Describe the delphi technique used to identify risks

Assignment Help Management Information Sys
Reference no: EM131197261

VoIP (Risk Register)

Utilizing the Delphi technique, your team constructed the following risks register the VoIP project containing the risk, the likelihood of its occurrence on a scale of 1 (least likely) to 5 (most likely), and the potential negative impact on the project on the same scale. In addition, they recommended the appropriate response and identified its type for one of the risks identified.

#

Risk

Likelihood (1-5)

Impact
(1-5)

Response Type

Response

1

Project Delayed due to lack of resources

3

5

 

 

2

Project runs out of funds before completion

1

5

 

 

3

Users reject new system

2

2

 

 

4

Defective Hardware

1

5

 

 

5

New government regulations introduced during deployment increase the cost of running VoIP

2

3

 

 

6

Yearly renewal fee issued on the legacy system due to delay of over 30 days in deployment of the new system

1

4

Mitigation

Schedule check 30 days before project deadline to determine if action needs to be taken to avoid delay. Decision tree will be utilized.

• Write a three to five (3-5) page paper in which you:

1. Explain risk management and its associated activities and defend the need for a risk management plan.

2. Describe the Delphi technique used to identify risks and infer on types of projects where this technique is most accurate.

3. Examine the four (4) types of risk response (i.e., avoidance, acceptance, transference, and mitigation) and determine the appropriate situation where each should be used.

4. Complete the table with the risk response type (i.e., avoidance, acceptance, transference, and mitigation) and a description of the response.

5. Create a decision tree with the software of your choice to address risk number 6. Assume that when you check the schedule on day 60 of the project, it becomes evident that two (2) additional engineers are needed to ensure on-time completion of the project. The engineers cost $25,000 each and a fee of $120,000 is issued by the legacy provider. The probability of completing the project on time is as follows: With the current personnel - 60%; With one (1) engineer - 80%; With both engineers - 98%.

6. Explain the methodology utilized to create a decision tree and recommend the appropriate action to take based on your decision tree from criterion 5.

7. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA format.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM131197261

Questions Cloud

What is students weighted mean grade : A student earned grades of 78, 78, 91, and 91 on her four tests. She earned 78 on the final exam and 87 on her class project. What is her weighted mean grade? Roundto one decimal place.
List several inherent risk factors effecting hih : List several inherent risk factors effecting HIH at the financial report leveland whether they would have contributed to anincrease or decreasein theinherent risk assessment.
What is the final volume of the cube : The diameter of the hole is 2.55 cm with 0.01 cm of uncertainty. What is the final volume of the cube and its uncertainty?
What is the uncertainty of area : If the person uses a more accurate instrument to measure the lot and finds it to be 18.33 m by 45.68 m both measurements with uncertainty 0.01 m, what is the uncertainty of area?
Describe the delphi technique used to identify risks : Examine the four (4) types of risk response (i.e., avoidance, acceptance, transference, and mitigation) and determine the appropriate situation where each should be used.
Improve her sharp shooting skills : Sarah and Joe are training for an archery contest. Sarah is very precise but very inaccurate while Joe is very imprecise but very accurate. What would Sarah have to do to improve her sharp shooting skills? What would Joe have to do to improve his s..
Should an economic model describe reality exactly : Draw and explain a production possibilities frontier for an economy that produces milk and cookies. What happens to this frontier if disease kills half of the economy's cow population?
Displacement along straight or curved lines : Explain how to compute displacement along straight or curved lines.
What document initiates the sales process : What document initiates the sales process?-  Distinguish between a packing slip, a shipping notice, and a bill of lading.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Vulnerability threat and control in information

vulnerability threat and control in information systems.please describe the difference between a vulnerability threat

  Hipaa compliance

HIPAA Compliance You are a security engineer for a hospital group based in Cincinnati, OH. Your group has just acquired a small hospital in Alba, IA. Currently, everything except insurance billing is done on paper forms.

  Case study purchasing and implementing management system

Purchasing and Implementing a Student Management System at Jefferson County School System.

  Selecting appropriate softwareerp systems are complicated

selecting appropriate softwareerp systems are complicated and the executive wants the warehouse manager to join the

  Which requirements are functional business requirements

Which requirements are functional business requirements? Provide two additional examples. Which requirements are nonfunctional business requirements?

  Show the impacts the future of organizations

Summarize the main points of the author and why you believe it impacts the future of organizations.

  Importance of windows access control and authentication

Ken 7 Windows Limited is a manufacturer of Windows for residential and commercial builders. Importance of Windows Access Control and Authentication

  How does this change in a personal and small-office

Organizations need to be careful about their wireless transmissions and controlling the reception of the wireless signal. Discuss ways that organizations can control the transmission and reception of wireless signals. Assess the security and the ..

  Question about organizational paradigms

Question about Organizational Paradigms - impact the relationship between the organizations, its environment, and the organizational workers.

  Explain various measurements and metrics

Explain various measurements/metrics that could be utilized to assess whether impovements made in the supply chain have met stated goals.

  Create information security nightmare for it administrators

Do social networking sites create an information security nightmare for IT administrators and should IT administrators block social networking sites by the firewall

  Request for proposal rfp for software requirementswhat is

request for proposal rfp for software requirementswhat is included in a request for proposal rfp? how do companies use

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd