Risk Management 2013

download Risk Management 2013

of 18

Transcript of Risk Management 2013

  • 7/29/2019 Risk Management 2013

    1/18

    Risk management

    This lecture will touch upon:

    Definition of risk and risk management

    Some ways of categorizing risk

    Risk management

    Risk identification what are the risks to a project? Risk analysis which ones are really serious?

    Risk planning what shall we do?

    Risk monitoring has the planning worked?

    We will also look at PERT risk and critical chains

  • 7/29/2019 Risk Management 2013

    2/18

    Some definitions of risk

    the chance of exposure to the adverse

    consequences of future events PRINCE2

    Project plans have to be based on

    Riskis the possibility that an assumption is

    wrong

    When the risk happens it becomes aproblem

    or an issue

  • 7/29/2019 Risk Management 2013

    3/18

    Categories of risk

  • 7/29/2019 Risk Management 2013

    4/18

    ISPL situational factors: the target

    domain

    class

    information system

    description

    the characteristics of theinformation system - these

    are independent of the

    computer system

    used

    the characteristics of the part

    of the information systemthat have been

    computerized

  • 7/29/2019 Risk Management 2013

    5/18

    ISPL situational factors: project domain

    Project

    Structure

    the types of task to be undertaken

    the communication systems,management structures, work

    flows etc

    Actors

    Technology

    the people involved in the project the methods, techniques and tools

    to be used

  • 7/29/2019 Risk Management 2013

    6/18

    A framework for dealing with risk

    The planning for risk includes these steps:

    Risk identification what risks might therebe?

    the most serious risks?

    Risk planning what are we going to do

    about them?Risk monitoring what is the current state of

    the risk?

  • 7/29/2019 Risk Management 2013

    7/18

    Risk identification

    Approaches to identifying risks include:

    Use of checklists usually based on the

    experience of past projects

    Brainstorming getting now e gea estakeholders together to pool concerns

    Causal mapping identifying possible chains

    of cause and effect

  • 7/29/2019 Risk Management 2013

    8/18

    Boehms top 10 development risksRisk Risk reduction techniques

    Personnel shortfalls Staffing with top talent; job matching; teambuilding;training and career development; early scheduling

    of key personnel

    estimates

    incremental development; recording and analysis

    of past projects; standardization of methods

    Developing the wrong

    software functions

    Improved software evaluation; formal specification

    methods; user surveys; prototyping; early usermanuals

    Developing the wrong

    user interface

    Prototyping; task analysis; user involvement

  • 7/29/2019 Risk Management 2013

    9/18

    Boehms top ten risk - continued

    Gold plating Requirements scrubbing, prototyping,

    design to cost

    Late changes torequirements

    Change control, incremental development

    Shortfalls in externally Benchmarking, inspections, formal specifications,

    ,

    Shortfalls in externally

    performed tasks

    Quality assurance procedures, competitive design

    etc

    Real time performance

    problems

    Simulation, prototyping, tuning

    Development technically

    too difficult

    Technical analysis, cost-benefit analysis,

    prototyping , training

  • 7/29/2019 Risk Management 2013

    10/18

    Causal mapping

  • 7/29/2019 Risk Management 2013

    11/18

    Causal mapping - interventions

  • 7/29/2019 Risk Management 2013

    12/18

    Risk AnalysisRisk exposure (RE)

    = (potential damage) x (probability of occurrence)

    Ideally

    Potential damage: a money value e.g. a flood wouldcause 0.5 millions of dama e

    Probability 0.00 (absolutely no chance) to 1.00(absolutely certain) e.g. 0.01 (one in hundredchance)

    RE = 0.5m x 0.01 = 5,000Crudely analogous to the amount needed for an

    insurance premium

  • 7/29/2019 Risk Management 2013

    13/18

    864648

    4 8 32

  • 7/29/2019 Risk Management 2013

    14/18

    Risk probability: qualitative

    descriptors

    Probabilitylevel

    Range

    Significant 30-50% chance of happening

    Moderate 10-29% chance of happening

    Low Less than 10% chance of happening

  • 7/29/2019 Risk Management 2013

    15/18

    Qualitative descriptors of impact on cost

    and associated range values

    Impact level Range

    High Greater than 30% above budgeted

    expenditure

    gn can o a ove u ge eexpenditure

    Moderate 10 to 19% above budgeted

    expenditureLow Within 10% of budgeted

    expenditure.

  • 7/29/2019 Risk Management 2013

    16/18

    Probability impact matrix

  • 7/29/2019 Risk Management 2013

    17/18

    Risk planning

    Risks can be dealt with by:

    Risk acceptance

    Risk avoidance

    Risk reduction

    Risk transfer

    Risk mitigation/contingency measures

  • 7/29/2019 Risk Management 2013

    18/18

    Risk reduction leverageRisk reduction leverage =

    (REbefore- REafter)/ (cost of risk reduction)REbeforeis risk exposure before risk reduction e.g. 1%

    chance of a fire causing 200k damage

    REafter is risk exposure after risk reduction e.g. firealarm costing 500 reduces probability of fire

    damage to 0.5%

    RRL = (1% of 200k)-(0.5% of 200k)/500 = 2RRL > 1.00 therefore worth doing