Top Banner
Information Technology Project Management – Third Edition By Jack T. Marchewka Northern Illinois University Copyright 2009 John Wiley & Sons, Inc. all rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the information contained herein.
40
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ch08

Information Technology Project

Management – Third Edition

By Jack T. Marchewka

Northern Illinois University

Copyright 2009 John Wiley & Sons, Inc. all rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the information contained herein.

Page 2: ch08

Managing Project Risk

Chapter 8

Page 3: ch08

Learning Objectives

� Describe the project risk management planning framework introduced in this chapter.

� Define risk identification and the causes, effects, and integrative nature of project risks.

� Apply several qualitative and quantitative analysis techniques that can be used to prioritize and analyze various project risks.that can be used to prioritize and analyze various project risks.

� Describe the various risk strategies, such as insurance, avoidance, or mitigation.

� Describe risk monitoring and control.

� Describe risk evaluation in terms of how the entire risk management process should be evaluated in order to learn from experience and to identify best practices.

Page 4: ch08

PMBOK® Risk Management Processes� Risk management planning

� Determining how to approach and plan the project risk management activities. An output of this process is the development of a risk management plan.

� Risk identification

� Deciding which risks can impact the project. Risk identification generally includes many of the project stakeholders and requires an understanding of the project’s goal, as well as the project’s scope, schedule, budget, and quality objectives.

� Qualitative risk analysis

Focusing on a qualitative analysis concerning the impact and likelihood of the risks that were identified.� Focusing on a qualitative analysis concerning the impact and likelihood of the risks that were identified.

� Quantitative risk analysis

� Using a quantitative approach for developing a probabilistic model for understanding and responding to the risks identified.

� Risk response planning

� Developing procedures and techniques to reduce the threats of risks, while enhancing the likelihood of opportunities.

� Risk monitoring and control

� Providing an early warning system to monitor identified risks and any new risks. This system ensures that risk responses have been implemented as planned and had the effect as intended.

Page 5: ch08

Common Mistakes in Managing Project Risk

� Not understanding the benefits of risk management

� Not providing adequate time for risk management

� Not identifying and assessing risk using a standardized approach

Page 6: ch08

Effective & Successful Risk

Management Requires

� Commitment by all stakeholders

� Stakeholder responsibility

� Different risks for different types of projects

Page 7: ch08

Definitions

� Risk

� An uncertain event or condition that, if occurs, has a positive or negative effect on the project objectives.

� Project Risk Management (PMBOK®)

� Includes the processes concerned with conducting risk management planning, identification, analysis, responses, and management planning, identification, analysis, responses, and monitoring and control of a project; most of these processes are updated throughout the project. The objectives of project risk management are to increase the probability and impact of positive events and decrease the probability and impact of events adverse to the project.

Page 8: ch08

IT Project Risk Management Processes

Page 9: ch08

Risk Planning

� Requires firm commitment by all stakeholders to a RM approach

� Assures adequate resources are in place

� Focuses on preparation

Page 10: ch08

Risk IdentificationFrameworkIT Project Risk Identification Framework

Page 11: ch08

Risk Identification Tools & Techniques

� Learning Cycles

� Brainstorming

� Nominal Group Technique

� Delphi Technique

� Interviews

Checklists� Checklists

� SWOT Analysis

� Cause & Effect (a.k.a. Fishbone/Ishikawa)

� Past Projects

Page 12: ch08

Nominal Group Technique (NGT)

1. Each individual silently writes their ideas on a piece of paper2. Each idea is then written on a board or flip chart one at a time

in a round-robin fashion until each individual has listed all of his or herideas

3. The group then discusses and clarifies each of the ideas3. The group then discusses and clarifies each of the ideas4. Each individual then silently ranks and prioritizes the ideas5. The group then discusses the rankings and priorities6. Each individual ranks and prioritizes the ideas again7. The rankings and prioritizations are then summarized for the group

Page 13: ch08

Risk Check List

� Funding for the project has been secured� Funding for the project is sufficient� Funding for the project has been approved by senior management� The project team has the requisite skills to complete the project� The project has adequate manpower to complete the project� The project has adequate manpower to complete the project� The project charter and project plan have been approved by senior management or the project sponsor� The project’s goal is realistic and achievable� The project’s schedule is realistic and achievable� The project’s scope has been clearly defined� Processes for scope changes have been clearly defined

Page 14: ch08

SWOT Analysis

Page 15: ch08

Cause & Effect Diagram

Page 16: ch08

Risk Analysis & Assessment

Risk = f(Probability * Impact)Risk assessment focuses on prioritizing risks so thatan effective strategy can be formulated for those risksthat require a response.that require a response.

