Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
46 Cards in this Set
- Front
- Back
What are the sequential risk management processes?
|
Plan Risk Management
Identify Risks Perform Qualitative Risk Analysis Perform Quantitative Risk Analysis Plan Risk Responses Monitor and Control Risks |
|
What are inputs to Risk Management?
|
Project background information
Historical records from previous projects Past lessons learned Company processes and procedures Organizational risk tolerances Organizational risk thresholds Company culture Project charter Project scope statement Team Work breakdown structure Network Diagram Time and costs estimates Communications management plan Staffing management plan Procurement management plan Stakeholders |
|
What are outputs to Plan Risk Management?
|
Methodology
Roles and responsibilities Budgeting Timing Risk categories Definitions of probability and impact Stakeholder tolerances Reporting formats Tracking |
|
What are risk categories?
|
External
Internal Technical Unforeseeable |
|
Definition of external risk
|
Regulatory, environmental, government, market shifts
|
|
Definition of Internal risk
|
Time, cost, or scope changes; inexperience; poor planning; people; staffing; materials; equipment
|
|
Technical
|
Changes in technology
|
|
Unforeseeable
|
Only a small portion of risks (some say about 10%) are actually unforeseeable
|
|
What are sources of risks?
|
Schedule
Cost Quality Scope Resources Customer (Stakeholder) Satisfaction |
|
Information gathering techniques
|
Brainstorming
Delphi Technique Interviewing Root Cause Analysis |
|
Definition of Brainstorming
|
Usually done in a meeting where one idea helps generate another.
Usually done in the presence of a facilitator |
|
Definition of Delphi Technique
|
Technique is used to achieve consensus among experts who participate anonymously.
Prevents individual bias. Delphi Technique allows people to disclose risks and issues which they do not want to discuss in front of a group. |
|
Definition of Interviewing
|
AKA Expert interviewing
Consists of team or project manager interviewing project participants, stakeholders, or experts to identify risks on the project or a specific element of work. |
|
Root Cause Analysis
|
The identified risks are reorganized by their root causes to help identify more risks.
|
|
Funnel Analysis
|
A type of interviewing technique where we start with a general or high level questions and get into specific or particular questions.
|
|
Strengths, Weaknesses, Opportunities, and Threats (SWOT) Analysis
|
This analysis looks at the project to identify its strengths and weaknesses and thereby identify risks.
Strength and Weaknesses = Internal Opportunity and Threat = External |
|
Checklist Analysis
|
This technique looks at the checklist of risk categories that was discussed in Plan Risk Management. The checklist is used to help identify specific risks in each category.
A project manager gets the lowest level of risk of a completed similar project and it is used to create a checklist. |
|
Assumption Analysis
|
Analyzing what assumptions have been made on the project and whether they are valid may lead to the identification of more risks.
|
|
What is the output of identify risks?
|
Risk Register
|
|
What is included in Risk Register?
|
Lists of risks
List of potential responses Root causes of risks Updated risk categories |
|
What is the output of Qualitative Risk Analysis
|
Risk Register Updates
|
|
What is added to the risk register after Qualitative Risk Analysis?
|
Risk ranking for the project compared to other projects
List of prioritized risks and their probability of impact ratings Risk grouped by categories Lists of risks for additional analysis and response List of risks required additional analysis in the the near term Watch list (non critical and non-top risks) Trends |
|
What is qualitative analysis used for?
|
Compare the risk of the project to the overall risks of other projects.
Determine whether the project should be selected, continued or terminated Determine whether to proceed to the Perform Quantitative Analysis or Plan Risk Responses processes. |
|
What are tools used in the Perform Qualitative Risk Analysis Process?
|
Probability and Impact Matrix
Risk Data Quality Assessment Risk Categorization Risk Urgency Assessment |
|
What are the actions for quantitative risk analysis?
|
Further investigate the highest risks on the project
Determine the type of probability distribution that will be used (triangular, normal, beta, uniform, or log normal distributions) Perform sensitivity analysis to determine which risks have the most impact on the project Determine how much quantified risk the project has through expected monetary value analysis or Monte Carlo Analysis |
|
How do you determine Quantitative Probability and Impact?
|
Interviewing
Cost and time estimating Delphi Technique Use of historical records from previous projects Expert judgement Expected monetary value analysis Monte Carlo Analysis Decision Trees |
|
What is added to the risk register after Quantitative Risk Analysis?
|
Prioritized list of quantified risks
Amount of contingency time and cost reserves needed Possible realistic and achievable completion dates and project costs, with confidence levels, versus the time and cost objectives for the project The quantified probability of meeting project objectives Trends in quantitative risk analysis |
|
What are strategies for negative risks or threats?
|
Avoid
Transfer Mitigate Accept |
|
Definition of Avoid Risk
|
Eliminate the threat by eliminating the cause
|
|
Definition of Mitigate Risk
|
Reduce the probability or the impact of a threat, thereby making it a smaller risk and removing it from the list of top risk on the project.
|
|
Definition of Transfer Risk
|
Make another party responsible for the risk by purchasing insurance, performance bonds, warranties, or by outsourcing the work
|
|
Definition of Accept Negative Risk
|
Project team has decided not to change the project management plan to deal with a a risk, or is unable to identify any other suitable response strategy
Passive acceptance: Required no action except to document the strategy, leaving the project team to deal with the risks as they occur. Active acceptance: Establish a contingency reserve |
|
What are strategies for positive risks or opportunities?
|
Exploit
Share Enhance Accept |
|
Definition of Exploit Risk
|
Add work or change the project to make sure the opportunity occurs
|
|
Definition of Enhance Risk
|
Increase the likelihood and/or positive impacts of the risk event
|
|
Definition of Share Risk
|
Allocate ownership of the opportunity to a third part (Partnership, team or joint venture)
|
|
Definition of Accept Positive Risk
|
Accepting an opportunity is being willing to take advantage of it, if it comes along, but not actively pursuing it
|
|
What are outputs of Plan Risk Responses
|
Risk register updates
Project management plan updates Project document updates |
|
What is added to the risk register after Plan Risk Responses?
|
Residual risks
Contingency plans Risk response owners Secondary risks Risk triggers Contracts Fallback plans Reserves (Contingency) |
|
Definition of Residual Risks
|
Risks that remain after risk response planning
|
|
Definition of contingency plans
|
Plans describing the specific actions that will be taken if the opportunity of threat occurs
|
|
Definition of Risk response owners
|
Project manager assigns someone who may help develop the risk response and who will be assigned to carry out the risk response
|
|
Definition of Secondary risks
|
Any new risks created by the implementation of selected risk response strategies
|
|
Definition of Risk Triggers
|
Events that trigger the contingency response. Early warning signs for a risk.
|
|
Definition of Fallback plans
|
These are plans for specific actions that will be taken if the contingency plan is not effective
|
|
What is added to the risk register after Monitor and Control Risks?
|
Outcomes of the risk reassessments and risk audits
Updates to previous parts of risk management, including the identification of new risks Closing of risks that are no longer applicable eDetails of what happened when risks occurred Lessons learned |