Explain risk management and its associated activities

Assignment Help Management Information Sys
Reference no: EM131516516 , Length: 5

Assignment : VoIP Part 4 (Risk Register)

Utilizing the Delphi technique, your team constructed the following risks register the VoIP project containing the risk, the likelihood of its occurrence on a scale of  (least likely) to 5 (most likely), and the potential negative impact on the project on the same scale. In addition, they recommended the appropriate response and identified its type for one of the risks identified.

#

Risk

Likelihood (1-5)

Impact

(1-5)

Response Type

Response

1

Project Delayed due to lack of resources

3

5

 

 

2

Project runs out of funds before completion

1

5

 

 

3

Users reject new system

2

2

 

 

4

Defective Hardware

1

5

 

 

5

New government regulations introduced during deployment increase the cost of running VoIP

2

3

 

 

6

Yearly renewal fee issued on the legacy system due to delay of over 30 days in deployment of the new system

1

4

Mitigation

Schedule check 30 days before project deadline to determine if action needs to be taken to avoid delay. Decision tree will be utilized. 

Write a three to five (3-5) page paper in which you:

Explain risk management and its associated activities and defend the need for a risk management plan.

Describe the Delphi technique used to identify risks and infer on types of projects where this technique is most accurate.

Examine the four (4) types of risk response (i.e., avoidance, acceptance, transference, and mitigation) and determine the appropriate situation where each should be used.

Complete the table with the risk response type (i.e., avoidance, acceptance, transference, and mitigation) and a description of the response.

Create a decision tree with the software of your choice to address risk number 6. Assume that when you check the schedule on day 60 of the project, it becomes evident that two (2) additional engineers are needed to ensure on-time completion of the project.

The engineers cost $25,000 each and a fee of $120,000 is issued by the legacy provider. The probability of completing the project on time is as follows: With the current personnel - 60%; With one (1) engineer - 80%; With both engineers - 98%.

Explain the methodology utilized to create a decision tree and recommend the appropriate action to take based on your decision tree from criterion 5.

Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

Include the decision tree created in your chosen software. The completed decision tree must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

Examine the human resource factors that can impact project management.

Summarize how the PMBOK® process groups and knowledge areas are involved throughout the project life cycle.

Compare and contrast the sources and mitigating factors of project risk.

Use project management and graphic software to plan and manage a project throughout the project life cycle.

Use technology and information resources to research issues in IT project management.

Write clearly and concisely about issues in IT project management using proper writing mechanics and technical style conventions.

Reference no: EM131516516

Questions Cloud

Explain the importance of the management discussion : Asignment: Full Disclosure in Financial Reporting- Explain the importance of the management discussion and analysis section of an annual report.
Prove how could bonto ltd attract these funds from creditors : As the creditors figure showed among liability accounts, the variance change between 2014 to 2015 experienced a 20% (a(1)J37) increase in current liability.
The quality of the user experience : Describe three (3) reasons users are still frustrated with modern applications.Suggest one (1) method for reducing the frustrations.
What was the main source of cash from financing activities : What was the main source of cash from financing activities during the three-year period? What was the main source of cash from financing activities?
Explain risk management and its associated activities : Explain risk management and its associated activities and defend the need for a risk management plan.
What are the five cognates in the given letter : For any tutors who can read and write in Spanish, can you help me with the following question?
Discuss the prose and mixed media : This option is to compare a literary piece from an author we've read in this class with its cinematic counterpart. You should focus on the literary aspects.
Write a report describing the objectives of governance : Write a report describing the objectives of governance of Information.Technology and the general controls in an IT system.
What is required to apply it into your chosen business : Does your chosen business need IT?Why IT is important for business survival? What is required to apply IT into your chosen business?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain the basic components and types of computer systems

Basic Components and Types of Computer Systems - What are the basic components and types of computer systems? Provide some descriptions with your examples

  Briefly describe the enterprise

Briefly describe the enterprise, in terms of its operations, products/services, markets, competitors etc.

  Provide the analysis of the problem situation

INMR89 Big Data in Business Assignment. Provide the analysis of the problem situation to be addressed to identify the scope and focus

  Define technical feasibility and organizational feasibility

Define technical feasibility and organizational feasibility.Discuss some of the key aspects to developing successful process and systems development projects.

  Create a time-phased budget containing cost estimates

Using Microsoft® Excel® and the project schedule, WBS, and scope statement, create a time-phased budget containing cost estimates. Include direct and indirect costs for labor, machinery, equipment, supplies, and other elements applicable to the pr..

  Concerning privacy the united statesa provides a great deal

concerning privacy the united statesa. provides a great deal of legislation that purports to offer some privacy

  Discuss the issues of availability versus confidentiality

Discuss the issues of availability versus confidentiality of the DR and BC plans. The recommendation is for all DR team members to have several copies of these plans, at the office and at home, and perhaps even in their vehicles to ensure that the..

  Discuss about the patient care applications

Assume that you are a senior health service administrator responsible for the health information systems within your organization, and create an argument to be presented to the leaders with the organization that a strategic plan is essential for t..

  Examine the proposed business ethical problem

Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing.

  What approaches can be used to reconcile disparate principle

What approaches can be used to reconcile the disparate principles of the schools? Assess the significance of information management to corporate performance management.

  Determine how health care provider can best differentiate

From the e-Activity, determine the best way for the health care provider to distinguish its product offerings from those of its competitors. Provide specific examples to support your response.

  Conduct a vulnerability

You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actions based on your assessment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd