Friday, June 7, 2019
Final - Project and Program Risk Management Essay Example for Free
Final Project and Program Risk Management EssayThis type of management may take on an informal or formal approach, but risk management is essential for every project. Risk Management is not a well accepted mensuration practice since it points out negative aspects of projects, and there are numerous inhibitions that restrain the dynamics of risk management. According to the Wikipedia, a free web-based encyclopedia, the Project Management set up (PMI) is a non-profit master organization with the purpose of advancing the state-of-the-art of project management. The company is a professional association for the project management profession. The PMI sets standards, conducts research, and provides education and professional exchange opportunities designed to strengthen and further establish professionalism. The Project Management Institute, Inc. (PMI() has established a six-step set of workes and practices for the risk management process as record below 1. Risk Management Plannin g project risk infrastructure is established and a project-specific risk management plan is generated. 2. Risk Identification events with potentially positive and negative impacts are clearly described. 3.Risk Qualifications risks are evaluated according to nonnumeric assessment protocols. 4. Risk Quantifications risks are evaluated according to numeric assessment protocols. 5. Risk reaction Planning strategies to deal with or precluded risks are evaluated and communicated. 6. Risk Monitoring and control risk management and response plans are put into action. b) Why do professionals sanction Risk Management? Professionals mandate Risk Management in organizations since risk sometimes becomes a secondary issue. This secondary issue occurs since the hope that Project Managers depart be able to handle issues and problems as they occur.Since risk remains a secondary issue until an organizations luck runs out or a profitable opportunity is missed, professionals take a more proactive app roach to risk identification and mitigation by mounting Risk Management Process and Practices. found on statistical information, unfavorable risk events eventually occur in good projects without a way to identify and mitigate risk. The Project Manager suffers the repercussions of such(prenominal) type of failure therefore, professionals mandate Risk Management and support its practices in effort to mitigate risk. . Explain the Delphi Technique and steps for effective application. a) Explain the Delphi Technique. When honest interview techniques are not an option, the Delphi Technique provides an alternate means for extracting information from subject matter experts (SMEs) without pressuring or forcing them to provide much needed information. Many SMEs favour not to participate in entropy-gathering processes therefore, the project manager (facilitator) applies the Delphi technique to collect information directly from the SMEs without infringing on their schedules.This technique allows the facilitator with directed follow-up capability from experts after(prenominal) peers have been consulted so the highest quality of information is extracted from the experts. b) Steps for Effective Application. To obtain effective information from the Delphi Technique, the Project Manager must posses the ability to generate the master marvels to present to the experts and to clarify the information from the experts as it is received.The following six (6) major steps will increase the chances of a successful technique application 1) put experts and ensure their participation 2) Create the Delphi instrument 3) Have the experts respond on the instrument 4) Review and restate the responses 5) Gather the experts opinions and repeat 6) Distribute and apply the data The Delphi technique is a time-consuming process, but this technique is promising in extracting information from experts who might not otherwise contribute to a projects body of knowledge. 3.Explain the Crawford Sli p Method (CSM). The Crawford Slip Method (CSM) is a classic tool used to combat the negativism inherent in team up members while attempting to identify risk and risk information-gathering for a particular product or process. CSM offers a variety of advantages over other information-gathering techniques, in particular, the ability to aggregative large volumes of information in a very short time period and the complete avoidance of groupthink. CSM is not the hardest risk management technique to apply when properly facilitated.A clearly established question is defined by the facilitator and provided to all qualified participants. The participants then document their response to the clearly established question on a slip of report. Providing the same clearly established question to the participants again, they document their response to the question on a slip of paper again. This process is repeated ten (10) times using the same clearly established question to better extract all of t he unknown information available from the participants compound in the product or process.The initial slips of paper are usually very similar in content however, as the process repeats itself, the later slips of paper tend to generate identification of issues and risks that could have been overlooked without repetition. The strength of Crawford Slip Method is efficiency. 4. Define SWOT abstract and their selection criteria. a) Define SWOT Analysis. Strengths, Weaknesses, Opportunities, and Threats (SWOT) Analysis Technique is a directed risk analysis that identifies risks and opportunities within a higher-level organizational context rather than a projects narrow vacuum.