Adb9 Bsbpmg517 Manage Project Risk
Adb9 Bsbpmg517 Manage Project Risk
Adb9 Bsbpmg517 Manage Project Risk
2|Page
Review project outcomes to determine effectiveness of risk-management processes and procedures
.............................................................................................................................................................. 79
Identify and document risk management issues and recommended improvements for application to
future projects ...................................................................................................................................... 80
Activity 15 ............................................................................................................................................. 85
Assessment………………………………………………………………………………………………………………………………………88
3|Page
About BSBPMG517 Manage project risk
Application
This unit describes the skills and knowledge required to manage risks that may impact achievement
of project objectives. It involves identifying, analysing, treating and monitoring project risks, and
assessing risk management outcomes.
It applies to individuals responsible for managing and leading a project in an organisation, business,
or as a consultant.
No licensing, legislative, regulatory or certification requirements apply to this unit at the time of
publication.
Unit Sector
1.3 Identify project risks using valid and reliable risk identification
methods
2.4 Document risk analysis outcomes for inclusion in risk register and
risk management plan
4|Page
3. Establish risk treatments 3.1 Identify and document existing risk controls
and controls
3.2 Consider and determine risk treatment options using agreed
consultative methods
3.4 Update risk plans and allocate risk responsibilities to project team
members
4. Monitor and control 4.1 Establish regular risk review processes to maintain currency of risk
project risks plans
Foundation Skills
This section describes language, literacy, numeracy and employment skills incorporated in the
performance criteria that are required for competent performance.
Writing 1.3, 1.4, 2.1, 2.4, Documents risks, risk analysis and risk controls
3.1, 3.3, 3.4, 4.1, using required formats and structure
4.3, 4.4, 5.2 Modifies and updates workplace documentation
according to requirements
5|Page
Uses active listening and questioning techniques
to confirm understanding
Numeracy 1.3, 2.1, 2.3 Analyses numerical data to identify project risk
levels and rank risks according to agreed system
of classification
Interact with 1.1, 2.3, 3.4 Selects and uses appropriate conventions and
others protocols when communicating with internal and
external stakeholders to seek or share
information
Actively identifies requirements of important
communication exchanges, selecting appropriate
channels, format and content to suit purpose and
audience
Get the work 1.1-1.4, 2.1, 3.2, 4.1, Identifies and develops approaches to risk
done 4.4, 5.1 management and implements complex tasks to
achieve outcomes
Analyses information to make decisions, involving
others when appropriate
Uses formal and informal processes to monitor
implementation of decisions and reflect on
outcomes
Assessment requirements
Modification History
Release Comments
Release 1 This version first released with BSB Business Services Training Package
Version 1.0.
6|Page
Performance Evidence
conduct effective risk management for a project of sufficient complexity to demonstrate the
full range of performance requirements
apply risk management techniques, strategies and tools.
Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.
Knowledge Evidence
To complete the unit requirements safely and effectively, the individual must:
7|Page
Determine risk objectives and standards, with input from stakeholders1
Consider this: Effective risk management underpins a successful project – true or false?
All three of us are strong believers in the positive value of a well-managed and controlled approach to
project risks. An Internet search for “images of risk management” will return many illustrations of dice
being rolled.
If it is done well, risk management measures the uncertainty involved when you 'roll the dice' during
your project, and allows the project manager to obtain a consensus on how to best handle risks and
unexpected events on the project.
We put forward the following considerations for risk management (this list is not exhaustive or
prioritised):
1. Risk management affects all aspects of your project – your budget, your schedule, and your
scope, the agreed level of quality, your communications and stakeholder engagement, the
success when the project’s output is implemented, and so on.
2. Risks can be positive (i.e. opportunities), as well as negative (generally referred to as risks).
3. Risk management is about behaviours that prove that risk management is a top priority for
you and the team, such as “being constantly aware of what might happen,” agreeing on
strategies for all risks, and undertaking actions to prevent negative risks from becoming issues
(i.e. occurred events) whilst maximising the opportunities of positive risks.
4. Risk management needs to be conducted from the start of the project, constantly discussed
and monitored, and involve all members of the project team.
5. How you choose to handle risks depends on your most influential project stakeholders’
'appetite for risk'.
6. Each identified risk needs to be assessed, a strategy for dealing with it agreed upon by all
appropriate parties, and tracked until closure.
7. Project risk management is not “the project manager tracking risks in a Risks Register and
sharing it occasionally when or if people ask to see it” – it is much more than that.
A project risk can be defined as an uncertain event or condition that, if it occurs, will have a positive
or a negative effect on a project’s objectives.
1
Source: CIO, as at
http://www.cio.com.au/article/385084/risk_management_project_management_go_hand_hand/, as on 4th
December, 2016; Free Management eBooks, as at http://www.free-management-ebooks.com/dldebk-
pdf/fme-project-risk.pdf, as on 4th December, 2016.
8|Page
Some very comprehensive guidelines and procedures for managing risk are available from many
sources. For example, the Project Management Institute describes the following summary process to
managing project risks:
You may come across other models. Your means of conducting risk management and the behaviours
you and your team display in 'making it real' make all the difference. We have mentioned 'behaviours'
a few times in this article. We are referring to the communication (in all its shapes and forms) that you
use, the importance with which you treat risks, and the willingness and drive to see actions through
to completion and closure.
1. At the start of a project, do you plan how you and the team will approach risks? By this, we
do not mean jumping straight to a Risks Register, but putting some serious thought into how
risks will be managed during the project.
2. Do you understand and monitor the appetite for risk of your customer and influential
stakeholders?
3. Do you involve all people in the team to identify project risks – not only at the start, but
throughout the project?
4. Do you review the risks of previous projects, and look to lessons from the past as part of your
initial review and identification process?
5. Do you strive to ensure each risk has an owner, and that the method to tackle them is agreed
upon, i.e., whether to mitigate the risk with an action, to transfer, avoid or accept it and so
on?
6. Do you readily assess opportunities as well as negative risks, and devise strategies to maximise
the likelihood of opportunities occurring in order to exploit or enhance them?
7. Do you assess “triggers” to each risk so that you can monitor if/when there is danger of their
becoming real?
8. As well as qualitative assessment of risks, are you able to apply a quantitative financial or time
value to each risk, both negative and positive, should it eventuate? If the impact is negative,
will it turn into an issue? Can this estimated financial value help you justify an appropriate
project contingency in terms of cost and/or time?
9. Are you pro-active in tracking the agreed strategies to handle risks?
10. Do you maintain a project Risks Register on a regular basis – moving priorities up and down
the list, watching for low-priority risks that may escalate in importance, being attentive to risks
that are likely to occur soon?
11. Do you discuss the “current high-priority risks” with your key Stakeholders at each project
review (in whatever forum you have for such review meetings)?
12. Do you discuss what will happen if major and problematic “unknown unknowns” occur on
your project, perhaps with action scenarios if such events happen?
9|Page
Remember: Risk management is your friend and ally
As per the title of this article, risk management is the project manager’s friend. Done well, it helps you
ensure that the 'appetite for risk' is appropriately understood at the start; that all risks are agreed
upon, prioritised, assessed, communicated and understood in alignment with this 'risk appetite'; and
that you have a solid platform to track agreed actions, including escalation up the management chain
if necessary.
The key is to demonstrate positive behaviours in a way that ensures risk management is kept at the
forefront of all your project activities. There is always the potential of 'unknown unknowns' impacting
your project, but the more you can assess reasonable risks from the start of the project and actively
manage them throughout, the better placed you will be as a team to realise a positive outcome for
your project.
Everything that is done in business contains some measure of risk. No matter what the activity, there
is an element of risk that must be analysed and weighed against the potential rewards. The best
organisations are those who can choose the right risks to take on, and the ones to avoid. Dealing with
too little risk often means that the organisation is being too conservative and is limiting their potential
for growth—too much risk, however, and the company is likely to crash and burn at some point along
the way.
As projects are a regular part of business, it only stands to reason that they incur a certain level of risk
as well. Managing project risk deals with the activities involved in identifying potential risks, assessing
and analyzing them, finally monitoring them throughout the life of a project. Every project will have a
unique set of risks based on the specific details of the work being done. It is often up to the project
manager to outline these risks ahead of time and include them as part of the overall plan of the
project.
10 | P a g e
Dealing with the risk inside of a project isn’t much different from dealing with any other business risks
that you encounter. While it probably isn’t possible to foresee all potential risks that could come down
the line, planning for as many of them as you can will give the project its greatest chance at success.
Activity 1
11 | P a g e
Activity 1
12 | P a g e
Risk is defined in ISO 31000 as2:
Key processes in risk management are risk assessment and risk treatment; together these comprise
the four steps of risk identification, risk analysis and risk evaluation and risk treatment. These aim to
determine:
There is no one method for risk assessment and treatment. As a general rule, the type and rigour of
the risk assessment process adopted depends on the potential severity of the consequences and their
likelihood. For the greatest severity consequences or where there are high levels of risk, very rigorous
risk assessment is required. On the other hand, where the consequences are less serious or the level
of risk is low, simpler techniques can be used
Outline
In Broadleaf we normally advocate an approach to managing risk that is based on ISO 31000:2009.
The process is depicted in outline below.
2
Source: Broadleaf, as at http://broadleaf.com.au/resource-material/risk-assessment-and-risk-treatment/, as
on 5th December, 2016.
13 | P a g e
The risk management process
Communication and consultation are therefore key supporting activities for all parts of the risk
management process. Communication and consultation are processes and not outcomes. They
normally take place with stakeholders, defined as those persons or organisations that can affect, be
affected by or perceive themselves to be affected by a decision or activity.
Monitoring and review are two distinct processes intended to detect change and determine the
ongoing validity of assumptions. Both are necessary to ensure that an organisation maintains a current
and correct understanding of its risks, and that those risks remain within its risk criteria.
14 | P a g e
Both require a systematic approach, integrated into an organisation’s management systems, that
reflects the speed at which change occurs within the internal and external environment.
Before any risk management activity takes place and especially before risk assessment occurs, the
external, internal and risk management contexts should be established.
A key aim of the ‘establish the context’ step in the risk management process is to identify the
organisation’s objectives, and those external and internal factors that could be a source of
uncertainty, so that risks can be identified more readily.
Establishing the context also provides the information that allows the other steps of the risk
management process to occur.
A risk is a future event that may or may not happen, but if it does occur it will have an effect on project
scope, schedule, budget, or quality. It may have one or more causes and, if it occurs, it may have one
or more impacts.
All project activities carry some element of risk, which are uncertainties about them that could affect
the project for better or worse. It is important to understand the difference between business risks
and project risks. What a project manager needs to know is what is the likelihood a risk will occur and
if it does what it will impact as this affects the project plan.
What is certain is that if the risk happens in the future it will have an effect on project project scope,
schedule, cost, or quality.
15 | P a g e
It may have one or more causes and, if it occurs, it may have one or more impacts. All project activities
carry some element of risk, which are uncertainties about them that could affect the project for better
or worse.
The important distinction that must be understood is the difference between business risks and
project risks. Business risks are more general and relate to the organisation, whereas project risks
relate specifically to the project objectives.
Business risk implies uncertainty in profits or danger of loss and the events that could pose a risk due
to some unforeseen events in future, which causes business to fail.
For example,
● Project scope—to build the stadium to the agreed specification within an agreed timescale and
budget.
● Project risk—that the building costs may be higher than expected because of an increase in materials
or labor costs.
● Business risk—even if the stadium is constructed on time and within budget that it will not make
money for the business.
This could be because of lower than expected ticket sales or higher than expected maintenance costs.
These risks exist outside of the scope of the project. Risks are caused by a requirement, assumption,
constraint, or condition that creates the possibility of negative or positive outcomes.
Continuing the example above: a risk cause would be a change in health and safety legislation during
the build phase. Whereas a risk outcome would be increased costs to modify the parts of the stadium
in accordance with the new legislation before it can be used.
16 | P a g e
Risks include both threats and opportunities that project managers must assess. Opportunities do
have uncertainty associated with them, but they should be grasped, and action taken to ensure that
they are realized. Threats have potentially negative impacts that the project management team should
strive to mitigate. Organisations and stakeholders are willing to accept varying degrees of risk. This is
called risk tolerance. Risks that are threats to the project may be accepted if they are in balance with
the rewards that may be gained from taking them.
For example, using unproven productivity-boosting software is a risk taken in the expectation that the
work will be completed more quickly and with fewer resources. The risk of the software not
performing as advertised would need to be considered as part of the risk assessment.
All organisations have a ‘risk tolerance’ that is affected by their legal status and their culture. For
instance, a pension fund is likely to be more risk averse than a small startup company. In all cases,
attitudes to risk are driven by perception, tolerances, and other biases, which should be made explicit
wherever possible.
To be successful, the organisation should be committed to address risk management proactively and
consistently throughout the project. A conscious choice must be made at all levels to actively identify
and pursue effective risk management during the life of the project. Communication about risk and
its handling should be open and honest.
Risk exists the moment a project is conceived. Moving forward on a project without a proactive focus
on risk management increases the impact that a realized risk can have on the project and can
potentially lead to project failure.
17 | P a g e
Activity 2
18 | P a g e
Activity 2
Documenting the context provides an overview of the organisation, its objectives and specific criteria
for business success, the objectives and scope of the risk assessment activity and a set of key elements
for structuring the risk identification activity. As part of the planning process, establishing the context
is an essential and very important step in the risk assessment process. It is focused on3:
Obtaining an understanding of the subject of the risk assessment activity and its risks.
Establishing the scope of the risk assessment activity being undertaken.
Developing a structure for the risk assessment activities.
Elements of context requiring consideration include the internal and external environments of the
organisation and the purpose of the risk management activity. The depth of information required
relates directly to the size and complexity of the risk management activity being undertaken.
3
Source: risk.com.au, as at http://www.risk.com.au/establish_context, as on 5th December, 2016.
19 | P a g e
External Context
Defining the external context includes consideration of the external environment in which the
organisation operates and understanding the relationship between the environment, external
stakeholders and the organisation. The external context may include the:
Internal Context
Defining the internal context includes documenting the key aspects of the business and may include:
Defining the risk management context includes establishing key information related to the subject
(activity, project, organisation etc) to which the risk assessment process is being applied. This includes
defining the:
20 | P a g e
Identify project risks using valid and reliable risk identification methods
Before a project even gets started, it is essential that any potential risks are identified
and a strategy for managing such risks developed. One of the best ways to do this is by learning from
past experience—either your own experiences, or those of the organisation as a whole.
Even if the type of project you are working on presently is different than anything you have done
before, it is likely the organisation has already done something at least remotely similar. Look back on
those projects to see how they played out. Did anything pop up along the way that you could be ready
for this time? Learning from the past is the best way to predict the future, especially in business.
Another risk identification strategy to use is speaking with all of the members of the project team and
asking for their input. Although they might not have the same high-level view of the project that you
do as manager, they likely have a great deal of knowledge within their specific field of expertise. Ask
them to highlight the potential risks that they see developing down the line and work on making plans
for those possibilities as well. There is only one output of this process and that is the all-important risk
register, which plays a key role in how well a project is monitoring during its execution.
Among the most common risks that need to be dealt with are losing key members of the team partway
through the project, or running out of money to see the project all the way through to completion. In
the case of both of those risks, there are steps that can be taken to mitigate the damage they would
do and be prepared in the event that they do occur.
For example, having redundancy within your team can help to limit the damage if a team member
moves on to another job partway through the work, and building the project in such a way that it can
be ‘paused’ while waiting for more funds could prevent it from being completely wiped out by a
temporary lack of funding.
21 | P a g e
Identification of project risks is a subsidiary process that involves using of a risk identification
approach4 to define which risks and threats surround the project and affect project activities, and
to document risk characteristics. The project risk identification involves participation of the project
manager, project team members, an assigned risk management team and risk experts,
stakeholders. Project risk identification is an iterative process because new risks and threats may
arise any time during the course of a project.
One of the best risk identification approaches is a workshop with project participants, especially
with those carrying out daily duties. Workshops (or project risk management presentations) involve
using a combination of both brainstorming and reviewing to create standard project risk lists and
define types of project risks. All risks of a project can be classified into the following types:
Strategic risks concern long-term strategic objectives of the project. This type of project
risks affects such areas as initial project financing, technology, reputation, changes in the
physical environment, etc.
Operational risks concern issues and problems that project participants are confronted
with from day to day. Mitigation of operational risks contributes to reducing of strategic
risks.
Compliance risks concern issues associated with the need to comply the project course
with documented statements and regulations. Managing compliance risks lets ensure that
current project activities are undertaken in the manner which project stakeholders and
customers expect.
Financial risks are associated with existing financial structure of the project and with all the
transactions made to carry out the project. Identification of financial risks involves
examining daily operations. Financial risks are an indicator that shows whether current
project has serious implications for viability.
Knowledge risks are associated with effective management and control of knowledge
resources, communication mechanisms, and protection systems. Project knowledge risks
may include abuse of intellectual property, loss of the key project staff, system malfunction,
etc.
The given project risk classification is also known as the nature of project risks. It covers the major
project risks. Sometimes, the given risk classification is broken down into a wider range of project
risks, including environmental risks, staff management risks, political and economic stability risks,
safety risks.
4
Source: My Management Guide, as at http://www.mymanagementguide.com/guidelines/project-
management/risk-management/risk-analysis-assessment-identifying-describing-estimating-project-risks/, as
on 5th December, 2016.
22 | P a g e
Activity 3
Create a list of possible questions you could ask members of the project team to identify the
project risks (aim for at least 6 questions).
23 | P a g e
Activity 3
All projects start off with a bang. Yet, some are destined for failure from its very inception, whilst
others collapse later on.
Yet, others reach the finish line triumphantly, carrying with them a few scars from battles faced and
overcome.
Therefore, in order to minimise project failure, it is prudent to identify the main causative factors that
contribute to project risk.
5
Source: Tutorials Point, as at
https://www.tutorialspoint.com/management_concepts/project_risk_categories.htm, as on 5th December,
2016.
24 | P a g e
The three main constraints on projects can be classified as schedule, scope and resources, and the
mishandling of each can cause a ripple effect on the project, which would then face imminent collapse.
Scope Risk
Defining what is required is not always easy. However, so as to ensure that scope risk is minimised,
the deliverables, the objectives, the project charter, and of course, the scope needs to be clearly
defined.
All scope risks, be they quantifiable or not, needs to recognize. Scope creep, hardware defects,
software defects, an insufficiently defined scope, unexpected changes in the legal or regulatory
framework and integration defects can all be classified under the broad umbrella of scope risk.
There are a variety of methods that help stakeholders identify the scope of the project. The risk
framework analyses the project's dependency on technology and the market and then assesses how
changes in each would affect the outcome of the project.
Similarly, the risk complexity index looks at the technical aspects of the projects, which can be easily
quantified and allocated a number between 0 and 99 to indicate the risk of the project.
Risk assessment, on the other hand, uses a grid of technology, structure and magnitude to assess the
proposed risk of the project.
A work breakdown structure, commonly abbreviated as WBS, also considers the risks of projects,
which are ill defined and where the stated objectives are ambiguous.
Scope risks can be minimised and managed with savvy planning. Defining the project clearly, managing
the changes in scope throughout the duration of the project, making use of risk registers to better
manage risks, identifying the causative factors, and the appropriate responses to risky situations and
developing greater risk tolerance in collaboration with the customer, would pay great dividends in the
long run.
Schedule Risk
Keeping to timelines and agreed critical paths is one of the most difficult situations that project
managers now face.
An extensive reliance on external parties whose output is not within the project's scope of control,
estimation errors, which most often are too optimistic, hardware delays and putting off decision
making, all tend to delay the project at hand.
To minimise schedule risks, there are a few time-tested methods that can be put to good use. The
process flow of the project should be broken down into small, clearly defined components where the
allocated timeframe for each process is relatively short in duration (this makes it easy to identify things
when tasks veer off schedule, at its earliest).
25 | P a g e
Be wary of team members or external parties, who hesitate to give estimates or whose estimates
seem unrealistic based on historical data and previous experience.
When formulating the critical path, ensure that any holidays that arise are in-built into the equation,
so that realistic expectations are created, right from inception. Defining re-work loops too is also
recommended, wherever possible.
Resource Risk
People and funds are any project's main resource base. If the people are unskilled or incompetent to
perform the task at hand, if the project is under-staffed from the beginning, or if key project members
come on aboard far after the inception of the project, there is an obvious project risk that has ill-
planned human resources as its base.
Similarly, from a financial perspective, if insufficient funds are provided to carry out the necessary
tasks, be it relevant training programs for the people in question or be it inadequate investments in
technology or required machinery, the project is doomed to fail from inception.
Estimating project costs accurately, allocating a suitable budget to meet these costs, not placing undue
expectations on the capacity of the staff in question and avoiding burn-out at a later date are all factors
that help minimise the project resource risk.
Outsourced functions merit even more attention to detail, as it is for the most part, it is away from
the direct purview of the project manager. Clearly defined contracts and regular monitoring would
lessen this risk substantially.
Conflict management, which too generally arises with the progression of a project, should also be
handled in a skilful manner, so that the project has a smooth run throughout its entire duration.
