Describe the delphi technique used to identify risks

Assignment Help Management Information Sys
Reference no: EM131118892

Utilizing the Delphi technique, your team constructed the following risks register the VoIP project containing the risk, the likelihood of its occurrence on a scale of 1 (least likely) to 5 (most likely), and the potential negative impact on the project on the same scale. In addition, they recommended the appropriate response and identified its type for one of the risks identified.

#

Risk

Likelihood (1-5)

Impact
(1-5)

Response Type

Response

1

Project Delayed due to lack of resources

3

5

 

 

2

Project runs out of funds before completion

1

5

 

 

3

Users reject new system

2

2

 

 

4

Defective Hardware

1

5

 

 

5

New government regulations introduced during deployment increase the cost of running VoIP

2

3

 

 

6

Yearly renewal fee issued on the legacy system due to delay of over 30 days in deployment of the new system

1

4

Mitigation

Schedule check 30 days before project deadline to determine if action needs to be taken to avoid delay. Decision tree will be utilized. 

Write a three to five (3-5) page paper in which you:

1. Explain risk management and its associated activities and defend the need for a risk management plan.

2. Describe the Delphi technique used to identify risks and infer on types of projects where this technique is most accurate.

3. Examine the four (4) types of risk response (i.e., avoidance, acceptance, transference, and mitigation) and determine the appropriate situation where each should be used.

4. Complete the table with the risk response type (i.e., avoidance, acceptance, transference, and mitigation) and a description of the response.

5. Create a decision tree with the software of your choice to address risk number 6. Assume that when you check the schedule on day 60 of the project, it becomes evident that two (2) additional engineers are needed to ensure on-time completion of the project. The engineers cost $25,000 each and a fee of $120,000 is issued by the legacy provider. The probability of completing the project on time is as follows: With the current personnel - 60%; With one (1) engineer - 80%; With both engineers - 98%.

6. Explain the methodology utilized to create a decision tree and recommend the appropriate action to take based on your decision tree from criterion 5.

7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include the decision tree created in your chosen software. The completed decision tree must be imported into the Word document before the paper is submitted.

Reference no: EM131118892

Questions Cloud

General systems model and quantitative methods : Explain the relationship between the general systems model and quantitative methods in medical facilities. How do these two come together to help us improve our organizations?
Would it be okay to drink little sea water to quench thirst : There are several instances of people being lost at sea for weeks. If you were in that situation, you would be very dehydrated. Would it be okay to drink a little sea water to quench your thirst?
Simmons corporation owns stock of armstrong : Simmons Corporation owns stock of Armstrong, Inc prior to 2010 the investment was accounted for using the equity method. In early 2010, Simmons sold part of its investment in Armstrong, and began using the fair value method.
Making large-scale changes in your rough draft : 1. When revising you should avoid making large-scale changes in your rough draft.
Describe the delphi technique used to identify risks : Examine the four (4) types of risk response (i.e., avoidance, acceptance, transference, and mitigation) and determine the appropriate situation where each should be used.
Prepare a research paper about gut flora : Prepare a Research Paper about gut flora. The paper should include 2000 words. Please use the outline below. No references. Please include a cover page. How to improve levels of Gut Flora?
Management has decided to switch from the fifo inventory : When the year-end physical inventory adjustment was made for the current year, the controller discovered that the prior year's physical inventory sheets for an entire warehouse were mislaid and excluded from last year's count.
What is the public perception of healthcare institutions : What is the public's perception of healthcare institutions as being in a perpetual state of disaster preparedness? How does the view differ from the more than 264,300 injuries and illnesses in hospitals in 2006 reported by the Bureau of Labor Statist..
What are the inalienable rights of humans : Examine Kant's Categorical Imperative and trace the evolution of the rights of man from the American Revolution through other periods in U.S. history such as the Civil War, Women's Suffrage Movement, 1948 UN Declaration of Human Rights, Civil Ri..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Technology for strategic business processesthe journal

technology for strategic business processesthe journal article is business process integration feasible? provides a

  Create and edit graphics and incorporate them into the page

Given a web page that requires images and advanced styles, create and edit graphics and incorporate them into the page. Given a project, create a website that contains text, links, images, and any other content necessary to complete the website usi..

  What kind of information makes products valuable

Do some research and find some other products (two or three) that have value over and above a comparable product because of such information? What kind of information makes products valuable? Consider both tangible (resale value) and intangible v..

  How should change be managed for successful implementation

How should change be managed for successful implementation of different forms of knowledge management initiative? Discuss how information systems are used to support different forms of incremental change and discontinuous change?

  How kudler could benefit from internet purchasing

Prepare a 3-5 page paper on how Kudler could benefit from Internet purchasing and how this new system and process would be potentially implemented

  Determining the competitive value of information technology

Identify three factors to consider in determining the competitive value of information technology. Justify the selected factors. Of the factors selected, determine if each factor is applicable to all businesses and industries, and explain why or why ..

  Recently hired as a network security analyst for a small

Recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your background and skills, they are looking to you to provide guidance. In addition..

  Implementing new technology due to poor planning

What are some examples of where businesses have not been successful in implementing new technology due to poor planning

  Explain how the implementation project will be organized

Explain how the implementation project will be organized and staffed and the level of commitment at all levels from Management and Directors to workers;?

  How they would benefit a smaller airline

Using the airlines example mentioned above, propose several possible IT solutions and how they would benefit a smaller airline to become more successful or attract more clients.

  Provide a description of an organization

Provide a description of an organization you are familiar with (possibly a company you have worked for in the past or are currently working for) and describe briefly what services they contribute. Then, select three out of the six questions below, an..

  Discuss computer viruses spread via email or by other

discuss computer viruses spread via email or by other methods. what negative consequences can they have on an

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd