Question

List five Risk identification methods Explain three of the listed techniques(methods) as they are used. Explain...

List five Risk identification methods

Explain three of the listed techniques(methods) as they are used.

Explain four basic types of Risk response

Give examples of one each that can be used for negative Risk and Positive Risks

Homework Answers

Answer #1

ANS. Five identification methods to identify risks are as follows:-

1.Interviewing

An interview is conducted with project participants, stakeholders, experts, etc to identify risks.

2.Brainstorming

Brainstorming is done with a group of people who focus on identification of risk for the project.

3.Checklists

4.Assumption Analysis

5.Cause and effect diagrams

Explaination

1. Interviews:- Select key stakeholders. Plan the interviews. Define specific questions. Document the results of the interview.

2. Brainstorming:- Plan your brainstorming questions in advance.

  • Project objectives. What are the most significant risks related to [project objective where the objective may be schedule, budget, quality, or scope]?
  • Project tasks. What are the most significant risks related to [tasks such as requirements, coding, testing, training, implementation]?

3. Checklists:- See if your company has a list of the most common risks. If not, you may want to create such a list. After each project, conduct a post review where you capture the most significant risks. This list may be used for subsequent projects. Warning – checklists are great, but no checklist contains all the risks.

4. Assumption Analysis. The Project Management Body of Knowledge (PMBOK) defines an assumption as “factors that are considered to be true, real, or certain without proof or demonstration.” Assumptions are sources of risks. Project managers should ask stakeholders, “What assumptions do you have concerning this project?” Furthermore, document these assumptions and associated risks.

5.Cause and Effect Diagrams. Cause and Effect diagrams are powerful. Project managers can use this simple method to help identify causes--facts that give rise to risks. And if we address the causes, we can reduce or eliminate the risks.

Four basic types of risk responses are:-

1. Avoid

Avoiding a risk means to completely eliminate it. Not all risks can be eliminated, and some can only be eliminated at great cost, so you’ll want to analyze the costs and benefits of eliminating a given risk. Only then can you decide whether it’s worth the time, money, and effort.

2.Transfer

Transferring risk involves shifting the risk to some other entity, such as an insurance company. We do this all the time when we pay insurance premiums—paying a small amount each month and collectively absorbing risk for the unlucky few who need to file a claim. In all likelihood, you won’t need to use your insurance in any given year. However, if a costly accident does occur, that accident won’t bankrupt you.

3. Mitigate

The most common strategy for handling risk is to reduce that risk to an acceptable level. Since completely eliminating risk is often impossible or too costly, risk-mitigation is a key strategy for most project managers.

4. Accept

After analyzing all the variables, you’ll inevitably decide to simply accept some risks. In certain cases, the potential impact may be so small that it’s negligible. In other cases, the risk may be so low that it doesn’t make sense to spend money trying to avoid or mitigate it.

Whatever the case, make sure your executive sponsors sign off on any risk acceptance. You want to make sure they know you anticipated the risks and considered strategies for avoidance, transfer, or mitigation before going down the acceptance route.

Example about the positive risk: ending project before delivering date, or increasing the return on investment ROI.

Example about the negative risk: Delays in the delivery of the project or passing to the planned costs or anything else could affect the objectives of the project is considered a negative risk or “threat.”

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
The Tools and Techniques for Risk identification are as follow: Expert Judgement Data Gathering Brainstorming, (Ex.:...
The Tools and Techniques for Risk identification are as follow: Expert Judgement Data Gathering Brainstorming, (Ex.: Delphi approach, Nominal group technique, etc) Checklists Interviews Data Analysis Root Cause Analysis (includes: Fishbone technique) Assumptions and constraint analysis SWOT analysis Document analysis (Ex: Historical records) Interpersonal and team skills facilitation Prompt List Meetings Are there any other methods not listed that you have seen used for risk identification?
List and explain four specific tools or techniques that are used by the marketing and information...
List and explain four specific tools or techniques that are used by the marketing and information systems disciplines to perform a company's case analysis. Must contain between 350 – 500 words.
Explain the difference between systematic and unsystematic risk, and why one of these types of risks...
Explain the difference between systematic and unsystematic risk, and why one of these types of risks is rewarded with a risk premium while the other type is not. Give some examples for systematic and unsystematic risk.
List the three types of functional joints and two examples of each. Please explain how each...
List the three types of functional joints and two examples of each. Please explain how each functional joints moves or does not move and give two or more examples of each. Take a picture of your drawing and upload it.
What are the typical techniques used by organizations to retain good employees? List at least 3...
What are the typical techniques used by organizations to retain good employees? List at least 3 techniques. Then explain each in detail. Which one(s) do you believe work best in today's workplace?
8. a. Give the three main groups of Satellites and explain each? b. List 10 types...
8. a. Give the three main groups of Satellites and explain each? b. List 10 types of Oceanographic instrumentations used at sea?
5. What are the three commonly used procurement methods? Give one or two daily examples for...
5. What are the three commonly used procurement methods? Give one or two daily examples for each method. 6. Give your own reasons that why logistics emerges from military logistics management. 7. Which major task do you think is more important in production management? 8. Explain how ABC inventory control works.
Explain how the following techniques can be used to manage exchange rate risk? i. Doing Nothing...
Explain how the following techniques can be used to manage exchange rate risk? i. Doing Nothing ii. Leading and Lagging
You are the project manager for an upgrade of computers in your company. You need to...
You are the project manager for an upgrade of computers in your company. You need to upgrade 30 systems, including 10 desktops (for office personnel) and 20 laptops (for remote workers). Each system must access the company network, as well as a common installation of software, security components, and so forth. You must submit your risk identification in a summary that will be used during a presentation for the CIO. In a 3–5 page document, complete the following: Identify four...
List and explain three models of incarceration that have been prominent during the past five decades....
List and explain three models of incarceration that have been prominent during the past five decades. Also, be sure to identify what time period each model was most strongly advocated. Which model is most frequently used today and why?
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT
Active Questions
  • Despite guidelines regulating eligibility for special education services, today’s special education classrooms continue to be over   populated...
    asked 10 minutes ago
  • A. Find the sum 3+8+13+...+28 B.  Find the first term and the common difference of the arithmetic...
    asked 13 minutes ago
  • Explain why in a multiplier model a rise in household wealth relative to target will ceteris...
    asked 33 minutes ago
  • What political and economic roles have Japan and the United States played in Southeast Asia in...
    asked 36 minutes ago
  • What does the function split do? Explain with an example. ​ ​ def split(L, first): return...
    asked 37 minutes ago
  • Code a simple Editor class with 2 constructors (one default, one with a string for a...
    asked 53 minutes ago
  • Using a greedy algorithm solve the following instance of Interval Scheduling {(2,12),(1,7),(3,5),(8,10),(7,14),(9,16),(10,14),(12,13),(17,22),(13,14),(15,20),(14,18),(20,30),(22,25),(26,27),(25,29),(24,31)}
    asked 58 minutes ago
  • * Write a Java program that calculates and displays the Fibonacci numbers * First prompt the...
    asked 1 hour ago
  • Brownie Company sponsors a defined benefit pension plan for its employees. On January1, 2020, the following...
    asked 1 hour ago
  • A new muscle relaxant is available. Researchers from the firm developing the relaxant have done studies...
    asked 1 hour ago
  • consider the information about the economy of Pakistan note that the currency of Pakistan is the...
    asked 1 hour ago
  • You arrive at your car and find that your meter has expired and you have gotten...
    asked 2 hours ago