Assignment 1 Project Risk Managemnt
Assignment 1 Project Risk Managemnt
Please complete Section A and Section B below and attach the cover page to the front of your assignment
SECTION A: STUDENT AND ASSIGNMENT DETAILS (Please complete the details below in full)
Student number
139740
Title
Mr
Surname
Nthoba
Paballo Abram
First name/s
PGDPM
Programme
Intake
JULY 2019
Module
Project Risk Management
Facilitator
Examination venue
Kimberley
First submission TICK X
Submission type
Re- submission TICK
Submission date
05/08/2019
09 Duvenhage street
Postal address
New Park
Kimberley
Work
079 965 6313
Home
Contact 083 5372973
details
Cell
079 9656313
Email
[email protected]
1
SECTION B: DECLARATION (Please ensure you sign the declaration prior to submission of the assignment)
I hereby declare that this assignment submitted is an original piece of work produced by myself.
2
Table of Content
6. reference
3
Question 1.1
As a competent project manager provide advice on how the risks for the project
could have been managed by making mention of the risk management process.
Feedback:
The aim of the Risk Management Process (RMP) is to foresee events that could go
wrong in the PLC and make a decision on what action should be undertaken to
avoid, correct or eliminate the problem (Young, 2013).
Risk is part of the planning makeup. When we start the planning process for any
project, one of the first things we must think about is: what can go wrong in this
project that we need to take precautions measures for it.
Project risk management is the process of identifying, analysing and then responding
to any risk that arises over the life cycle of a project to help the project remain on
track and meet its goal. Risk management isn’t reactive only; it should be part of the
planning process to figure out risk that might happen in the project and how to
control that risk if it in fact occurs.
A risk is anything that could potentially impact your project’s timeline, performance or
budget. Risks are potentialities, and in a project management context, if they
become realities, they then become classified as “issues” that must be addressed.
So risk management, then, is the process of identifying, categorizing, prioritizing and
planning for risks before they become issues.
the risk management involves the identification, assessment, control, and response
to project risks in order to minimize the likelihood of occurrence and or potential
impact of adverse event on the accomplishment of the project objectives (PMI,
20017; 395).
• Identification - the team will uncover, recognize and describe risks that might
affect the project or its objectives. This is done by anticipating what could go
wrong and then deciding what should be done to correct, prevent or eliminate
the risk from occurring (Maylor, 2010). In identifying risks in projects, various
4
techniques such as interviews, questionnaires, brainstorming and bench
marking can be used.
• Assessment - During this step, the team will estimate the probability and
fallout of each risk to decide where to focus first. Factors such as potential
financial loss to the organization, time lost, and severity of impact all play a
part in accurately analyzing each risk. In putting each risk under the
microscope, we will also uncover any common issues across a project and
further refine the risk management process for future projects. Risk
assessment is the process of analyzing carried out after the risks have been
identified in the identification stage. According to Kerzner, risk assessment is
the process that involves analysis of the collected data (Kerzner, 2003). The
analysis of data involves two methods known as qualitative and quantitative.
Qualitative methods are most applicable to non-numerical data which is
usually placed on a descriptive scale with the ranges of high to low level. This
involves evaluating key characteristics of individual risks so that they can be
prioritized for further action (Hilson, 2009).
• Response - Risk response is about considering options for treating risks that
were not considered acceptable or tolerable. Risk treatment involves
identifying options for treating or controlling risk, in order to either reduce or
eliminate negative consequences, or to reduce the likelihood of an adverse
occurrence. Risk treatment should also aim to enhance positive outcomes.
• Control risk - Clear communication among the team and stakeholders is and
will be essential when it comes to ongoing monitoring of potential threats.
Risk management is a process that allows individual risk events and overall risk to
be understood and managed proactively, optimising success by minimising threats
and maximising opportunities APM (2006).
The high-level process, as illustrated in figure below starts with an initiation step that
defines the scope and objectives of risk management. A key output from the initiation
step is the risk management plan, which details how risk will be managed throughout
the life cycle (APM 2006).
