How good is the relationship with the sponsor or customer

Assignment Help Management Information Sys
Reference no: EM131302392

The Schwalbe (2016) text discusses five broad categories of risk on page 433-434; Market risk, Financial risk, Technology risk, People risk, and Structure/process risk. Consider the "What Went Wrong" example involving Comair on page 436. Discuss how a risk management approach that addressed each of the five broad risk categories might have allowed Comair to avoid big problems during the 2004 holidays.

What Went Wrong

KPMG, a large consulting firm, published a study in 1995 that found 55 percent of runaway projects (projects with significant cost or schedule overruns) did no risk management at all, 38 percent did some, and 7 percent were not sure whether they did risk management or not.9.
Even within the percentage that did some risk management, half did not use their risk findings after the project was under way. This study suggests that performing risk management is important to improving the likelihood of project success and preventing runaway projects.

The timing of risk management is also an important consideration. For example, Comair is a regional airline based in Cincinnati that operates in 117 cities and carries about 30,000 passengers on 1,130 flights a day. Comair's IT managers knew in the late 1990s that they had to address the replacement of an aging legacy system used to manage flight crews.

The application was one of the oldest in the company (11 years old at the time), written in Fortran (code that no one at Comair knew), and the only system left that ran on the airline's old IBM AIX platform. Although managers and crew addressed possible options for replacing the system, they kept putting it off as other priorities emerged. A replacement system was finally approved in 2004, but the switch didn't happen soon enough.

"Over the holidays, the legacy system failed, bringing down the entire airline, canceling or delaying 3,900 flights, and stranding nearly 200,000 passengers. The network crash cost Comair and its parent company, Delta Air Lines, $20 million, damaged the airline's reputation and prompted an investigation by the Department of Transportation." Had Comair or Delta acted sooner, it could have taken steps to mitigate the risk and avoid the disaster.

Page 433-434

discusses five broad categories of risk

The number of questions corresponding to each success criterion determines the number of points each positive response is assigned. For example, the topic of user involvement includes five questions. For each positive reply, you would get 3.8 (19/5) points; 19 represents the weight of the criterion, and 5 represents the number of questions. Therefore, you would assign a value to the user involvement criterion by adding 3.8 points to the score for each question you can answer positively.

Many organizations develop their own risk questionnaires. Broad categories of risks described on these questionnaires might include:
Market risk: If the IT project will create a new product or service, will it be useful to the organization or marketable to others? Will users accept and use the product or service? Will someone else create a better product or service faster, making the project a waste of time and money?

Financial risk: Can the organization afford to undertake the project? How confident are stakeholders in the financial projections? Will the project meet NPV, ROI, and payback estimates? If not, can the organization afford to continue the project? Is this project the best way to use the organization's financial resources?

Technology risk: Is the project technically feasible? Will it use mature, leading-edge, or bleeding-edge technologies? When will decisions be made on which technology to use? Will hardware, software, and networks function properly? Will the technology be available in time to meet project objectives? Could the technology be obsolete before a useful product can be created? You can also break down the technology risk category into hardware, software, and network technology, if desired.

People risk: Does the organization have people with appropriate skills to complete the project successfully? If not, can the organization find such people? Do people have the proper managerial and technical skills? Do they have enough experience? Does senior management support the project? Is there a project champion? Is the organization familiar with the sponsor or customer for the project? How good is the relationship with the sponsor or customer?

Structure/process risk: What degree of change will the new project introduce into user areas and business procedures? How many distinct user groups does the project need to satisfy? With how many other systems does the new project or system need to interact? Does the organization have processes in place to complete the project successfully?

Reference no: EM131302392

Questions Cloud

Discuss three ways author uses evidence to support assertion : Provide a brief summary of the argument presented in the article. Identify and discuss three ways the author uses evidence to support assertions.
Write a program that can encode and decode caesar ciphers : Expand your solution to the previous problem to allow the calculation of a complete name such as "John Marvin Zelle" or "John Jacob Jingleheimer Smith." The total value is just the sum of the numeric values of all the names.
What is the conversion ratio of the debenture : Maple Aircraft has issued a convertible subordinated debenture at 6.00% interest due 2020. The conversion price is $64.00 and the debenture is callable at 104.00% of face value. The market price of the convertible is 89.25% of face value, and the pri..
Identify one further implication of each of the arguments : Identify and discuss one further implication of each of those arguments. Assuming the author is "right," what sorts of claims or facts would follow from that argument?
How good is the relationship with the sponsor or customer : What degree of change will the new project introduce into user areas and business procedures? How many distinct user groups does the project need to satisfy? With how many other systems does the new project or system need to interact? Does the org..
Write a program to draw a quiz score histogram : For example, if 15 students got an 8, then the height of the bar for 8 should be 15. Hint: use a list that stores the count for each possible score.
Debt utilization and du pont system of analysis : Debt utilization and Du Pont system of analysis. Using the income statement for Times Mirror and Glass Co., compute the following ratios: TIMES MIRROR AND GLASS Co. Income Statement Sales $ 244,000 Cost of goods sold 135,000 Gross profit $ 109,000. C..
Deficiencies in performance : Identify basic causes for deficiencies in performance. Which of these deficiencies can be Improved or eliminated through training?
What is the purpose of parameters : In what ways are parameters similar to and different from ordinary variables?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Basic concepts of simple systemsdiscuss the basic concepts

basic concepts of simple systemsdiscuss the basic concepts of simple systems. identify 3 examples of simple

  Describe business uses for mobile/smart phone technologies.

Describe at least five business uses for mobile/smart phone technologies. Discuss at least four of the characteristics of m-commerce that makes it beneficial to businesses and consumers

  Value chain configuration is increasingly inadequate as a

value chain configuration is increasingly inadequate as a means to describe how an organization organizes and operates

  Describe the considerations that you would take into account

Imagine you have been asked to help a novice designer effectively organize his menu content in an application. Provide the novice designer with the advice you feel would be most helpful when organizing content for menus. Support your response.

  The answer to management information systemsif the project

the answer to management information systemsif the project team determines that the best alternative is to modify a

  Develop a business intelligence application

This capstone project requires students to employ the knowledge and skills assimilated in the prerequisite courses to design and develop a business intelligence application that leads to direct and measurable value for an organization.

  Major copyright issues faced by the entertainment industry

Major Copyright Issues Faced by the Entertainment Industry - Explain What are the major copyright issues faced by the entertainment industry,

  Explain about network architecture department

Network Architecture Department - The Network Architecture department must be focused on the networking technology required to support other organizational departments

  Difference between identification and authentication

Provide a definition of the following terms and expression. 2. What is the difference between Identification and Authentication? 3. rovide four examples of computer crime. 4. What are the key principles of Network Security?

  Identifying and analyzing network assets-security risks

Create a network security plan inclusive of identifying and analyzing network assets, security risks, security requirements, and security policy.Develop network management strategies to include resource monitoring and data collection and interpreta..

  Determine whether or not you believe the threat landscape

From the first e-Activity, explain from your perspective why hacktivism is a growing concern for companies and security professionals. Determine whether or not you believe the threat landscape is trending more toward targeted attacks and away fro..

  Define the various types of validity

Evaluating the Validity of Statements-Define the various types of validity and apply them to the movie selection

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd