Risk process , Project Management

Risk Process 

An organisation faces many risk related issues. To mitigate those risks we have risk management techniques. These steps assist an organisation to mitigate risk and control it. The risk policy defines the risk and assists an organisation to reach its objective. The actions that can lead to a problem can be investigated. For example: high risk of computer viruses could be mitigated by installing antivirus software. A good risk management plan should involve steps to: 

  • Control implementation  
  • Responsible persons for those actions. 

The risk process is as follows: 

Step 1: Identify risk 

  • Identification: In the process of identifying risk, Identification is the first step. Risks are events, the outcomes can cause problems. Therefore risk identification can start with the source of problems. It includes few analyses. 
  • They are as follows: 
  • Source Analysis: The sources for risk can be internal or external in an organisation. 
  • Problem Analysis: Risks involves threats. It may exist with various entities. For example threat of loosing money. 
  • Common risk identifications are: 
  • Objective-based risk: Every organisation has objectives to achieve. Any obstruction to achieve that partially or completely is identified as risk  
  • Scenario-based risk: Here different scenarios are created, any event that triggers an undesired scenario alternative is identified as risk 
  • Taxonomy-based risk: It is a breakdown of potential risk sources. Based on the classification and knowledge of best practices, a questionnaire is made, the answers to the questions reveal risks. 
  • Common-risk checking: In many industries the risk which is common already has a solution. Each risk in the list can be checked and a solution can be implemented for it. 
  • Risk charting: It is the combination of the above approaches. By listing resources at risk. Example one can begin with resources and consider the threats they are exposed to and the consequences of each.  
  • Some of the Risk Identification techniques include the following: 
  • Brainstorming, Questionnaires, Industry benchmarking, Scenario analysis, Risk assessment workshops, Incident investigation, Auditing and inspection, HAZOP (Hazard & Operability Studies). 

Risk can be identified for the opportunity which can be identified by Market survey, Prospecting, Test marketing, Research and Development and Business impact analysis.  

Risk which results  in threats can be identified through the following techniques:  

  •   Threat analysis 
  •    Fault tree analysis 
  •    FMEA (Failure Mode & Effect Analysis) 

Step 2:  Analyse risks 

  1. Assessment: The next step after identification of risk is the assessment of loss to likelihood of incidence. It is critical to make the best skilled guesses possible in order to properly prioritise the implementation of the risk management plan. One of the drawbacks of this is to analyse the rate of occurrence since statistical data in unavailable  for few past incidents.  
  2. Once risks have been identified and assessed, all techniques to manage the risk fall into four major categories. 
  3. Avoidance (eliminate, withdraw from or not become involved) 
  4. Reduction (optimise - mitigate) 
  5. Sharing (transfer - outsource or insure) 
  6. Retention (accept and budget) 

Step 3:  Evaluate risks 

?  Mapping out: It decides whether the risks are acceptable or unacceptable.  A risk that is resolute as acceptable should be monitored and regularly reviewed to make sure it remains acceptable.  A risk considered unacceptable should be treated. In all scenarios the reasons for the assessment should be acknowledged and recorded to provide a record of the thinking that led to the decisions.  Such records provide a useful background for future risk assessment.   

Mapping out the following: 

  •   Identity and objectives of stakeholders 
  •   Basis upon which risks will be evaluated, constraints. 

Step 4:  Monitor and report  

  1. Defining a framework:  The manager is required to monitor the efficiency of risk treatments and is accountable to identify new risks as they occur and treat them accordingly.  Managers are required to report on the development of risk treatments at regular intervals.  The person  responsible for risk management is expected to provide feedback on the growth of the project as explained in the „monitoring? field of the treatment. 
  2. Developing an analysis: Risks involved in analysing a project 
  3. Mitigation or solution: Risks using available technological, human and organisational resources.  
  4. Communication: Communicating risks to the right parties improves the capacity to respond to risks and also offsets the tendency to have an isolated view of risk within the team. It involves reporting the results of risk assessment, risk management plan, monitoring and review results to key stake holders: 

Communicating risks to the following members of the project: 

  1.   Customers 
  2.   Investors 
  3.   Management 
  4.   Project team 
  5.   Contractors 
Posted Date: 9/25/2012 7:24:29 AM | Location : United States







Related Discussions:- Risk process , Assignment Help, Ask Question on Risk process , Get Answer, Expert's Help, Risk process Discussions

Write discussion on Risk process
Your posts are moderated
Related Questions
What is dummy activity in job operation of a project? Dummy Activity: All projects consist of a number of job operations or tasks that are termed as activities. An activi

Influence of Organization culture on key dimensions of management

What are conflicts probable to arise between project managers and PPSO staff? PPSO (Project and Programme support office) staff can, when they are not careful or when they are

Aim The purpose of the Syringe management plan is to protect the social community against injury by syringe and help people manage syringe in proper manner. According to the re

Organisational Structures The project organisational structure facilitates coordination and implementation of project activities. It should be designed to include the essential

1. Some of the tasks in this project can be done in parallel. Prepare a diagram showing the required networks of tasks and define the ciritical path. What is the length of the proj

Solution-if I am the owner of the three coffee shops within a 50 mile radius, then I would adopt a de-centralized management model having self directed teams. This will help me in

Are the principal advantages and disadvantages of the sequential approach to system development offered through the waterfall and ‘V’ lifecycle models? The waterfall approach a

what is project management information software

The followings is a list of some of the common pitfalls to avoid if an organization is considering implementing quality by design: 1. Team members should be assigned to