Problem Set #9

docx

School

Trine University *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

8

Uploaded by MasterScience9621

Report
Problem Set #9 University of the Cumberland Neelkumar Arvindbhai Patel Project Risk & Quality Mngmnt (BADM-627-M21) 10/29/2023
Risk Matrix Possible Risks Likelihood (L) Impact (I) Overall Risk (L x I) Action Plan Remediation Methodology Data breach or loss of sensitive financial information High High High Implement strict security measures such as data encryption and access controls, regular backups, and employee training Accept Lack of user acceptance or adoption of the new software Medium High Medium- High Conduct thorough user testing and provide adequate training and support for users Avoid Technical issues or bugs causing delays in implementation High Medium Medium- High Conduct thorough testing and quality assurance before implementation, have a contingency plan in case of issues Mitigate Project timeline delays due to unforeseen circumstances Medium Medium Medium Identify potential risks and create a contingency plan, regularly review and update project timeline Mitigate Insufficient budget or funding for the project Medium High Medium- High Create a detailed budget plan, prioritize essential features, seek additional funding if necessary Transfer Inadequate communication between project team members Medium Low Low-Medium Establish regular communication channels, conduct regular team meetings, assign a project manager Avoid
Changes in business needs or requirements Medium Medium Medium Regularly review and update business requirements, incorporate a change management process Mitigate Inadequate training and support for users Medium Low Low-Medium Create a training plan, provide user support resources, conduct user feedback surveys Avoid Inadequate testing leading to poor software functionality Medium Medium Medium Conduct thorough testing and quality assurance, involve end-users in testing process Mitigate The risks selected for this matrix are based on the likelihood and impact they could have on the success of the project. They have been chosen because they are the most critical risks that have the potential to cause significant delays, budget overruns, or failure of the project. Data breach or loss of sensitive financial information is a high-risk because it could have severe consequences for the organization, such as financial loss, damage to reputation, and legal consequences (Al-Harrasi et al., 2023). This risk can be mitigated by implementing strict security measures, such as data encryption and access controls, and regularly training employees on data security protocols. However, the risk cannot be completely eliminated, as there is always a possibility of human error or targeted attacks. Therefore, this risk is categorized as accept, meaning that the organization recognizes the risk but is prepared to deal with the consequences if it occurs.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Lack of user acceptance or adoption of the new software is a medium-high risk because it could result in wasted resources and project failure (Troise et al., 2023). To mitigate this risk, the organization will conduct thorough user testing and provide adequate training and support for users. This remediation methodology is chosen because it directly addresses the root cause of the risk by ensuring that the software meets user needs and that users are adequately equipped to use it. If the risk cannot be mitigated through these measures, the organization may consider avoiding the risk by reassessing the need for the software or finding alternative solutions. Technical issues or bugs causing delays in implementation is a medium-high risk as it could result in project delays and additional costs. This risk can be mitigated by conducting thorough testing and quality assurance before implementation and having a contingency plan in case of issues. This remediation methodology is chosen because it addresses the root cause of the risk by ensuring that the software is functional and ready for implementation. However, there is still a possibility of unforeseen technical issues, so the organization must also have a contingency plan in place to minimize the impact on the project timeline. Project timeline delays due to unforeseen circumstances is a medium risk because although it can disrupt the project, it is not entirely within the organization's control (Sami Ur Rehman et al., 2022). The risk can be mitigated by identifying potential risks and creating a contingency plan to minimize their impact. Regularly reviewing and updating the project timeline will also help to monitor and mitigate this risk. This remediation methodology is chosen because it directly addresses the risk by proactively identifying potential delays and having a plan in place to minimize their impact.
Insufficient budget or funding for the project is a medium-high risk because it could result in delays or failure of the project (Teklu, 2023). This risk can be transferred by seeking additional funding if necessary or by creating a detailed budget plan and prioritizing essential features. If these measures are not possible, the organization may need to reassess the project's feasibility. This remediation methodology addresses the root cause of the risk by ensuring that there is sufficient funding for the project. However, it also involves some level of risk management from the organization's side in terms of budget planning and prioritization. Inadequate communication between project team members is a low-medium risk because it can result in misunderstandings, delays, and conflicts within the team (Hussain et al., 2022). This risk can be avoided by establishing regular communication channels, conducting team meetings, and assigning a project manager to facilitate effective communication. This remediation methodology addresses the root cause of the risk by promoting effective communication within the team. Changes in business needs or requirements is a medium risk as it could result in changes to the project scope and timeline (Einhorn et al., 2019). This risk can be mitigated by regularly reviewing and updating business requirements and incorporating a change management process. This remediation methodology is chosen because it proactively addresses the root cause of the risk by keeping track of any changes in business needs and managing them effectively. Inadequate training and support for users is a low-medium risk as it could result in user frustration and resistance towards the new software (Irazoki et al., 2021). This risk can be avoided by creating a detailed training plan, providing user support resources, and conducting
user feedback surveys. This remediation methodology addresses the root cause of the risk by ensuring that users are adequately trained and supported in using the software. Inadequate testing leading to poor software functionality is a medium risk because it could result in user frustration and delays in implementation (Ahmad et al., 2021). This risk can be mitigated by conducting thorough testing and involving end-users in the testing process. This remediation methodology addresses the root cause of the risk by ensuring that the software is functional and meets user needs. In conclusion, implementing a risk management plan is crucial for the success of any project, especially for software development projects. The risk matrix created provides a clear overview of the potential risks, their likelihood and impact, and the remediation methodologies chosen to address them. By identifying and mitigating these risks, the organization can increase the chances of a successful project execution and ultimately achieve its goal of creating a new and improved business expense software.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References Ahmad, A., Leifler, O., & Sandahl, K. (2021). Empirical analysis of practitioners' perceptions of test flakiness factors. Software Testing, Verification and Reliability , 31 (8), e1791. Al-Harrasi, A., Shaikh, A. K., & Al-Badi, A. (2023). Towards protecting organisations’ data by preventing data theft by malicious insiders. International Journal of Organizational Analysis , 31 (3), 875-888. Einhorn, F., Marnewick, C., & Meredith, J. (2019). Achieving strategic benefits from business IT projects: The critical importance of using the business case across the entire project lifetime. International Journal of Project Management , 37 (8), 989-1002. Hussain, F., Aziz, H., Abbas, M., & Munir, S. (2022). Developing a Systemic Approach to Conflict Management in Project Risk Management: An Analysis of Contributing Factors and Their Management. Pakistan Journal of Engineering, Technology & Science , 10 (2). Irazoki, E., Sánchez-Gómez, M. C., Contreras-Somoza, L. M., Toribio-Guzmán, J. M., Martín- Cilleros, M. V., Verdugo-Castro, S., ... & Franco-Martín, M. A. (2021). A qualitative study of the cognitive rehabilitation program GRADIOR for people with cognitive impairment: Outcomes of the focus group methodology. Journal of Clinical Medicine , 10 (4), 859. Sami Ur Rehman, M., Thaheem, M. J., Nasir, A. R., & Khan, K. I. A. (2022). Project schedule risk management through building information modelling. International Journal of Construction Management , 22 (8), 1489-1499.
Teklu, H. (2023). Causes and consequence of delay in the construction project of Private Real Estate and Its effect on the project Implementation, the Case of Noah Real Estate (Doctoral dissertation, ST. MARY’S UNIVERSITY). Troise, C., Bresciani, S., Ferraris, A., & Santoro, G. (2023). Equity crowdfunding for university spin-offs: Unveiling the motivations, benefits, and risks related to its adoption. Journal of Small Business Management , 1-35.