The purpose of this research paper is to understand the risks faced by the Information Technology projects and how Risk Management can manage it, in order to complete a project successfully. There are potential possible risks one can come across while implementing a IT project apart from financial aspects. To prevent the unforeseen risks the project manager must analyze risks from all aspects like financial, resource allocation, performance dependencies, vendor dependencies , natural calamities and so on. Day by day the aspects of risks are increasing. So, project managers must be equipped enough to face these new risks. If there is no appropriate or prior risk analysis of these challenges, the corporations might have to face negative …show more content…
This process involves the following components:
1. Risk Identification: It is the process of identifying the potential problem in a Information Technology environment. This phase helps in identifying the assests, liabilities, threats and vulnerabilities. The IT environment consists of three levels: The application level, the organizational level and the inter organizational level(Bandyopadhyay, Kakoli; Mykytyn, Peter P; Mykytyn, Kathleen, June 2015)
2. Risk Analysis: This phase helps in computing the impact of specific risks in the IT environment ,also specific to different systems and the consequent impact on the organization. Will this lead to an undesired event or disruption and to what level will it impact on the finances of the organization and the project in particular. There are several ways of measuring this activity. It can be categorized into quantitative, qualitative or a combination of both(quantitative and qualitative.)
3. Risk Assessment: This is an important phase as it consolidates the findings of the previous phase and it is finally used to facilitate risk resolution decision-making.
4. Risk Resolution: The main objective of this phase is to reduce the frequency of the event from occurring and the extent of the potential loss. This is accomplished by implementing cost-effective countermeasures within each area in IT. While accomplishing the cost-effective
The risk-management plan then starts by identifying each of these sources, their magnitude, their relation to the various design stages, and their possible effects on cost, schedule, quality, and performance. The next step is to look for modifications or alternatives that would permit risk reduction. The thoughtful selection of computer language or operating system may reduce some of the integration risks. If management decides to develop a new software package, contingency plans that cut expenses and development time at the cost of lower performance should be prepared. These plans are used in case the undesired event takes place. By preparing a contingency plan in advance, time is
Therefore, the risk process places a high emphasis on risk workshops, initial risks, and how risks are identified throughout the course of the project. The next two sections describe different methods of identifying risks.
Risk monitoring and control is the next step and involves the owners of the risks to monitor various risk triggers. This works by scanning the project environment for both identified and unidentified threats and opportunities much like a radar screen (Marchewka, 2009). This approach directly relates to how to respond to the risk. Risk response allows the owner of the risk to commit resources and take actions once the risk is known or opportunity is available. This action usually follows the planned risk strategy.
However, when IT projects fall behind schedule, these efficiencies can quickly evaporate and lead to cost overruns, glitches and bugs. (3) Due to their inherently complex nature, IT projects are susceptible to many types of failures; mainly caused by a lack or risk management and flexibility. Many of the risks present in IT projects are unrealistic goals; inaccurate estimates of needed resources; badly defined system requirements; poor reporting of the project’s status; poor communication between developers and users; adoption of immature technology; inability to cope with project complexity; sloppy developed practices; mismanagement of the project; stakeholder politics; and commercial pressures. (4) With so many potential risks, it is not surprising that IT projects that are completed on time, and on budget, are more the exception rather than the rule. Additionally, before IT projects begin, clear objectives and the allocation of time and resources need to be defined; all of which are usually lacking for one reason or another. The result is a high failure rate associated with IT projects overall, which puts a spot light on the need for organizations to improve their risk management abilities and design processes that will allow them the flexibility to reallocate resources when unexpected problems when they
date, and that a new risk management plan must be developed. Because of the importance of risk
Hillson, D & Simon, P. (2007). _Practical Project Risk Management: The ATOM Methodology_, Vienna, VA: Management Concepts, Inc.
Background- In its most basic sense, risk management identifies, allows assessment, and prioritizes risks that are associated and central to an individual project or organization. Risk management allows the organization to be proactive in preventing or mitigating risks, for improving certain processes within the organization, and with the hope of preventing fiscal exposure. However, in almost every organization there are risks individuals are unique and do not always perform at a high level of safety; mechanical or design failures exist, construction projects have supply or labor issues, there are uncertainties in computer or data modification, of course natural disasters, and even deliberate attacks from competitors, etc. Because this is such a common occurrence, national and even international standards have been developed in conjunction with the insurance and regulatory institutions to at least provide basic guidelines to minimize risks risk (International Organization for Standardization, 2009).
3.4 Summarise the types of risks that may be involved in assessment in own area of responsibility
IT risk is any threat to organization’s information technology, data, critical systems and business processes. When the businesses depend on information technology for main operations and activities, they need to be aware of the extent and nature of those threats hence they can be external, internal, intentional or accidental. IT risk includes business-critical areas, such as:
IT projects can have a lot of different components to them which creates the potential for more risks. These risks need to be identified, analyzed, and addressed as the project progresses (Schwalbe Ph.D., 2014). There are different types of risk that can affect the implementation of a system that will allow people to manage their own human resource information. A positive risks can produce a project under budget or ahead of schedule, while a negative risks can have adverse effects on a project such as going way over budget. There are also some risks that do not have a positive or negative impact on a project. Identifying risks and addressing them is mostly handled by the program manager.
The final stage of risk assessment is to determine the method in which to diminish, remove, regulate or manage the risk as to reduce financial loss or physical injury (Wolohan, 2013). Each of these three steps are ongoing for any organization as it is the duty of those in charge to reduce any and all risk for participants and spectators alike (Wolohan, 2013).
Proper survey and the complete scenario is taken into consideration about risks in the organization which enables the proper risk assessment. Potential of each threat or risk is evaluated and graded in order to reduce the impact of the risks or reduced the probability of its occurrence.
This assignment is included in the 2014 session of the Risk Management module of the MSc in Project Management course at University of Aberdeen. The main purpose of the assignment is to demonstrate my understanding of the issues involved in Risk Management and how they are applied in my current Project environment. The assignment is split in to two questions as detailed below.
Risk assessment is used to determine the extent of handling threats and the risks associated with an IT system throughout its life cycle.