Experiment-8: Identify, Control and Mitigate Risks To The Project (RMMM)
Experiment-8: Identify, Control and Mitigate Risks To The Project (RMMM)
Experiment-8
Risk Mitigation:
It is an activity done basically to avoid a risk.
Steps:
1) Finding out the risks.
2) Removing causes that are the reason for the creation of a risk.
3) Controlling the related documents timely.
4) Conducting reviews in equal and consistent intervals of time to make sure
everything is working fine.
Risk Monitoring:
They are the steps taken to track the projects.
Steps:
1) To check if predicted risks occur or not
2) Make sure the steps defined to work on when risk affects are working fine.
3) To collect data for future references.
4) To allocate and associate risks with steps of the project.
To analyse Form risks, you need to work out the likelihood of it happening and
the consequences it would have the impact of the risks you have identified. Form
Level of risk is often described as low, medium, high or very high. It should be
analysed in relation to what you are currently doing to control it. Keep in mind
that control measures decrease the level of risk, but do not always eliminate it.
Risk Based Testing is a software testing type which is based on the probability
of risk. It involves assessing the risk based on software complexity, criticality of
business, frequency of use, possible areas with defects, etc. Risk based testing
prioritizes testing of features and functions of the software application which are
more impactful and likely to have defects. Risk is the occurrence of an uncertain
event with a positive or negative effect on the measurable success criteria of a
project. It could be events that have occurred in the past or current events or
something that could happen in the future. These uncertain events can have an
impact on the cost, business, technical and quality targets of a project.
Risk modelling has been prevalent for years in certain industries in which
taking calculated risk is integral to the business, such as financial services and
energy. More recently, organizations throughout the public and private sectors
have begun to adopt a wide array of risk models and simulations to start
addressing strategic, operational, compliance, geopolitical, and other types of
risk. Wider availability of data and sophisticated analysis capabilities is making
modelling more practical; at the same time, the need to cope with an increasingly
risky environment is making it more valued.
A project is successful when it achieves its objectives and meets or exceeds the
expectations of the stakeholders. People are individuals who either care about or
have a vested interest in your project. They are the people who are actively
involved with the work of the project or have something to either gain or lose as
a result of the project. When you manage a project to add lanes to a highway,
motorists are directly or indirectly who are positively affected. However, you
negatively affect residents who live near the highway during your project and
after your project with far-reaching implications. The project sponsor are
indirect people, generally an executive in the organization with the authority to
assign resources and enforce decisions regarding the project, is a stakeholder of
project. The customer, subcontractors, suppliers, and sometimes even the
government are stakeholders. The project manager, project team members, and
the managers from other departments in the organization are stakeholders as
well. It’s important to identify all the stakeholders in your project upfront.
Leaving out important stakeholders or their department’s function and not
discovering the error until well into the project could be a project killer.
This strategy is commonly used for identifying and understanding the risks that
can affect a project’s output, and the purpose of this strategy helps bring these
risks to the business’ attention so everyone working on the project has a shared
understanding of the risks and consequences involved. The following example
shows how the acceptance strategy can be implemented for commonly-identified
risks.
Risks impacting cost
The accept strategy can be used to identify risks impacting cost. For example, a
project team might implement the accept strategy to identify risks to the project
budget and make plans to lower the risk of going over budget, so that all team
members are aware of the risk and possible consequences.
The accept strategy could help identify possible risks that could impact
scheduling, such as keeping the project on track to meet deadlines.
These types of risks can involve performance issues like team productivity or
product performance and can be identified and accepted as part of project
planning so all members are aware of potential performance risks.
Regular risk assessments enable the detection of increased threat levels and
potentially emerging risks before they materialize. Following this process will
prevent project metrics from being pushed out of tolerance.
This will help to prioritize resources, allocating them to risks in need of stronger
coverage and reducing inefficiencies that come from wasting resources on low-
impact risks. With a tolerance level, this gap analysis will also serve to identify
emerging risks as they rise out of tolerance, indicating that current mitigation
activities are no longer sufficient.
Conclusion:
Whether it is because of demand from customers or a desire to enter new
markets, many community banks are beginning to offer online banking financial
services to their customers. As with all new products, bankers need to
understand the mobile banking environment being used and the associated risks.
Effective risk identification and implementation of mitigation controls and
processes based on the data type, state, and location are key to achieving this
objective. With the proper strategy and risk management elements in place, both
the bank and its customers should experience a safer online banking
environment.