of ourselves such that no harm will 
befall upon us (such as carpal tunnel syndrome, leg breaking, finger 
breaking, etc). 
What It Will 
Affect: 
If there is a large enough conflict, we might lose some teammates. 
Same with for injuries, if the injury is bad enough to cause teammates to 
not be able to work on the project. 
Possible 
Likelihood: 
3/100 chance 
The Real World Lab: http://www.cc.gatech.edu/classes/RWL/Web/ 
25
Quantifying Risk 
• Programmer has 5% chance of breaking toe in 
any 6 month period 
– Broken toe results in the loss of 20 programmer days 
– Cost of a programmer-day = £500 
• Expected Loss per year due to broken toes 
– 2 x (0.05 x -20) = -2 days 
– Expected loss = -£1000 
26
Techniques 
• Risk Map/Probability Impact Matrix 
• Hazard Control Matrix 
• Payoff Matrix 
• Decision Tree 
27
Risk Map 
Likelihood of Occurrence 
High Medium Low 
Large 
Medium 
Scale of impact 
Small 
28
Likelihood of Occurrence 
High Medium Low 
Large 
Medium 
Scale of impact 
Small 
Risk Map 
29
Risk Map 
Likelihood of Occurrence 
High Medium Low 
Large 
Medium 
Scale of impact 
Small 
A B 
C 
D 
30
Risk Map 
• List the risks in 
order of priority 
• What else can we 
use to help 
prioritise? 
Likelihood of Occurrence 
High Medium Low 
Large 
Medium 
Scale of impact 
Small 
A B 
C 
D 
31
Hazard Control Matrix 
From Curtis, G (1998) "Business Information Systems" Addison Wesley 
Errors 
and 
omissions 
Lost data 
and 
documents 
Computer 
Failure 
Unauthorized 
Access 
Fire Fraud 
Input 
controls 
Processing 
controls 
Output 
controls 
Storage 
controls 
Operating 
system 
controls 
Records 
management 
Accounting 
controls 
Contingency 
plan 
Physical 
security 
32
Hazard Control Matrix 
From Curtis, G (1998) "Business Information Systems" Addison Wesley 
Errors 
and 
omissions 
Lost data 
and 
documents 
Computer 
Failure 
Unauthorized 
Access 
Fire Fraud 
Input 
controls 
Processing 
controls 
Output 
controls 
Storage 
controls 
Operating 
system 
controls 
Records 
management 
Accounting 
controls 
Contingency 
plan 
Physical 
security 
33
Hazard Control Matrix 
From Curtis, G (1998) "Business Information Systems" Addison Wesley 
Errors 
and 
omissions 
Lost data 
and 
documents 
Computer 
Failure 
Unauthorized 
Access 
Fire Fraud 
Input 
controls 
 
Processing 
controls 
 
Output 
controls 
 
Storage 
controls 
Operating 
system 
controls 
Records 
management 
 
Accounting 
controls 
 
Contingency 
plan 
Physical 
security 
34
Hazard Control Matrix 
From Curtis, G (1998) "Business Information Systems" Addison Wesley 
Errors 
and 
omissions 
Lost data 
and 
documents 
Computer 
Failure 
Unauthorized 
Access 
Fire Fraud 
Input 
controls 
    
Processing 
controls 
  
Output 
controls 
    
Storage 
controls 
  
Operating 
system 
controls 
  
Records 
management 
   
Accounting 
controls 
   
Contingency 
plan 
  
Physical 
security 
   
35
Identification and Assessment 
• Problems 
– Not a particularly interesting task 
– Needs experience to do well 
• Are these good reasons to not do it? 
36
Risk Response Development 
• How are we going to deal with risks when they 
occur? 
– What about those we weren’t expecting? 
37
38 
Risk Response Planning 
• Who is going to detect when the risk 
occurs? 
• Who has the responsibility to respond and 
communicate? 
• What is the response?
Risk Response Planning 
• After identifying and quantifying risks, you 
must decide how to respond to them 
• Four main response strategies for negative 
risks: 
– Risk avoidance 
– Risk acceptance 
– Risk transference 
– Risk mitigation 
39
Risk Management Planning 
Risk Response Definitions 
• Avoidance – Changing a project 
objective to eliminate the threat posed 
by an adverse risk event.
Risk Management Planning 
Risk Response Definitions 
• Transference – Shifting the negative 
impact of a threat, along with the 
ownership of the response, to a third 
party.
Risk Management Planning 
Risk Response Definitions 
• Mitigation – Reducing the Probability or 
Impact of an adverse risk event (threat) 
to an acceptable threshold.
Risk Management Planning 
Risk Response Definitions 
• Acceptance – The project team decides 
not to change project objectives to deal 
with the risk. 
• Passive acceptance: no action , deal with threats as they occur 
(workarounds) 
• Active acceptance: establish a contingency reserve to handle risks
44 
Risk Strategies 
• Factors impacting the strategy 
– Impact of the risk 
– Project constraints 
– Tolerances 
• Strategy 
– Accept or Ignore 
• Provide reserves 
– Contingency plans 
• Natural disaster/backup plans
45 
Risk Strategies 
– Avoidance, eliminate the risk 
– Mitigate, lessen the impact of the risk 
• Performance impact, provide extra hardware 
– Transfer the risk 
• Offsite backup planning 
• Server farms 
• Outside management
46 
Risk Monitoring and Control 
• Risk monitoring 
– Determine who is responsible for monitoring 
– How are risks monitored? 
• Project tracking, resources, quality, etc 
– Communicating the status of identified risks 
• Reviews and Audits 
• Once a risk is identified as occurring 
– Communicate 
– Take action
Control Systems 
• Preventive Control 
– Stops undesirable events (disturbances) from 
occurring (see Curtis, 1998 Chapter 8) 
• Feedback Control 
– Doesn’t attempt to prevent unpredictable 
disturbances 
– Is able to recover from effects 
• Systems will usually combine both 
47
Risk Control 
• Goals of Control 
– Prevention 
– Detection 
– Minimise Loss 
– Recovery 
– Investigation 
H. A. Simon 
• Risk Response 
– Avoidance 
• Prevention 
– Mitigation 
• Transfer 
– Acceptance 
Cadle and Yeates 
48
Risk Response Control 
• Implement Risk Responses 
• Identify new Risks 
– Implement new responses 
49
50 
Risk Response and Evaluation 
• Trigger the defined risk response plan 
– Identify the risk owner 
– Assign resources 
– Understand the impacts 
• PERTs, Dependencies 
• Communicate 
• Evaluate once action is taken 
– Is more action needed? 
– What additional risks are triggered?
Risk Register 
• Can be used to keep information about identified 
risks 
– Title and description 
– Risk Status - e.g. candidate, live, closed 
– Potential impact 
– Risk owner 
– Actions 
– Action Log 
51
Risk Ownership 
• Risk owner is someone who: 
– Has sufficient information concerning the risk 
– Has the necessary resources to do something 
about the risk 
– Possesses the authority to do something 
about the risk 
52
Don’t take the risk if... 
• the organization cannot afford to lose. 
• the exposure to the outcome is too great. 
• the situation (or project) is not worth it. 
• the odds are not in the project’s favor. 
• the benefits are not clearly identified. 
• there appear to be a large number of acceptable 
alternatives. 
53
Don’t take the risk if... 
• the risk does not achieve the project objective. 
• the expected value from baseline assumptions is 
negative. 
• the data is unorganized, without structure or 
pattern. 
• there is not enough data to understand the 
results. 
• a contingency plan for recovery is not in place 
should the results prove unsatisfactory. 
54

More Related Content

What's hot

Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk ManagementKaustubh Gupta
 
Risk Management
Risk ManagementRisk Management
Risk ManagementSaqib Raza
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk ManagementHayat Denzi
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentationRaven Morgan
 
The Art and Science Behind Successful Risk Workshops
The Art and Science Behind Successful Risk WorkshopsThe Art and Science Behind Successful Risk Workshops
The Art and Science Behind Successful Risk WorkshopsAcumen
 
Download risk management workshop
Download   risk management workshopDownload   risk management workshop
Download risk management workshopBestoutcome
 
Construction Risk Summit "benefit and pits of Construction Risk Management"
Construction Risk Summit   "benefit and pits of Construction Risk Management"Construction Risk Summit   "benefit and pits of Construction Risk Management"
Construction Risk Summit "benefit and pits of Construction Risk Management"bfriday
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk ManagementSAJJAD KHUDHUR ABBAS
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategiesDebashishDas49
 
Project Management Risks Review
Project Management Risks ReviewProject Management Risks Review
Project Management Risks ReviewDavid Tennant
 
Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Dhamo daran
 
Presentation manage risk
Presentation manage riskPresentation manage risk
Presentation manage riskMichael Curtis
 
Software testing - Risk management
Software testing - Risk managementSoftware testing - Risk management
Software testing - Risk managementPractiTest
 
Technical Risk Management
Technical Risk ManagementTechnical Risk Management
Technical Risk ManagementGlen Alleman
 

What's hot (20)

Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk Management
 
Project Management 05
Project Management 05Project Management 05
Project Management 05
 
Risk management
Risk managementRisk management
Risk management
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentation
 
Project Risk
Project RiskProject Risk
Project Risk
 
The Art and Science Behind Successful Risk Workshops
The Art and Science Behind Successful Risk WorkshopsThe Art and Science Behind Successful Risk Workshops
The Art and Science Behind Successful Risk Workshops
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Download risk management workshop
Download   risk management workshopDownload   risk management workshop
Download risk management workshop
 
Construction Risk Summit "benefit and pits of Construction Risk Management"
Construction Risk Summit   "benefit and pits of Construction Risk Management"Construction Risk Summit   "benefit and pits of Construction Risk Management"
Construction Risk Summit "benefit and pits of Construction Risk Management"
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 
Project risk management: Techniques and strategies
Project risk management: Techniques and strategiesProject risk management: Techniques and strategies
Project risk management: Techniques and strategies
 
Project Management Risks Review
Project Management Risks ReviewProject Management Risks Review
Project Management Risks Review
 
Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Projectriskmanagement pmbok5
Projectriskmanagement pmbok5
 
Presentation manage risk
Presentation manage riskPresentation manage risk
Presentation manage risk
 
Basic risk management presentation 17th june 2015
Basic risk management presentation 17th june 2015Basic risk management presentation 17th june 2015
Basic risk management presentation 17th june 2015
 
Software testing - Risk management
Software testing - Risk managementSoftware testing - Risk management
Software testing - Risk management
 
Risk management
Risk managementRisk management
Risk management
 
Technical Risk Management
Technical Risk ManagementTechnical Risk Management
Technical Risk Management
 

Similar to Project Risk management

project_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptproject_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptBetshaTizazu2
 
Project Risk mgt ch3 supplimentary.ppt n
Project Risk mgt ch3 supplimentary.ppt nProject Risk mgt ch3 supplimentary.ppt n
Project Risk mgt ch3 supplimentary.ppt nKevin117905
 
Risk management concepts and learning
Risk management   concepts and learningRisk management   concepts and learning
Risk management concepts and learningVanita Ahuja
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.pptavisha23
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.pptAyidAlmgati
 
PMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptPMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptDorraLamouchi1
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementNajmul Hussain
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptYasirShaikh34
 
Risk Management Best Practices
Risk Management Best PracticesRisk Management Best Practices
Risk Management Best PracticesPMILebanonChapter
 
A Guide to Risk Management
A Guide to Risk ManagementA Guide to Risk Management
A Guide to Risk ManagementProjectCon
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk ManagementGoutama Bachtiar
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)ShudipPal
 
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Association for Project Management
 
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfdddddddddddddddddddddddddddddddddddddddddddddddSPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfdddddddddddddddddddddddddddddddddddddddddddddddShepherdChidambaeh
 
Critical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_enCritical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_enVyacheslav Guzovsky
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk ManagementNimat Khattak
 
Software Risk Management updated.ppt
Software Risk Management updated.pptSoftware Risk Management updated.ppt
Software Risk Management updated.pptumairshams6
 

Similar to Project Risk management (20)

project_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.pptproject_risk_mgmt_final 1.ppt
project_risk_mgmt_final 1.ppt
 
Project Risk mgt ch3 supplimentary.ppt n
Project Risk mgt ch3 supplimentary.ppt nProject Risk mgt ch3 supplimentary.ppt n
Project Risk mgt ch3 supplimentary.ppt n
 
Risk management concepts and learning
Risk management   concepts and learningRisk management   concepts and learning
Risk management concepts and learning
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
 
project_risk_mgmt_final.ppt
project_risk_mgmt_final.pptproject_risk_mgmt_final.ppt
project_risk_mgmt_final.ppt
 
PMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.pptPMI project_risk_management_final_2022.ppt
PMI project_risk_management_final_2022.ppt
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project Management
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
 
Risk Management Best Practices
Risk Management Best PracticesRisk Management Best Practices
Risk Management Best Practices
 
A Guide to Risk Management
A Guide to Risk ManagementA Guide to Risk Management
A Guide to Risk Management
 
Project risk analysis
Project risk analysisProject risk analysis
Project risk analysis
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
 
bpm-risk-analysis
bpm-risk-analysisbpm-risk-analysis
bpm-risk-analysis
 
Ch_1_PRM.pdf
Ch_1_PRM.pdfCh_1_PRM.pdf
Ch_1_PRM.pdf
 
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
 
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfdddddddddddddddddddddddddddddddddddddddddddddddSPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
SPM RISK PLANNING.pdfddddddddddddddddddddddddddddddddddddddddddddddd
 
Critical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_enCritical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_en
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Software Risk Management updated.ppt
Software Risk Management updated.pptSoftware Risk Management updated.ppt
Software Risk Management updated.ppt
 

Recently uploaded

M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 

Recently uploaded (20)

M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 

Project Risk management

  • 1. Project Risk Management Dr. A.K.Panigrahi 1
  • 2. 2
  • 3. 3
  • 4. What is Risk? • Risk is the possibility of suffering loss • Risk is a measure of the probability and consequence of not achieving a defined project goal. • Possible – but not certain, so it is expressed as probability • Risks change though out the life of a project • Loss - is any unwanted consequence that might occur 4
  • 5. Risk in Projects • In a development project, the loss describes the impact to the project which could be in the form of diminished quality of the end product, increased costs, delayed completion, or failure. 5
  • 6. 6 Possible Risks in a Project • Creeping user requirements • Excessive schedule pressure • Low quality • Cost overruns • Poor estimates • Low customer satisfaction • Long schedules
  • 7. Project Risk Project Risk Scope Integration Communication Human Resources Cost Procurement Quality Time
  • 8. The Importance of Project Risk Management • Project risk management is the art and science of identifying, analyzing, and responding to risk throughout the life of a project and in the best interests of meeting project objectives • Risk management is often overlooked in projects, but it can help improve project success by helping select good projects, determining project scope, and developing realistic estimates • Unfortunately, crisis management has higher visibility due to the obvious danger to the success of the project but it’s risk management that helps a project have fewer problems to begin with. 8
  • 9. 9
  • 10. Risk Can Be Positive • Positive risks are risks that result in good things happening; sometimes called opportunities • A general definition of project risk is an uncertainty that can have a negative or positive effect on meeting project objectives • The goal of project risk management is to minimize potential negative risks while maximizing potential1 0positive risks
  • 11. 11 Risk Management • Risk management is the act or practice of dealing with risk. • Risk management is proactive rather than reactive. • Risk management is not a separate activity but rather on aspect of sound project management.
  • 12. Elements of Risk Management • Effective Risk Management is made up of: – Risk Assessment: identify, analyze, prioritize – Risk Control: planning, resolution, monitoring RISK ASSESSMENT 12 RISK MANAGEMENT RISK CONTROL IDENTIFICATION ANALYSIS PRIORITIZATION PLANNING RESOLUION MONITORING
  • 13. 13 Common Mistakes in Risk Management • Not understanding the benefits of Risk Management • Not providing adequate time or resources for Risk Management • Not identifying and assessing risk using a standardized approach
  • 14. Project Risk Management Processes • Risk management planning: deciding how to approach and plan the risk management activities for the project • Risk identification: determining which risks are likely to affect a project and documenting the characteristics of each • Qualitative risk analysis: prioritizing risks based on their probability and impact of occurrence 14
  • 15. Project Risk Management Processes • Quantitative risk analysis: numerically estimating the effects of risks on project objectives • Risk response planning: taking steps to enhance opportunities and reduce threats to meeting project objectives • Risk monitoring and control: monitoring identified and residual risks, identifying new risks, carrying out risk response plans, and evaluating the effectiveness of risk strategies throughout the life of the project 15
  • 17. Risk Management • Four Main Steps Risk Identification Risk Risk Response Development Assessment Risk Response Control • Before these activities? Plan Risk Management Process 17
  • 18. Risk Identification • The possible risk is determined by a number of interrelated factors such as: – Nature of the Project – Aggressive or Conservative Schedule/Budget – Skills and motivation of the Project Team 18
  • 19. 19 Risk Identification • The need to proactively identify risks. – When an event happens it is too late to plan. • Tools for identifying risk – Brainstorming – Nominal Group Technique • Each member identifies their ideas • Each member writes an idea on the board until all ideas are listed
  • 20. 20 Risk Identification • The group discusses each idea • Each individual ranks each of the ideas • The group then ranks all the ideas • Each individual ranks all the ideas again • Rankings are summarized – Delphi technique • Experts asked individually to provide input • Input summarized and distributed • Experts rank input
  • 21. 21 Risk Identification – Strength, Weakness, Opportunities, Threats – Cause and effect diagrams – Past Projects
  • 22. Likelihood • What is the likelihood of risk? – Expressed as a Probability (Percentage) – Example – There is a 5% chance of a programmer breaking their big toe whilst coding in any 6 month period 22
  • 23. Impact • What impact will it have on the project? – Example – A broken toe on average results in the loss of 20 working days for a programmer – Expected Value of Loss/Profit • Expected Value = Loss/Profit x Likelihood • -20 x 0.05 = -1 • So we will lose 1 day of coding per programmer on a 6 month project 23
  • 24. Urgency • How urgently do we need to deal with it? – Immediate remedy or Can it wait? – Additional means of prioritising action 24
  • 25. Example Risk Assessment Team Conflict and Injuries Description: Teammates in the group might have conflicts with one another throughout the semester. Injuries might result from conflict, accidents, and other mishaps throughout the semester. How to Avoid It: If any of the teammates show signs of conflict against one another, we need to mediate between them in order to make our team working smoothly and such throughout the whole semester. Thus that will reduce a factor for injury. However, for the other factors of injury, we need to make sure that we take good care of ourselves such that no harm will befall upon us (such as carpal tunnel syndrome, leg breaking, finger breaking, etc). What It Will Affect: If there is a large enough conflict, we might lose some teammates. Same with for injuries, if the injury is bad enough to cause teammates to not be able to work on the project. Possible Likelihood: 3/100 chance The Real World Lab: http://www.cc.gatech.edu/classes/RWL/Web/ 25
  • 26. Quantifying Risk • Programmer has 5% chance of breaking toe in any 6 month period – Broken toe results in the loss of 20 programmer days – Cost of a programmer-day = £500 • Expected Loss per year due to broken toes – 2 x (0.05 x -20) = -2 days – Expected loss = -£1000 26
  • 27. Techniques • Risk Map/Probability Impact Matrix • Hazard Control Matrix • Payoff Matrix • Decision Tree 27
  • 28. Risk Map Likelihood of Occurrence High Medium Low Large Medium Scale of impact Small 28
  • 29. Likelihood of Occurrence High Medium Low Large Medium Scale of impact Small Risk Map 29
  • 30. Risk Map Likelihood of Occurrence High Medium Low Large Medium Scale of impact Small A B C D 30
  • 31. Risk Map • List the risks in order of priority • What else can we use to help prioritise? Likelihood of Occurrence High Medium Low Large Medium Scale of impact Small A B C D 31
  • 32. Hazard Control Matrix From Curtis, G (1998) "Business Information Systems" Addison Wesley Errors and omissions Lost data and documents Computer Failure Unauthorized Access Fire Fraud Input controls Processing controls Output controls Storage controls Operating system controls Records management Accounting controls Contingency plan Physical security 32
  • 33. Hazard Control Matrix From Curtis, G (1998) "Business Information Systems" Addison Wesley Errors and omissions Lost data and documents Computer Failure Unauthorized Access Fire Fraud Input controls Processing controls Output controls Storage controls Operating system controls Records management Accounting controls Contingency plan Physical security 33
  • 34. Hazard Control Matrix From Curtis, G (1998) "Business Information Systems" Addison Wesley Errors and omissions Lost data and documents Computer Failure Unauthorized Access Fire Fraud Input controls  Processing controls  Output controls  Storage controls Operating system controls Records management  Accounting controls  Contingency plan Physical security 34
  • 35. Hazard Control Matrix From Curtis, G (1998) "Business Information Systems" Addison Wesley Errors and omissions Lost data and documents Computer Failure Unauthorized Access Fire Fraud Input controls     Processing controls   Output controls     Storage controls   Operating system controls   Records management    Accounting controls    Contingency plan   Physical security    35
  • 36. Identification and Assessment • Problems – Not a particularly interesting task – Needs experience to do well • Are these good reasons to not do it? 36
  • 37. Risk Response Development • How are we going to deal with risks when they occur? – What about those we weren’t expecting? 37
  • 38. 38 Risk Response Planning • Who is going to detect when the risk occurs? • Who has the responsibility to respond and communicate? • What is the response?
  • 39. Risk Response Planning • After identifying and quantifying risks, you must decide how to respond to them • Four main response strategies for negative risks: – Risk avoidance – Risk acceptance – Risk transference – Risk mitigation 39
  • 40. Risk Management Planning Risk Response Definitions • Avoidance – Changing a project objective to eliminate the threat posed by an adverse risk event.
  • 41. Risk Management Planning Risk Response Definitions • Transference – Shifting the negative impact of a threat, along with the ownership of the response, to a third party.
  • 42. Risk Management Planning Risk Response Definitions • Mitigation – Reducing the Probability or Impact of an adverse risk event (threat) to an acceptable threshold.
  • 43. Risk Management Planning Risk Response Definitions • Acceptance – The project team decides not to change project objectives to deal with the risk. • Passive acceptance: no action , deal with threats as they occur (workarounds) • Active acceptance: establish a contingency reserve to handle risks
  • 44. 44 Risk Strategies • Factors impacting the strategy – Impact of the risk – Project constraints – Tolerances • Strategy – Accept or Ignore • Provide reserves – Contingency plans • Natural disaster/backup plans
  • 45. 45 Risk Strategies – Avoidance, eliminate the risk – Mitigate, lessen the impact of the risk • Performance impact, provide extra hardware – Transfer the risk • Offsite backup planning • Server farms • Outside management
  • 46. 46 Risk Monitoring and Control • Risk monitoring – Determine who is responsible for monitoring – How are risks monitored? • Project tracking, resources, quality, etc – Communicating the status of identified risks • Reviews and Audits • Once a risk is identified as occurring – Communicate – Take action
  • 47. Control Systems • Preventive Control – Stops undesirable events (disturbances) from occurring (see Curtis, 1998 Chapter 8) • Feedback Control – Doesn’t attempt to prevent unpredictable disturbances – Is able to recover from effects • Systems will usually combine both 47
  • 48. Risk Control • Goals of Control – Prevention – Detection – Minimise Loss – Recovery – Investigation H. A. Simon • Risk Response – Avoidance • Prevention – Mitigation • Transfer – Acceptance Cadle and Yeates 48
  • 49. Risk Response Control • Implement Risk Responses • Identify new Risks – Implement new responses 49
  • 50. 50 Risk Response and Evaluation • Trigger the defined risk response plan – Identify the risk owner – Assign resources – Understand the impacts • PERTs, Dependencies • Communicate • Evaluate once action is taken – Is more action needed? – What additional risks are triggered?
  • 51. Risk Register • Can be used to keep information about identified risks – Title and description – Risk Status - e.g. candidate, live, closed – Potential impact – Risk owner – Actions – Action Log 51
  • 52. Risk Ownership • Risk owner is someone who: – Has sufficient information concerning the risk – Has the necessary resources to do something about the risk – Possesses the authority to do something about the risk 52
  • 53. Don’t take the risk if... • the organization cannot afford to lose. • the exposure to the outcome is too great. • the situation (or project) is not worth it. • the odds are not in the project’s favor. • the benefits are not clearly identified. • there appear to be a large number of acceptable alternatives. 53
  • 54. Don’t take the risk if... • the risk does not achieve the project objective. • the expected value from baseline assumptions is negative. • the data is unorganized, without structure or pattern. • there is not enough data to understand the results. • a contingency plan for recovery is not in place should the results prove unsatisfactory. 54