Reference no: EM131291523
Project Risk Strategy Plan
Risks fall in a few categories, known and unknown. It is extremely important in any project to effectively plan for both with a contingency budget and resources because some will happen. In this class, you are asked to develop a Risk Management Strategy and Plan that identifies potential risks, ranks them by impact and likeliness, contains mitigation strategies, and includes a way to control and communicate them. You will select a project that you may have developed in a previous class or a known project in your organization to create this strategy and plan for.
Throughout this course, you will be working on developing several components of a final Key Assignment. Additional information and the deliverables for each Individual Project will be provided in the assignment description for this project.
In this first Individual Project, you are asked to develop the outline of the sections that will be included in the "Risk Management Strategy and Plan" document and a draft of a proposal to submit to your instructor. The other information you will include is a high-level description of the project you will be conducting the risk analysis on.
You will also be setting up the final Key Assignment outline that you will add to each week. The combined Individual Project (IP) assignments will be your final Key Assignment deliverable.
Project Selection:
The first step will be to select a project that you to develop a risk management strategy and plan for. This project will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:
1. Nontrivial: The selected project candidate should reflect a real-life project that has at least the major milestones identified.
2. Domain Knowledge: You will be applying knowledge of this project to address assignments related to identifying and analyzing risks.
Select a project that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first few days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval.
Assignment:
Your first task in this process will be to select a project to use as the basis of your Key Assignment. You will also create the shell document for the final project Key Assignment document deliverable that you will be working on throughout the course. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery, which is the Risk Management Strategy and Plan.
The following project deliverables:
1. Submit project proposal to instructor for approval
2. Risk Management Strategy and Plan Document Shell
o Use Microsoft Word
o Title Page
1. Course number and name
2. Project name
3. Student name
4. Date
o Table of Contents
1. Use auto-generated TOC
2. Separate page
3. Maximum of three levels deep
4. Be sure to update the fields of the TOC so it is up-to-date before submitting your project.
3. Section Headings (create each heading on a new page with TBD as content except for sections listed under "New Content" below)
1. Project Outline
2. Risk Management Justification
3. Project Risks Identification
4. Project Risks Assessment
5. Project Risks Responses Strategy
6. Project Risks Responsibility Plan
7. Project Risks Monitoring & Control Plan
8. Project Risks WBS & Budget Updates
9. Project Risks Communications Plan
4. New Content to be Inserted in Above Shell
o Project Outline
1. Brief description of the project.
2. The milestones and/or WBS for the project.
3. Material can be taken from approved proposal submitted to the instructor, and this will serve as the draft for the proposal.
4. Be sure this project is approved by the instructor.
5. Risk Management Justification
1.
1. Discuss why risk management is so important to the success of the selected project in a letter to the project sponsor.
2. Describe the steps that will be used to develop the Risk Management Plan.
3. Represent this process in a flow diagram as well.
2. Project Risks Identification
1. Start brainstorming, at a high level, on some categories where risk could occur in this project (Note: you will continue this brainstorming activity in the next week with specifics, likelihood, and impact).
What is the resulting ciphertext
: Question: Consider WEP for 802.11. Suppose that the data is 01010111 and the keystream is 10110000. What is the resulting ciphertext?
|
Describe an example of a workplace or personal email
: Describe an example of a workplace or personal email communication in which the sender (you or someone else) did not pay close attention to audience and context. Ascertain the consequences. Determine how the miscommunication might have been avoide..
|
Discuss about case and answer the following questions
: Louis Vuitton executives raised prices in the late 2000's, and sales continued to increase .What does this say about the demand curve of the typical Louis Vuitton customer?
|
Identify the strengths and weaknesses of the process
: Write 400-600 words that respond to the following questions Use the library and Internet to search for information about the IT research processes. Select 1 of your sources, and describe the process. Identify the strengths and weaknesses of the proce..
|
Develop management strategy that identifies potential risks
: In this class, you are asked to develop a Risk Management Strategy and Plan that identifies potential risks, ranks them by impact and likeliness, contains mitigation strategies, and includes a way to control and communicate them.
|
Developing computer interfaces
: In the current society, we are having more and more aging population, whom we cannot ignore when developing computer interfaces. Please answer the following questions:
|
Gathering machine information
: 1. Create Variables for Log Path Directory, Log Path File, Disk Information, Bios #Information #and Installed Products (Applications) Information and Today's Date. Use CIM cmdlets2. Create a Message "Gathering Machine Informationon . Please wait...
|
Assignment-data warehouse understanding
: Using the Adventureworks 2014 OLTP database and the Adventureworks 2014 Data Warehouse, map the sales related data warehouse fields back to the OLTP tables, explain what is happening
|
What modalities will be use for employees on multiple shifts
: In what format should the training be given, and why? What modalities will be used for employees on multiple shifts or in multiple locations? What are the core elements of the training that will align with the learning objectives?
|