Problem Set #9
docx
keyboard_arrow_up
School
Trine University *
*We aren’t endorsed by this school
Course
MISC
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
8
Uploaded by MasterScience9621
Problem Set #9
University of the Cumberland
Neelkumar Arvindbhai Patel
Project Risk & Quality Mngmnt (BADM-627-M21)
10/29/2023
Risk Matrix
Possible Risks
Likelihood
(L)
Impact
(I)
Overall Risk
(L x I)
Action Plan
Remediation
Methodology
Data breach or
loss of sensitive
financial
information
High
High
High
Implement strict security
measures such as data
encryption and access
controls, regular backups,
and employee training
Accept
Lack of user
acceptance or
adoption of the
new software
Medium
High
Medium-
High
Conduct thorough user
testing and provide
adequate training and
support for users
Avoid
Technical issues
or bugs causing
delays in
implementation
High
Medium
Medium-
High
Conduct thorough testing
and quality assurance
before implementation,
have a contingency plan in
case of issues
Mitigate
Project timeline
delays due to
unforeseen
circumstances
Medium
Medium
Medium
Identify potential risks and
create a contingency plan,
regularly review and
update project timeline
Mitigate
Insufficient
budget or funding
for the project
Medium
High
Medium-
High
Create a detailed budget
plan, prioritize essential
features, seek additional
funding if necessary
Transfer
Inadequate
communication
between project
team members
Medium
Low
Low-Medium
Establish regular
communication channels,
conduct regular team
meetings, assign a project
manager
Avoid
Changes in
business needs or
requirements
Medium
Medium
Medium
Regularly review and
update business
requirements, incorporate a
change management
process
Mitigate
Inadequate
training and
support for users
Medium
Low
Low-Medium
Create a training plan,
provide user support
resources, conduct user
feedback surveys
Avoid
Inadequate testing
leading to poor
software
functionality
Medium
Medium
Medium
Conduct thorough testing
and quality assurance,
involve end-users in testing
process
Mitigate
The risks selected for this matrix are based on the likelihood and impact they could have
on the success of the project. They have been chosen because they are the most critical risks that
have the potential to cause significant delays, budget overruns, or failure of the project.
Data breach or loss of sensitive financial information is a high-risk because it could have
severe consequences for the organization, such as financial loss, damage to reputation, and legal
consequences (Al-Harrasi et al., 2023). This risk can be mitigated by implementing strict security
measures, such as data encryption and access controls, and regularly training employees on data
security protocols. However, the risk cannot be completely eliminated, as there is always a
possibility of human error or targeted attacks. Therefore, this risk is categorized as accept,
meaning that the organization recognizes the risk but is prepared to deal with the consequences if
it occurs.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Lack of user acceptance or adoption of the new software is a medium-high risk because it
could result in wasted resources and project failure (Troise et al., 2023). To mitigate this risk, the
organization will conduct thorough user testing and provide adequate training and support for
users. This remediation methodology is chosen because it directly addresses the root cause of the
risk by ensuring that the software meets user needs and that users are adequately equipped to use
it. If the risk cannot be mitigated through these measures, the organization may consider
avoiding the risk by reassessing the need for the software or finding alternative solutions.
Technical issues or bugs causing delays in implementation is a medium-high risk as it
could result in project delays and additional costs. This risk can be mitigated by conducting
thorough testing and quality assurance before implementation and having a contingency plan in
case of issues. This remediation methodology is chosen because it addresses the root cause of the
risk by ensuring that the software is functional and ready for implementation. However, there is
still a possibility of unforeseen technical issues, so the organization must also have a contingency
plan in place to minimize the impact on the project timeline.
Project timeline delays due to unforeseen circumstances is a medium risk because
although it can disrupt the project, it is not entirely within the organization's control (Sami Ur
Rehman et al., 2022). The risk can be mitigated by identifying potential risks and creating a
contingency plan to minimize their impact. Regularly reviewing and updating the project
timeline will also help to monitor and mitigate this risk. This remediation methodology is chosen
because it directly addresses the risk by proactively identifying potential delays and having a
plan in place to minimize their impact.
