Professional Documents
Culture Documents
Documentation reviews (examines the quality and consistency of the project documents,
along with the requirement)
Probably the 3 most common, and in this order
Brainstorming
Interviewing (aka Expert interviewing)
Delphi technique
Root cause analysis
Checklist analysis
Assumption Analysis
Diagramming techniques
SWOT analysis (Strengths, Weaknesses, Opportunities, and Threats)
Expert Judgement
Mitigation
Risk mitigation is a risk response strategy whereby the project team acts to reduce the probability
of occurrence or impact of a risk. It implies a reduction in the probability and/or impact of an
adverse risk to be within acceptable threshold limits.” (PMBOK guide, Fifth Edition, p345).
It means taking action to reduce the likelihood and/or the impact of an identified risk.
Transference
“Risk transference is a risk response strategy whereby the project team shifts the impact
of a threat to a third party, together with ownership of the response. Transferring the risk
simply gives another party responsibility for its management—it does not eliminate it.”
(PMBOK guide, Fifth Edition, p343).
This usually means paying someone to take the risk on your behal
Acceptance
Risk acceptance is a risk response strategy whereby the project team decides to
acknowledge the risk and not take any action unless the risk occurs.
There’s virtually no chance of it happening (e.g. a major earthquake in London), or
The impact would be negligible,
It is too expensive to deal with (e.g. the cost of insurance may be more than the impact of
the risk event), or
You simply have no idea what you would do
After analysing the scenario where a threat is identified with one of the platforms but later is
recommended that device which is incompatible to be removed from the project. This truly
reflect that the organization has respond the risk by eliminating all the risk involved in it.
Because it will be best practice to use existing technologies rather than adopt new
techniques mentioned. Also, as mentioned in the scenario that Window Phones only occupy
0.7% of total market so it will be a better idea for focusing on rest of the client than spend
resources on mitigating that risk.