5
Project management is usually focused on cost and schedule, and delivering
projects “on time, on budget” sometimes feels like the only criteria.
But as a project manager, there’s nothing that makes you sleep at night better than
knowing you’ve got the risks to your project under control and that the required
stakeholders know about them
2. Identify Risks
7. Monitor Risks
Question 1.2
Expect judgement techniques are applicable not only for risk identification, but also
for the forecasting and decision making. Two expect judgment techniques are Delhi
method and the nominal group technique.
6
Judgment provided by those people with expertise in appropriate project area is
utilized at various stages of project phase in order to do effective project
management. Their expertise is used to analyze historical information, define &
ensure appropriate standards, get various suggestions/advice, evaluate different
options, determine best suited options ( Babou; October 26, 2009 article ).
The Delphi technique helps reduce bias in the data and keeps any one person from
having undue influence on the outcome ( Cynthia Snyder Stackpole, 2nd edition
PMP September 2013, ) .
1. Describe the project or the aspect of the project you want to identify risks for.
4. The facilitator compiles information returned from the experts, filtering out
irrelevant content and content that can lead to loss of anonymity.
5. The facilitator sends out the compiled and cleaned responses to the
questionnaire for the experts to comment on. They can comment on individual
observations or on the observations of the group as a whole. As a result of the
comment process, people may want to modify their input.
6. Several iterations of the analysis, response, and discussion take place until
consensus is reached or until there is no more movement on the outcome.
7
Reference to the facts of our case, I have considered the below mentioned
advantaged and disadvantages that are applicable to the case. the team of expert in
this case includes engineering firm URS, safety personnel, staff from center for
disease control, the U.S Army chemical material Agency and other URS Chemical
demilitarization sites across the country.
Advantage
A. The Delphi technique allows experts to interact without much of the costs and
psychological distortions of face-to-face meetings. It uses postal
questionnaires and controlled feedback. It may sometimes help in obtaining a
crude idea of other experts' expectations of, say, the impact of a project or
other development.
B. The main advantage of the Delphi Method comes in achieving consensus in
areas of uncertainty or in situations lacking in causation (Powell, 2003). This
is particularly true in the case of studies that focus on topics where multiple
stakeholder groups are potentially involved. The Gjoligaj (2015) and Rivera
(2013) dissertations provide typical examples, as does the Joyner and Smith
(2015) study.
C. Freedom of expression
Freedom of expression is a direct result of the anonymity required in all Delphi
panels. It gives panel members considerable latitude in presenting their
opinions and potentially offers different perspectives to others without fear of
criticism (de Villiers, de Villiers, & Kent, 2005).
D. Knowledge sharing
One area not often mentioned in regard to Delphi designs centers on the
ability of different disciplines to share knowledge and stimulate new ideas that
apply to the purpose of the panel (Pill,1971) and which can broaden the
knowledge base of other panel members.
8
Disadvantages
Researcher bias
Given the extraordinary authority and influence of the researcher in the process, bias
may creep into the process, even unintentionally (Linstone & Turoff, 2002). The
temptation for a researcher to select panel members with known positions on the
problem is another way a researcher can exert bias.
Although the Delphin method is more relevant and applicable to this fact of our
project, I also considered some few advantages and disadvantages that are relevant
to the case.
But firstly, lets look at the content of the method in details. Nominal group technique
(NGT) is defined as a structured method for group brainstorming that encourages
contributions from everyone. Team members begin by writing down their ideas, then
selecting which idea they feel is best. Once team members are ready, everyone
presents their favorite idea, and the suggestions are then discussed and prioritized
by the entire group. In our case the team establishment is from one firm of engineers
URS, which has an immense number of expert for this kind of project within.
9
Advantages of NTG Applicable to our case:
One of the main advantages of nominal group technique is that it gives all the group
members an equal opportunity to speak out their minds. Also, some group members
are quite and shy, this method helps them to write down their ideas and discuss with
the group members. The major disadvantage is that this technique consumes a lot of
time to arrive to a final conclusion and also only one problem can be addressed at a
time.
Disadvantage of NTG
A major disadvantage of NGT is that the method lacks flexibility by being able to deal
with only one problem at a time. Also, there must be a certain amount of conformity
on the part of the members involved in NGT. Everyone must feel comfortable with
the amount of structure involved. Another disadvantage is the amount of time
needed to prepare for the activity. There is no spontaneity involved with this method.
Facilities must be arranged and carefully planned. Opinions may not converge in the
voting process, cross-fertilization of ideas may be constrained, and the process may
appear to be too mechanical.
One of the key issues about 'nominal' group technique is that it does not depend on
normal group processes. It is a method to work with a collection of people and
involve them in decision making but does not depend on normal group processes.
This is according to the originators an advantage in decision making using this tool.
10
Section B
Question 2.1
Discuss the 10 golden rules of project risk management using a project of your
choice
During our planning and design stages or our roads and stormwater project, is
to ensure that the risk management is part of the project because no project
runs to its successful end without encountering some faulty approaches and
problems on its way. Managing a project without proper risk management
may leads to the late identification of threats which can bring your projects
faster to its end, but towards the opposite side. Make risk management a part
of your project will help you minimize the probability of encountering problems
and recover from any accidentally shut-down quickly. When dealing with
projects of such nature especially in volatile communities, lots of challenges
arise as the results of strikes and lack of materials within the community
boundaries.
After establishing the risk management context, the next stage involves
identifying all the potential risks that could occur during the project
implementation stages. This is done by anticipating what could go wrong and
11
then deciding what should be done to correct, prevent or eliminate the risk
from occurring (Maylor, 2010). Risk identification, is undertaken using the
information gained from the process of establishing the context. Key
questions that may assist in risk identification are:
• When, where, why and how the risks are likely to occur?
(Berg, 2010)
Based on the urgent matter to be discussed before the sitting of the meeting,
the project manager will circulate the urgent matter through memos, email and
formal letters to all the team members including the stakeholders.
12
purely on the negative risks. The project manager will also will be assigned to
consider project opportunities though, especially as some may result in a
sizeable reward but require only a limited investment in time and resources (
Advertorial September 18, 2014 11:44 BST).
We then assign a risk owner for each risk by name. during the meetings and
through technological discussion we then assign relevant personnel to related
matters. This approach makes it easier for project manager to manage risks
by assigning certain risks to certain people. It also helps to manage progress
on mitigating the problem within time frames. This means for each risk found
you will assign it to one person in your team to optimize this risk to the project.
For example, most construction projects are faces with three risk during
construction especially if the unforeseen were not identified or detected during
the design stages. which is time, cost and resource.
13
Dealing with risks takes the form of either risk avoidance, risk minimisation or
risk acceptance (Advertorial September 18, 2014 11:44 BST). Avoiding risk
means you adopt measures that result in your project no longer facing a
specific risk, such as changing supplier, or in extreme cases, terminating a
project if the risk is deemed to be fatal to its success. Risk minimisation is the
most widely used response and revolves around trying to prevent a risk
occurring by influencing the identified causes or decreasing the negative
effects if it were to occur. Risk acceptance is an option that remains beneficial
in situations where a risk's effects on a project are minimal or it is difficult and
uneconomical to try and influence it.Responses for risk opportunities differ
from responses to risk threats in that they actively seek risks, either
maximising or ignoring them.
During the project plan, the team will creat and maintain a risk log that
enables the project leader to keep a complete record of all risks and track the
progress of each one.
An effective risk log will then contain risk descriptions, stipulates ownership
and allows the team to perform high level analyses regarding causes and
effects. The importance of a risk audit trail cannot be overestimated because
even if a risk proves terminal for a project, it will be provide irrefutable
evidence that risks were accounted for and that effective responses were
executed.
Then all the are recorded in risk register which was developed before the
project starts, this help the project team and stakeholders to track risks and
their associated tasks. Tracking tasks is a day-to-day job for project manager.
Integrating risk tasks into that daily routine is a profitable to any project. Risk
tasks may be carried out to identify or analyze risks or to generate, select and
implement responses.
14
Tracking risks differs from tracking tasks. It focuses on the current situation of
risks. Which risks are more likely to happen? Has the relative importance of
risks changed?
Question 2.2
Choose 3 techniques for risk identification and discuss them using a project of your
choice.
Brainstorming:
brainstorming is one way of identifying risks through the organic process which is
also known as a creative process. This process is known as creative, free-flowing
and thinking approach of identifying risks because it is conducted in an atmosphere
that supports creativity and innovation through encouraging the sharing of ideas and
participation (Turner, 2009). It is a technique that is considered very effective as it
involves a session of sharing and identifying the risks that could occur in a project.
This session is conducted by the project team together with all the stakeholders
(Harrison & Lock, 2004). When identifying risks using the brainstorming method, the
key question that is seeking an answer is: ‘What could go wrong at any time during
the project?’ This enables the process to be very efficient and effective (Young,
2013).
15
manager solicits ideas from all those involved with the project. This could be done
through conducting a meeting where the attendants must make sure that all the risks
are recorded (Blessing B: 2015 dissertation).
Flowchart Method :
The Flowchart Method is used to graphically and sequentially depict the activities of
an operation or process to identify experiences, perils and hazards. There are a
variety of methods that can be used including: product analysis, dependency
analysis, site analysis, decision analysis and critical path analysis. These methods
can illustrate interdependency within your organization; they can easily pinpoint
bottlenecks and can determine a critical path. They do not indicate frequency or
severity, but only show minor processes with major loss potential, they have a limited
applicability to liability exposures and in most situations, they are too process-
oriented.
SWOT Analysis:
16
the discussion of weaknesses and threats short shrift. Taking the latter discussion
further and developing a risk map based on consensus will ensure that this side of
the discussion gets a robust analysis. In a possible acquisition or merger
consideration, a company familiar to the authors uses a SWOT analysis that includes
explicit identification of risks. The written business case presented to the board for
the proposed acquisition includes a discussion of the top risks together with a risk
map.
SWOT technique also play important role in this type of projects because, every
project that is within the community will have politicians, communities, departments
and local government (municipality).
Question 2.3
Identify 5 risks of a project of your choice. Using the risk response matrix by Gido
and Clements compile the matrix with the identified 5 risks.
17
18
LIKELIHO
OD OF
OCCURRE ACTION ON
RISK IMPACT RESPONSIBILITY RESPOCE PLAN
NCE TRIGGER
(L,M,H)
Unexpected
geotechnical issues. Detailed geotechnical
Differing Site Conditions Increased project costs M Project manager/ Geotechnical team investigations to be
Natural or manmade
obstructions. performed.
19
Reference
• Turner, 2009
20
• Goldratt, E. M. (1997). Critical chain. Great Barrington, MA: The North River
Press
• Leach L. (2003). Schedule and cost buffer sizing: How to account for the bias
between project performance and your model. Project Management Journal,
34, 34–47.
• Lechler, T. G., Ronen, B., & Stohr, E. A. (2005). Critical chain: A new project
management paradigm or old wine in new bottles? Engineering Management
Journal, 17, 45–58.
• Goldratt, E. M. (2017, 1997). Critical chain: A business novel. Routledge.
• Herroelen, W., Leus, R., & Demeulemeester, E. (2002). Critical chain project
scheduling: Do not oversimplify. Project Management Journal, 33(4), 48-60.
• Rand, G. K. (2000). Critical chain: the theory of constraints applied to project
management. International Journal of Project Management, 18(3), 173-177.
• Burke,R.(2014). Project Management Techniques. college edition. Burke
publication international
• Gray, C.F and Larson, E.W.2006. Project management. the Management
Process. International Edition. McGraw-Hill international Edition.
• Schwalbe, K .2008 international to Project Management. Cengage Learning.
Bostom, Massachusetts
• Joshi, R and Patil, V.Z(2013) Resources Scheduling of Construction project:
case study, international Journal of science and Research.
• Styne, H.(2012).Project management : A multi-disciplinary Approach(3rd
Edition). FPM Publishing, Pretoria
• Pinto, J.K 2013 Project management : Achieving a competitive Advantage( 3rd
edition). Pearson
21