Describe the delphi technique used to identify risks

Assignment Help Risk Management
Reference no: EM13753379

Utilizing the Delphi technique, your team constructed the following risks register the VoIP project containing the risk, the likelihood of its occurrence on a scale of 1 (least likely) to 5 (most likely), and the potential negative impact on the project on the same scale. In addition, they recommended the appropriate response and identified its type for one of the risks identified.

Write a three to five (3-5) page paper in which you:

Explain risk management and its associated activities and defend the need for a risk management plan.

Describe the Delphi technique used to identify risks and infer on types of projects where this technique is most accurate.

Examine the four (4) types of risk response (i.e., avoidance, acceptance, transference, and mitigation) and determine the appropriate situation where each should be used.

Complete the table with the risk response type (i.e., avoidance, acceptance, transference, and mitigation) and a description of the response.

Create a decision tree with the software of your choice to address risk number 6. Assume that when you check the schedule on day 60 of the project, it becomes evident that two (2) additional engineers are needed to ensure on-time completion of the project. The engineers cost $25,000 each and a fee of $120,000 is issued by the legacy provider. The probability of completing the project on time is as follows:

With the current personnel - 60%; With one (1) engineer - 80%; With both engineers - 98%.

Explain the methodology utilized to create a decision tree and recommend the appropriate action to take based on your decision tree from criterion 5.

Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13753379

Information assets to be evaluated for risk management

If an organization has three information assets to be evaluated for risk management, as shown in the data below, which vulnerability should be evaluated for additional contr

Explain the role of each agency

Identify the crisis and the federal agency(ies) and / or organization(s) that might be involved in helping to mitigate this crisis. Explain the role(s) of each agency that w

How will you leverage partnerships

What are the means available to you to launch a new venture? These means include who you are (values, attributes), what you know (knowledge, skills), whom you know (networks

Way in which the malware was utilized to steal data

From the selected e-Activity article, describe in detail the way in which the malware was utilized to steal data or gain privileged remote access to a computer or network

Explain the relationship between risk and loss

It is an accepted truth that without risk there can be no gain. Every individual and organization who wants to succeed must take some risks. Explain the relationship between

What is the maximum amount of money

What is the monetary certainty equivalent for the following gamble: gain $130 with probability 0.4, lose $320 with probability 0.6 - what is the risk premium in explain the co

Risk factors invest in international vs domnesatic company

Risk Factors invest in International vs domnesatic company-Determine the most significant risk factors associated with investing in a foreign traded company as compared with

Different approaches to assigning probabilities

Consider the different approaches to assigning probabilities to "acts of God." Which of the approaches will you be most inclined to choose and why? Which of those approaches


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd