preview

Risks Faced By The Information Technology Projects

Decent Essays

The purpose of this research paper is to understand the risks faced by the Information Technology projects and how Risk Management can manage it, in order to complete a project successfully. There are potential possible risks one can come across while implementing a IT project apart from financial aspects. To prevent the unforeseen risks the project manager must analyze risks from all aspects like financial, resource allocation, performance dependencies, vendor dependencies , natural calamities and so on. Day by day the aspects of risks are increasing. So, project managers must be equipped enough to face these new risks. If there is no appropriate or prior risk analysis of these challenges, the corporations might have to face negative …show more content…

This process involves the following components:
1. Risk Identification: It is the process of identifying the potential problem in a Information Technology environment. This phase helps in identifying the assests, liabilities, threats and vulnerabilities. The IT environment consists of three levels: The application level, the organizational level and the inter organizational level(Bandyopadhyay, Kakoli; Mykytyn, Peter P; Mykytyn, Kathleen, June 2015)
2. Risk Analysis: This phase helps in computing the impact of specific risks in the IT environment ,also specific to different systems and the consequent impact on the organization. Will this lead to an undesired event or disruption and to what level will it impact on the finances of the organization and the project in particular. There are several ways of measuring this activity. It can be categorized into quantitative, qualitative or a combination of both(quantitative and qualitative.)
3. Risk Assessment: This is an important phase as it consolidates the findings of the previous phase and it is finally used to facilitate risk resolution decision-making.
4. Risk Resolution: The main objective of this phase is to reduce the frequency of the event from occurring and the extent of the potential loss. This is accomplished by implementing cost-effective countermeasures within each area in IT. While accomplishing the cost-effective

Get Access