How good is the relationship with the sponsor or customer

Assignment Help Management Information Sys
Reference no: EM131302392

The Schwalbe (2016) text discusses five broad categories of risk on page 433-434; Market risk, Financial risk, Technology risk, People risk, and Structure/process risk. Consider the "What Went Wrong" example involving Comair on page 436. Discuss how a risk management approach that addressed each of the five broad risk categories might have allowed Comair to avoid big problems during the 2004 holidays.

What Went Wrong

KPMG, a large consulting firm, published a study in 1995 that found 55 percent of runaway projects (projects with significant cost or schedule overruns) did no risk management at all, 38 percent did some, and 7 percent were not sure whether they did risk management or not.9.
Even within the percentage that did some risk management, half did not use their risk findings after the project was under way. This study suggests that performing risk management is important to improving the likelihood of project success and preventing runaway projects.

The timing of risk management is also an important consideration. For example, Comair is a regional airline based in Cincinnati that operates in 117 cities and carries about 30,000 passengers on 1,130 flights a day. Comair's IT managers knew in the late 1990s that they had to address the replacement of an aging legacy system used to manage flight crews.

The application was one of the oldest in the company (11 years old at the time), written in Fortran (code that no one at Comair knew), and the only system left that ran on the airline's old IBM AIX platform. Although managers and crew addressed possible options for replacing the system, they kept putting it off as other priorities emerged. A replacement system was finally approved in 2004, but the switch didn't happen soon enough.

"Over the holidays, the legacy system failed, bringing down the entire airline, canceling or delaying 3,900 flights, and stranding nearly 200,000 passengers. The network crash cost Comair and its parent company, Delta Air Lines, $20 million, damaged the airline's reputation and prompted an investigation by the Department of Transportation." Had Comair or Delta acted sooner, it could have taken steps to mitigate the risk and avoid the disaster.

Page 433-434

discusses five broad categories of risk

The number of questions corresponding to each success criterion determines the number of points each positive response is assigned. For example, the topic of user involvement includes five questions. For each positive reply, you would get 3.8 (19/5) points; 19 represents the weight of the criterion, and 5 represents the number of questions. Therefore, you would assign a value to the user involvement criterion by adding 3.8 points to the score for each question you can answer positively.

Many organizations develop their own risk questionnaires. Broad categories of risks described on these questionnaires might include:
Market risk: If the IT project will create a new product or service, will it be useful to the organization or marketable to others? Will users accept and use the product or service? Will someone else create a better product or service faster, making the project a waste of time and money?

Financial risk: Can the organization afford to undertake the project? How confident are stakeholders in the financial projections? Will the project meet NPV, ROI, and payback estimates? If not, can the organization afford to continue the project? Is this project the best way to use the organization's financial resources?

Technology risk: Is the project technically feasible? Will it use mature, leading-edge, or bleeding-edge technologies? When will decisions be made on which technology to use? Will hardware, software, and networks function properly? Will the technology be available in time to meet project objectives? Could the technology be obsolete before a useful product can be created? You can also break down the technology risk category into hardware, software, and network technology, if desired.

People risk: Does the organization have people with appropriate skills to complete the project successfully? If not, can the organization find such people? Do people have the proper managerial and technical skills? Do they have enough experience? Does senior management support the project? Is there a project champion? Is the organization familiar with the sponsor or customer for the project? How good is the relationship with the sponsor or customer?

Structure/process risk: What degree of change will the new project introduce into user areas and business procedures? How many distinct user groups does the project need to satisfy? With how many other systems does the new project or system need to interact? Does the organization have processes in place to complete the project successfully?

Reference no: EM131302392

Questions Cloud

Discuss three ways author uses evidence to support assertion : Provide a brief summary of the argument presented in the article. Identify and discuss three ways the author uses evidence to support assertions.
Write a program that can encode and decode caesar ciphers : Expand your solution to the previous problem to allow the calculation of a complete name such as "John Marvin Zelle" or "John Jacob Jingleheimer Smith." The total value is just the sum of the numeric values of all the names.
What is the conversion ratio of the debenture : Maple Aircraft has issued a convertible subordinated debenture at 6.00% interest due 2020. The conversion price is $64.00 and the debenture is callable at 104.00% of face value. The market price of the convertible is 89.25% of face value, and the pri..
Identify one further implication of each of the arguments : Identify and discuss one further implication of each of those arguments. Assuming the author is "right," what sorts of claims or facts would follow from that argument?
How good is the relationship with the sponsor or customer : What degree of change will the new project introduce into user areas and business procedures? How many distinct user groups does the project need to satisfy? With how many other systems does the new project or system need to interact? Does the org..
Write a program to draw a quiz score histogram : For example, if 15 students got an 8, then the height of the bar for 8 should be 15. Hint: use a list that stores the count for each possible score.
Debt utilization and du pont system of analysis : Debt utilization and Du Pont system of analysis. Using the income statement for Times Mirror and Glass Co., compute the following ratios: TIMES MIRROR AND GLASS Co. Income Statement Sales $ 244,000 Cost of goods sold 135,000 Gross profit $ 109,000. C..
Deficiencies in performance : Identify basic causes for deficiencies in performance. Which of these deficiencies can be Improved or eliminated through training?
What is the purpose of parameters : In what ways are parameters similar to and different from ordinary variables?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are consequences of someone entering an incorrect rule

What are the consequences of someone entering an incorrect rule? Offer both mundane and drastic examples. Considering your answer to part b, if you managed the reservation system at THL.

  Explain how to maintain database integrity

How to maintain Database Integrity - Explain how database integrity can be maintained

  Company''s information system resources

What techniques can be used to prevent unauthorized access to the company's information system resources?

  Describe in detail how this organization manages components

What personal knowledge management tools does this organization utilize? What steps has this organization taken in securing their information and knowledge? What has this organization done to gain and sustain an advantage over their competitors?

  How they differ based on organizational requirements

Types of networks, how they differ based on organizational requirements, interconnected devices and geographical area served - Identify PROS and CONS

  Improve and maintain effective security management

The best tools to improve and maintain effective security management operations do not necessarily involve the latest, most expensive commercial products or overly-complex systems

  Define the elements of establishing e-procurement

Define the elements of establishing E-Procurement with the commodity supplier. Identify the challenges of implementing and maintaining an E-Procurement system and recommend mitigation actions.

  What factors should be weighed in the creation of a new

what factors should be weighed in the creation of a new ais?when we are considering the creation of a new system what

  Need for information systems competitive edge in leading

need for information systems competitive edge in leading retailersit is believed that the competitive edge of leading

  Evaluate quality of each in terms of read and write speed

From the second e-Activity, identify the make and model of one (1) laser printer and one (1) inkjet printer that are similarly priced. Evaluate the quality of each in terms of print speed (i.e., pages per minute), resolution (i.e., dots per inch),..

  Erp and geshifting to erp we are basically saying that we

erp and geshifting to erp we are basically saying that we can plan for an entire enterprise.so for example companies

  Prepare an executive summary document to board of directors

You will need to prepare an executive summary document (1 page maximum) to the board of directors

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd