08 Marchewka
08 Marchewka
By Jack T. Marchewka Northern Illinois University Power Point Slides by Gerald DeHondt Grand Valley State University
8-1
Determining how to approach and plan the project risk management activities. An output of this process is the development of a risk management plan. Deciding which risks can impact the project. Risk identification generally includes many of the project stakeholders and requires an understanding of the projects goal, as well as the projects scope, schedule, budget, and quality objectives. Focusing on a qualitative analysis concerning the impact and likelihood of the risks that were identified. Using a quantitative approach for developing a probabilistic model for understanding and responding to the risks identified.
Identify Risks
Developing procedures and techniques to reduce the threats of risks, while enhancing the likelihood of opportunities.
Providing an early warning system to monitor identified risks and any new risks. This system ensures that risk responses have been implemented as planned and had the effect as intended. Copyright 2012 John 8-3 Wiley & Sons, Inc.
The baseline project plan is based on a number of estimates and assumptions Estimation implies uncertainty so managing the uncertainty is crucial to project success Project risk management is an important subdiscipline of software engineering
Focuses on identifying, analyzing and developing strategies for responding to project risk efficiently and effectively The goal is to make well informed decisions as to what risks are worth taking and to respond to those risks in an appropriate manner Provides an early warning system for impending problems 4 that need to be addressed or resolved
By not following a formal risk management approach, many projects end up in a perpetual crisis mode (firefighting) reacting rather than being proactive
Inability to make effective and timely decisions Client wants results, not interested in how achieved . Managers take aggressive risks or may optimistically ignore risks which turn into threats to the projects success Should not be treated as an add-on but integrated throughout the project life cycle Assess and plan for project risk in the earliest stages of the project
5
Can overlook both threats and opportunities Time and resources expended on problems that could have been avoided, opportunities will be missed Decisions will be made without complete understanding or information
Otherwise, the process will be sidestepped the moment a crisis arises and the project is in trouble Each risk must have an owner who will take responsibility for monitoring the project in order to identify any new or increasing risks and report them to the project sponsor You can not manage all projects and risks the same way, this can lead to disaster
Stakeholder responsibility
Definitions
Risk
An uncertain event or condition that, if occurs, has a positive or negative effect on the project objectives. Includes the processes concerned with conducting risk management planning, identification, analysis, responses, and monitoring and control of a project; most of these processes are updated throughout the project. The objectives of project risk management are to increase the probability and impact of positive events and decrease the probability and impact of events adverse to the project.
8
Determining how to approach and plan the project risk management activities. An output of this process is the development of a risk management plan. Deciding which risks can impact the project. Risk identification generally includes many of the project stakeholders and requires an understanding of the projects goal, as well as the projects scope, schedule, budget, and quality objectives. Focusing on a qualitative analysis concerning the impact and likelihood of the risks that were identified. Using a quantitative approach for developing a probabilistic model for understanding and responding to the risks identified. Developing procedures and techniques to reduce the threats of risks, while enhancing the likelihood of opportunities. Providing an early warning system to monitor identified risks and any new risks. This system ensures that risk responses have been implemented as planned and had the effect as intended.
Risk identification
10
Risk Planning
Requires firm commitment by all stakeholders to a RM approach Assures adequate resources are in place to plan properly for and manage the various risks of the IT project
Focuses on preparation
11
Risk Identification
Once commitment has been obtained and preparations have been made, the next step entails identifying the various risks to the project. Both threats and opportunities must be identified.
They must be identified clearly so that the true problem, not just a symptom, is addressed. Causes and effects of each risk must be understood so that effective strategies and responses can be made. Project risks are rarely isolated, they tend to be interrelated and affect the project and its stakeholders differently.
12
Risk Assessment
Once the project risks have been identified and their causes and effects understood, the next step requires that we analyze these risks. Answers to two basic questions are required:
What is the likelihood of a particular risk occurring? What is the impact on the project if it does occur?
Assessing these risks helps the project manager and other stakeholders prioritize and formulate responses to those risks that provide the greatest threat or opportunity to the project. Because there is a cost associated with responding to a particular risk, risk management must function within the constraints of the projects available resources.
13
Risk Strategies
The next step of the risk planning process is to determine how to deal with the various project risks. In addition to resource constraints, an appropriate strategy will be determined by the project stakeholders perceptions of risk and their willingness to take on a particular risk. Essentially, a project risk strategy will focus on one of the following approaches:
Accept or ignore the risk. Avoid the risk completely. Reduce the likelihood or impact of the risk (or both) if the risk occurs. Transfer the risk to someone else (i.e., insurance).
14
Risk Strategies
In addition, triggers or flags in the form of metrics should be identified to draw attention to a particular risk when it occurs. This system requires that each risk have an owner to monitor the risk and to ensure that resources are made available in order to respond to the risk appropriately. Once the risks, the risk triggers, and strategies or responses are documented, this document then becomes the risk response plan.
15
Once the salient project risks have been identified and appropriate responses formulated, the next step entails scanning the project environment so that both identified and unidentified threats and opportunities can be followed, much like a radar screen follows ships. Risk owners should monitor the various risk triggers so that well informed decisions and appropriate actions can take place.
Risk Response
Provides a mechanism for scanning the project environment for risks, but the risk owner must commit resources and take action once a risk threat or 16 opportunity is made known. This action normally follows
Risk Evaluation
A formal and documented evaluation of a risk episode provides the basis for lessons learned and lays the foundation for identifying best practices. This evaluation should consider the entire risk management process from planning through evaluation. It should focus on the following questions:
How did we do? What can we do better next time? What lessons did we learn? What best practices can be incorporated in the risk management process?
The risk planning process is cyclical because the evaluation of the risk responses and the risk planning process can influence 17 how an organization will plan, prepare, and commit to IT risk
18
At the core of the framework is the MOV Next layer includes the project objectives scope, budget, schedule and quality. They play a critical role in supporting the MOV The third layer focuses on the sources of IT project risk The next layer focuses on whether the risks are internal or external
If a team member is not properly trained to use a technology, the risk can be mitigated or avoided by additional training or assigning the task to a more experienced team member A PM may not be accountable for project cancellation if the project sponsor went bankrupt A poorly performing external vendor is still the
19
The fifth layer includes known risks, knownunknown risks and unknown-unknown risks
You pay an electricity bill each month, but the amount changes based on usage
20
The final layer shows that though risk management is critical at the start of a project, vigilance for opportunities and problems is required throughout the entire project life cycle
21
Vendor is hired to develop a BI system, client is sued and has to cut back on project. Due to importance of project, break it into two phases (basic and bells-andwhistles).