Can’t respond to all risks!Depends on

Stakeholder risk tolerances

Page 17: ch08

Risk Analysis & Assessment

Qualitative Approaches

� Expected Value & Payoff Tables

� Decision Trees

� Risk Impact Table & Ranking

� Tusler’s Risk Classification

Which risks require a response?

Page 18: ch08

A B A*B

Schedule Risk Probability Payoff(In thousands)

Prob * Payoff

(In thousands)

Project completed 20 days early 5% $ 200 $10

Payoff Table

The ExpectedProject completed 10 days early 20% $ 150 $30

Project completed on Schedule 50% $ 100 $50

Project completed 10 days late 20% $ - $0

Project completed 20 days late 5% $ (50) ($3)

100% $88

ExpectedValue

Page 19: ch08

Decision Tree Analysis

Page 20: ch08

0 - 100% 0-10 P*I

Risk (Threats) Probability Impact Score

Key project team member leaves project 40% 4 1.6

Client unable to define scope and requirements 50% 6 3.0

Client experiences financial problems 10% 9 0.9

Risk Impact Table

Response time not acceptable to users/client 80% 6 4.8

Technology does not integrate with existing application 60% 7 4.2

Functional manager deflects resources away from project 20% 3 0.6

Client unable to obtain licensing agreements 5% 7 0.4

IT Project Risk Impact Analysis

Page 21: ch08

Risk (Threats) Ranking

Response time not acceptable to users/client 1

Technology does not integrate with existing application 2

Client unable to define scope and requirements 3

RiskRankings

Key project team member leaves project 4

Client experiences financial problems 5

Functional manager deflects resources away from project 6

Client unable to obtain licensing agreements 7

Page 22: ch08

Tusler’s Risk Classification

Can be troublesome Must be neutralized

Tusler’s Risk Identification Scheme

Low prob/low impact Not a problem

(if you know where they are)

Page 23: ch08

Risk Analysis & Assessment

Quantitative Approaches

� Quantitative Probability Distributions

� Discrete

� Binomial

� Continuous

� Normal

� PERT� PERT

� TRIANG

Page 24: ch08

Binomial Probability Distribution

Page 25: ch08

Normal Distribution

Page 26: ch08

Normal Distribution

� Rules of thumb with respect to observations

� Approximately….

68% + 1 standard deviations of mean68% + 1 standard deviations of mean95% + 2 standard deviations of the mean99% + 3 standard deviations of the mean

Page 27: ch08

PERT Distribution

PERT MEAN = (a + 4m + b)/6

Where:a = optimistic estimatem = most likelyb = pessimistic

Page 28: ch08

PERT Distribution

Page 29: ch08

Triangular Distribution

Page 30: ch08

Simulations

� Monte Carlo

� Technique that randomly generates specific values for a variable with a specific probability distribution

� Goes through a number of trials or iterations and records the outcome

� @RISK®� @RISK®

� An MS Project® add in that provides a useful tool for conducting risk analysis of your project plan

� http://www.palisade.com/riskproject/default.asp

Page 31: ch08

Monte Carlo Simulation

Page 32: ch08

Output From Monte Carlo Simulation

Page 33: ch08

Cumulative Probability Distribution

Page 34: ch08

Tornado Graph

Sensitivity Analysis Using a Tornado Graph

Page 35: ch08

Risk Strategies

� Accept or Ignore

� Management Reserves

� Released by senior management

� Contingency Reserves

� Part of project’s budget

� Contingency Plans� Contingency Plans

� Avoidance

� Mitigate

� Reduce the likelihood or impact (or both)

� Transfer

� E.g. insurance

Page 36: ch08

Risk Strategies Depend On

� The nature of the risk

� Really an opportunity or threat?

� Impact on MOV and project objectives

� Probability? Impact?

� Project constraintsProject constraints

� Available resources?

� Risk tolerances or preferences of the project stakeholders

Page 37: ch08

Risk Monitoring & Control

� Risk Audits

� External to project team

� Risk Reviews

� Internal

� Risk Status Meetings & ReportsRisk Status Meetings & Reports

Page 38: ch08

Risk Response Plan should include:

� A trigger which flags that the risk has occurred

� An owner of the risk (i.e., the person or group responsible for monitoring the risk and ensuring that the appropriate risk response is carried out)

� A response based on one of the four basic risk strategies

� Adequate resources

Page 39: ch08

Project Risk Radar

Monitoring projectrisks is analogousto a radar scope where threat andopportunities mayopportunities maypresent themselvesat different times overthe project

Page 40: ch08

Risk Evaluation

� Lessons learned and best practices help us to: � Increase our understanding of IT project risk in general.

� Understand what information was available to managing risks and for making risk-related decisions.

� Understand how and why a particular decision was made.

� Understand the implications not only of the risks, but also � Understand the implications not only of the risks, but also the decisions that were made.

� Learn from our experience so that others may not have to repeat our mistakes.