Insufficient budget or funding for the project is a medium-high risk because it could
result in delays or failure of the project (Teklu, 2023). This risk can be transferred by seeking
additional funding if necessary or by creating a detailed budget plan and prioritizing essential
features. If these measures are not possible, the organization may need to reassess the project's
feasibility. This remediation methodology addresses the root cause of the risk by ensuring that
there is sufficient funding for the project. However, it also involves some level of risk
management from the organization's side in terms of budget planning and prioritization.
Inadequate communication between project team members is a low-medium risk because
it can result in misunderstandings, delays, and conflicts within the team (Hussain et al., 2022).
This risk can be avoided by establishing regular communication channels, conducting team
meetings, and assigning a project manager to facilitate effective communication. This
remediation methodology addresses the root cause of the risk by promoting effective
communication within the team.
Changes in business needs or requirements is a medium risk as it could result in changes
to the project scope and timeline (Einhorn et al., 2019). This risk can be mitigated by regularly
reviewing and updating business requirements and incorporating a change management process.
This remediation methodology is chosen because it proactively addresses the root cause of the
risk by keeping track of any changes in business needs and managing them effectively.
Inadequate training and support for users is a low-medium risk as it could result in user
frustration and resistance towards the new software (Irazoki et al., 2021). This risk can be
avoided by creating a detailed training plan, providing user support resources, and conducting
user feedback surveys. This remediation methodology addresses the root cause of the risk by
ensuring that users are adequately trained and supported in using the software.
Inadequate testing leading to poor software functionality is a medium risk because it
could result in user frustration and delays in implementation (Ahmad et al., 2021). This risk can
be mitigated by conducting thorough testing and involving end-users in the testing process. This
remediation methodology addresses the root cause of the risk by ensuring that the software is
functional and meets user needs.
In conclusion, implementing a risk management plan is crucial for the success of any
project, especially for software development projects. The risk matrix created provides a clear
overview of the potential risks, their likelihood and impact, and the remediation methodologies
chosen to address them. By identifying and mitigating these risks, the organization can increase
the chances of a successful project execution and ultimately achieve its goal of creating a new
and improved business expense software.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
References
Ahmad, A., Leifler, O., & Sandahl, K. (2021). Empirical analysis of practitioners' perceptions of
test flakiness factors.
Software Testing, Verification and Reliability
,
31
(8), e1791.
Al-Harrasi, A., Shaikh, A. K., & Al-Badi, A. (2023). Towards protecting organisations’ data by
preventing data theft by malicious insiders.
International Journal of Organizational
Analysis
,
31
(3), 875-888.
Einhorn, F., Marnewick, C., & Meredith, J. (2019). Achieving strategic benefits from business IT
projects: The critical importance of using the business case across the entire project
lifetime.
International Journal of Project Management
,
37
(8), 989-1002.
Hussain, F., Aziz, H., Abbas, M., & Munir, S. (2022). Developing a Systemic Approach to
Conflict Management in Project Risk Management: An Analysis of Contributing Factors
and Their Management.
Pakistan Journal of Engineering, Technology & Science
,
10
(2).
Irazoki, E., Sánchez-Gómez, M. C., Contreras-Somoza, L. M., Toribio-Guzmán, J. M., Martín-
Cilleros, M. V., Verdugo-Castro, S., ... & Franco-Martín, M. A. (2021). A qualitative
study of the cognitive rehabilitation program GRADIOR for people with cognitive
impairment: Outcomes of the focus group methodology.
Journal of Clinical
Medicine
,
10
(4), 859.
Sami Ur Rehman, M., Thaheem, M. J., Nasir, A. R., & Khan, K. I. A. (2022). Project schedule
risk management through building information modelling.
International Journal of
Construction Management
,
22
(8), 1489-1499.
Teklu, H. (2023).
Causes and consequence of delay in the construction project of Private Real
Estate and Its effect on the project Implementation, the Case of Noah Real
Estate
(Doctoral dissertation, ST. MARY’S UNIVERSITY).
Troise, C., Bresciani, S., Ferraris, A., & Santoro, G. (2023). Equity crowdfunding for university
spin-offs: Unveiling the motivations, benefits, and risks related to its adoption.
Journal of
Small Business Management
, 1-35.