Threat occurred in Develop Project Charter and Project Plan Phase Unknown-unknown risk External risk, PM and project team not responsible Sources of risk environment (economic), organizational (client) and people (if management is to blame) Impact on scope, budget and schedule MOV changes due to phased approach
22
Start from the outer core of the framework, analyzing the WBS and work packages to identify risks for each work package under the various project phases Categorize known/unknown types Categorize external/internal Identify sources of risk (may be inter-related) Assess how a particular risk will impact the project objectives and in turn the MOV
Can also be used going from inner core and working out
23
Learning Cycles
Identify facts (what is known), assumptions (what they think they know) and research (things to find out) to identify various risks Use IT risk framework and the WBS to identify risks
Brainstorming
Structured technique for identifying risks that attempts to balance and increase participation
Delphi Technique
Group of experts assembled to identify potential risks and their impact on the project
24
Interviews
Checklists
Structured tool for identifying risks that have occurred in the past Be aware of things not on the list Strengths, weaknesses, opportunities and threats Identify threats and opportunities as well as their nature in terms of the project or organizational strengths and weaknesses Can be used to for understanding the causes and factors of a particular risk as well as its effects
Lessons learned from earlier projects
25
SWOT Analysis
Past Projects
26
SWOT Analysis
8-28
29
30
Determine return or profit the project will return Graphical view of various decisions and outcomes
Decision Trees
31
Expected value is an average, taking into account the probability and impact of various outcomes Expected return on the project
A B Payoff
(In thousands)
A*B
Prob * Payoff
(In thousands)
Schedule Risk Project completed 20 days early Project completed 10 days early Project completed on Schedule Project completed 10 days late
5%
100%
$ (50)
($3)
$88
32
Decision Trees
$10,000+. 05*$2,000
33
40%
1.6
50%
3.0
10%
0.9
80%
4.8
60%
4.2
20%
0.6
5%
0.4
34
Risk Rankings
Risk (Threats)
Ranking
35
Kittens low probability of occurring and low impact. Dont spend much time or resources on them whether positive or negative Puppies low impact but high probability of occurring. Must be watched so corrective action can be taken before they get out of hand Tigers high impact and high probability. Deal with them tout de suite. Alligators low probability but high impact if they get loose. Make sure you know where they are
36
37
Continuous
38
Uses only integers, no fractional values flipping a coin Chart below represents the distribution after flipping a coin a few hundred times
39
Normal Distribution
Useful when an event has an infinite number of possible values in a stated range
40
Normal Distribution
Properties
Distribution shaped by its mean ( ) and standard deviation () Probability is associated area under the curve .
Area between any two points is obtained via a z score z=(x- )/ Since the normal distribution is symmetrical around the mean, outcome between - and has the same probability of falling between and
41
PERT Distribution
PERT MEAN = (a + 4m + b)/6 Where: a = optimistic estimate m = most likely b = pessimistic
42
PERT Distribution
PERT Mean = (a + 4m + b)/6 Where: a = optimistic estimate m = most likely b = pessimistic
43
Triangular Distribution
TRAING Mean = (a + m + b)/3 Where: a = optimistic estimate m = most likely b = pessimistic
44
Simulations
Monte Carlo
Technique that randomly generates specific values for a variable with a specific probability distribution Goes through a number of trials or iterations and records the outcome @RISK
An MS Project add in that provides a useful tool for conducting risk analysis of your project plan Uses Monte Carlo simulation to show you many possible outcomes in your project and tells you how likely they are to occur. You can determine which tasks are most important and then manage those risks appropriately. Helps you choose the best strategy based on the available information. http://www.palisade.com/riskproject/default.asp
45
Simulations
@RISK
Following example shows a project with an estimated completion time of 155 days Test results will require 17 days These estimates do not take into consideration any variability or risk @RISK model shows a probability distribution for each of the tasks under Test Results Report
Probabilities defined based on data collected from past projects pr based on statistical theory or project manager assumption
Review test plan with client is following a PERT distribution with parameters .5, 1, 2
46
47
48
49
Tornado Graph
8-50
Tornado graph enables a sensitivity analysis which summarizes the tasks with the most significant risk at top
Tornado Graph
51
Really an opportunity or threat? At which points during the project lifecycle will the project be affected? What are the triggers? Probability? Impact? Available resources? Can contractual obligations be waived or modified?
Project constraints
Accept or Ignore
Management Reserves
Contingency Reserves
Reduce the likelihood or impact (or both) e.g. insurance, subcontract to someone who has more
53
Transfer
A trigger which flags that the risk has occurred An owner of the risk (i.e., the person or group responsible for monitoring the risk and ensuring that the appropriate risk response is carried out) A response based on one of the four basic risk strategies Adequate resources
54
Risk Audits
Risk Reviews
55
56
Risk Evaluation
Increase our understanding of IT project risk in general. Understand what information was available to managing risks and for making risk-related decisions. Understand how and why a particular decision was made. Understand the implications not only of the risks, but also the decisions that were made. Learn from our experience so that others may not have to repeat our mistakes.
57