Session6 Withoutsolution
Session6 Withoutsolution
management
Cédric Verbeeck
Simulation debriefing
Managing risk & uncertainty
Case: The Phoenix project
Project management
simulation B,C+F
3
Class discussion (1)
B C F
4
Class discussion (3)
5
Class discussion (2)
6
Default causal model
Too much time
in meeting Outsourcing Team size
Unrealistic
schedule
schedule
morale
scope
7
How does uncertainty affect this model?
Too much time
in meeting outsourcing Team size
Unrealistic
Schedule
schedule
morale
Scope
stress
Unfinished Hours worked
1-1 coaching
tasks
New tasks
Status meetings Project completed
knowledge
Daily standup
Productivity
meetings Team change
Team size
Project Task completed
Outsourcing Mistake rate
Required coordination incorrectly
Unexpected coordination
events Productivity drain due
Skill level of to uncertainty
staff
8
Exercises in managing projects in different conditions
9
Class discussion (4)
10
How would you revise your project management advice?
11
Managing Risk &
uncertainty
12
Learning Objectives
Funding
Resources
Client expectations
Technological problems
Project Risk & Risk Management
What cues will signal the need for such action (i.e., what clues should I
actively look for)?
R. Max Wideman. (2004). A Management Framework for Project, Program and Portfolio Integration. Victoria, BC, Canada, 2004.
Four Stages of Risk Management
Risk identification
Pm Pc Pd
Pf
3
3. Use project team’s consensus to determine the score for each Consequence
of Failure category:
For example 4 cost categories: Cost (Cc), Schedule (Cs), Reliability (Cr), and
Performance (Cp).
Example of risk categories applied to software development
product
Cc Cs Cr Cp
Cf
4
5. Calculate Overall Risk Factor for the project by using the formula:
RF Pf Cf Pf Cf
Rule of Thumb:
Low Risk RF < 0.30
Medium Risk RF = 0.30 to 0.70
High Risk RF > 0.70
Exercise
Calculate the overall risk factor for this project. Would you assess this level of risk as low, moderate,
or high? Why?
27
3. Risk Mitigation Strategies
Accept
Minimize
Share
Transfer
Contingency Reserves
• Task contingency
• Managerial contingency
4. Control and Documentation
30
Case questions
1. Case introduction:
1. Describe the role of Information Technology services (ITS) in fulfilling UVA’s mission
2. What attracts cyberattackers to universities?
3. What are the most common attack methods and approaches for mitigating
cyberattacks?
2. Describe each of the five objectives of the Phoenix project. What level of
effort would be required to accomplish these objectives?
3. Describe the various internal and external stakeholders associated with
the Phoenix project. How would you recommend the project team
communicate with each stakeholder group?
4. Identify the key risks (10-18) inherent to this project. How would you
recommend the team manage these risks?
31
What does this mean for you team
assignment