Professional Documents
Culture Documents
• Project size.
• Project complexity
• Project importance
• Development approach.
PLAN RISK MANAGEMENT
• Reporting formats how the outcomes of the risk management processes will be documented, analyzed, and
communicated.
• Tracking how risk activities will be recorded and how risk management processes will be audited.
• Probability and impact matrix (Risks are prioritized according to their potential implications for having an
effect on the project’s objectives.
IDENTIFY RISKS
• The risk categories in the lowest level of the risk breakdown structure can
be used as a prompt list for individual project risks
Risk Register
Include
List of identified risks.
-the list of identified risks,
-The root causes of those risks
-the fundamental conditions of risks
• Update/add additional information to previous output i.e. Risk Register, which include:
• Relative ranking/priority
• Risk grouped by categories
• List of risk requiring additional analysis in the near term
• List of risk for additional analysis and response
• Watch-list (non-critical or non-top risks)
• Trends
• Cause of risk requiring particular attention
PERFORM QUANTITATIVE RISK
ANALYSIS
• • Interviewing. quantify the probability and impact of risks on project objectives. For instance,
information would be gathered on the optimistic (low), pessimistic (high), and most likely
scenarios for some commonly used distributions.
• Simulation
• A project simulation uses a model that translates the specified detailed
uncertainties of the project into their potential impact on project objectives.
Sensitivity Analysis
Decision Tree and EMV EMV = (Probability) (Impact)
• EMV used with Decision Tree to choose between many
alternative which take into account the future events
• Example:
EMV
On time 90%
=10% x $4000+$900
Airline A =$400+$900=$1300
Fare $900
Late 4,000 $
On time 70%
=30% x $4000+$300
Airline B
=$1200+$300 =$1500
Fare
$300
Late 4,000 $
Expected monetary value
Risk Register Updates
• Update/add additional information to previous output i.e. Risk Register, which include:
1-developing options
identifies appropriate ways to
2- selecting strategies
address overall project risk and
3- agreeing on actions to address
individual project risks
overall project risk exposure
11.5 PLAN RISK RESPONSES
Strategies For Threats
Strategies for Threats
1- Escelate
2- Avoid
• 4-Mitigate
• 5- Accept
• 1-Escelate
• 2-Exploit
• 3-Share
• 4-Enhance
❑ The enhance risk response strategy can be considered the opposite of the mitigation risk response
strategy, and the exploit risk response strategy can be considered the opposite of the avoid risk
response strategy.
❑ Summary
❑ Enhance and exploit are two kinds of positive risk response strategies. If the opportunity is not very
important or you don’t have any extra resources, you will use the enhance risk response strategy.
❑ However, if you have extra resources available or the opportunity is so important that you cannot let
go, you will use the exploit risk response strategy. The strategy chosen for the opportunity will depend
on the situation, requirements, and resources available to you.
Strategies for Opportunities
• 5-Accept
• Risk audits may be included during routine project review meetings or may
form part of a risk review meeting
Monitor Risk : Tools and Techniques
❑ MEETINGS:-
➢ Risk Reviews
✓ Examine and document the effectiveness of risk responses in dealing with overall project risk and with
identified individual project risks.
✓ identification of lessons to be learned for implementation in ongoing phases in the current project
or in similar projects in the future.
1-During which stage of Risk planning are risks prioritized based on
probability and -impact?
A-Identify Risks
B-List of risks.
C-Risk register
A- a risk register
B- a risk management plan
C- environment process assets
D- a risk impact matrix
5- Heba is a Project Manager for software migration at a bank. A major
risk that has been identified is attrition of resources. As a strategy to
respond to this risk, Heba, with support from Senior Management,
provides good increments to his team members. What type of risk
response is heba following?
A-Accept
B-Avoid
C-Transfer
D-Mitigate
6-Which of these is not a valid response to positive risks?
A-Exploit
B-Mitigate
C-Enhance
D-Share
7-After conducting a SWOT Analysis, you have determined that a
business deal is worth pursuing. You are required to use Agile
development practices. In your company, there is no expertise in Agile
development. Hence, you partner with another organization that
specializes in Agile development. This is an example of:
A-Risk identification
A- avoidance
B-acceptance
C- mitigation
4-transference
10-During which risk management process is a determination to transfer
a risk made?
A. Identify Risks.
+966 50 8739484