As is readily apparent, all projects do run the risk of failure due to unplanned contingencies and
inaccurate estimates.
Yet, careful planning, constraint management, successful recovery from mistakes if and when they do
arise will minimise most risks. True, luck too, does play a part in the success of a project, but hard work
and savvy management practices will override most such difficulties.
Project risk description is a subsidiary process that follows the project risk identification process
and aims at displaying the identified risks in a structure format (often by using tables and
spreadsheets). The project results in creation of a risk description table that facilitates better
assessment and further risk management. By considering consequences and probability of each risk
set out in the risk description table, the project manager can prioritize key risks which should be
reviewed and analysed in more detail. Then the project manager makes descriptions for the key
risks and the rest risks to be used later for project risk analyzing. Prioritization of the key risks results
in creation of the agreed risk priority scale.
26 | P a g e
Activity 4
Describe a possible risk categorisation approach you could use for a small scale IT project (such
as a web site development or server implementation).
27 | P a g e
Activity 4
Determine risk analysis classification criteria and apply to agreed risk ranking
system
With a list in place that highlights which risks you will be taking on during the project, you can start
looking closely at each of them and deciding what kind of threat they actually are. Is the risk something
that would do long-term damage to the organisation if it came to pass? Usually, risks that fall into this
category are of the legal variety. A project that could put you in legal trouble for one reason or another
is often one to be avoided. However, if the worst-case for a project is simply some wasted time and a
small amount of wasted capital, you may decide that those risks are worth the potential reward. It is
all about balance in risk management, so the pros and cons have to be weighed carefully with respect
to each potential risk.
28 | P a g e
Both qualitative and quantitative analysis must be performed for each risk. Firstly, each risk is assessed
and rated according to its likely probability and then secondly on the impact it would have on the
project if it happened. There are a variety of tools that are used to assist in these processes:
29 | P a g e
Beyond what kind of damage a certain risk could do is the consideration of how likely that risk is to
occur. For example, a risk that is very likely to occur and would also be highly damaging to the company
is one to take very seriously. On the other hand, a risk that is unlikely to be realized and also wouldn’t
do much harm is one that you can mostly ignore.
Activity 5
30 | P a g e
Activity 5
31 | P a g e
Use risk analysis processes, within delegated authority, to analyse and qualify
risks, threats and opportunities
Performing a Risk analysis
This process analyses each risk from the risk register in terms of its probability and impact on the
project if it were to occur. It should be performed as soon as possible after risks have been identified
so that appropriate time and resources can be allocated to the more serious risks. It uses the
probability and impact matrix (PIM) to rank and prioritize risks, and this information is placed back on
the risk register.
Like all the processes and procedures for managing risk, this one should be performed regularly
because new risks will be identified and the characteristics of existing risks may change as the project
progresses. The risk management plan (part of the overall project plan) will explain the overall
approach that needs to be taken to risk management on this particular project. It will detail how much
risk is acceptable and who should be involved in carrying out the qualitative analysis of the known
risks.
The key elements of this plan used in this process are roles and responsibilities for conducting risk
management, budget, schedule for risk management activities, definition of risk categories, definition
of risk probability and impact, probability and impact matrix, and stakeholder’s risk tolerances.
32 | P a g e
The scope of the project will have a direct bearing on the type and amount of risk that is likely to be
encountered. In general terms, certain types of project are associated with certain types of risk. For
example, Construction projects the risks would include such things like, planning permissions,
weather, health and safety legislation, and labor union issues.
IT project risks tend to be concerned with whether development software will perform as advertised
and with compatibility issues. Projects of a common or recurrent type tend to have well understood
risks, whereas those breaking new ground tend to have more uncertainty.
33 | P a g e
Both the likelihood and impact are given a score according to the definitions given in the risk plan and
these can be considered together to provide a risk score. Risks with a high score will be given high
priority while those with a low score will be included on a watch list for future monitoring.
This specifies combinations of probability and impact that lead to rating the risks
as low, moderate, or high priority. The type of management response should be:
1) Threats
○ High-risk (shown in dark gray boxes) are priority and need a hard line response.
○ Low-risk (mid-gray boxes) need to have a contingency made for them & monitored
2) Opportunities
○ Dark gray boxes show ones to pursue first as they offer the most benefit & are more easily achieved.
○ Mid-gray boxes indicate the ones to be monitored.
34 | P a g e
It is possible to rate a risk separately for cost, time, scope and quality. In addition, it can develop ways
to determine one overall rating for each risk. An overall rating scheme can be developed to reflect the
organisation’s preference for one objective over another and using those preferences to develop a
weighting of the risks that are assessed by objective.
You will also need to examine how well the risk is understood and the accuracy, quality, reliability, and
integrity of the data regarding it. If data quality is unacceptable, it may be necessary to gather higher-
quality data. The risk breakdown structure (RBS) is the normal way to help structure and organise all
identified risks into appropriate categories, and these will assist in determining which aspects of the
project have the highest degree of uncertainty.
Risks that are likely to occur in the immediate future require more urgent attention than those that
may occur later on in the project. Indicators of priority should include the time required to affect a
risk response. In some qualitative analyses the assessment of risk urgency can be combined with the
risk ranking determined from the probability and impact matrix to give a final risk severity rating.
Relative ranking or priority list of project risks—the probability and impact matrix can be used to
classify risks according to their individual significance. Risks may be listed by priority separately for
schedule, cost, and performance since organisations may value one objective over another. The
project manager can then use the prioritised list of risks to focus attention on those items of high
significance to the most important objectives.
Risks grouped by categories—this can point to common underlying causes of risk, which may in turn
suggest a holistic approach to dealing with them. Discovering concentrations of risk may also improve
the effectiveness of risk responses. List of risks requiring response in the near-term —includes those
risks that require an urgent response and those that can be handled at a later date may be put into
different groups.
List of risks for additional analysis and response—some risks might warrant more analysis, including
Quantitative Risk Analysis, as well as response action.
Watch lists of low-priority risks—those that are not assessed as important in this process can be placed
on a watch list for continued monitoring.
Trends in the analysis results—as this process is iterative, trends for particular types of risk may
become apparent. This information can be fed back into the risk management process.
35 | P a g e
Assumptions log—the project scope statement may contain assumptions about the project, which
may be updated as a result of the qualitative risk analysis done in this process.
This is the process of analyzing the effect of those risks identified as having the potential to
substantially impact the project. It may be used to assign a numerical rating to those risks individually
or to evaluate their aggregate effect. You will need to use the Risk Management Plan (part of the
overall Project Plan) and the Risk Register, along with cost and schedule information.
In some projects it may be possible to develop effective risk responses without this process. The
availability of time and budget, and the need for qualitative or quantitative statements about risk and
impacts, will determine which method(s) to use.
Structured interviews can be used to determine the probability and impact of risks from subject
matter experts. This information can then be used in the following modelling techniques:
Sensitivity Analysis—this involves analyzing the project to determine how sensitive is to particular risks
by analyzing the impact and severity of each risk.
Expected Monetary Value (EMV) Analysis—determining the expected monetary value is to multiply
the likelihood by the cost impact to obtain an expected value for each risk, these are then added up
to obtain the expected monetary value for the project. A typical way of calculating EMV is using
decision trees:
Decision Tree Analysis—these are in the form of a flow diagram where each node, represented by a
rectangle, contains a description of the risk aspect and its cost. These rectangles are linked together
via arrows each arrow leading to another box representing the percentage probability.
36 | P a g e
Tornado Diagrams—these are named because of their funnel shaped and portray graphically the
project sensitivity to cost or other factors. Each tornado diagram will represent the impact of risks in
terms of particular aspects. These aspects may be the stages of phases of all project, and are ranked
vertically and represented by a horizontal bar showing plus or minus cost impacts.
Monte Carlo Analysis—is normally calculated by computer by analyzing many scenarios for the project
schedule and calculating the impact of particular the risk events. It is helpful in identifying risks and
the effect they have on the project schedule.
Rather than ask each expert for a single value for each, the project manager would normally encourage
each expert to provide an optimistic, pessimistic and realistic probability and impact value for each
risk.
The risk register is further updated to include a quantitative risk report detailing quantitative
approaches, outputs, and recommendations. Updates include the following:
Probabilistic Analysis of the Project—Estimates are made of potential project schedule and cost
outcomes listing the possible completion dates and costs with their associated confidence levels. This
output, often expressed as a cumulative distribution, can be used with stakeholder risk tolerances to
permit quantification of the cost and time contingency reserves.
37 | P a g e
Probability of Achieving Cost and Time Objectives—with the risks facing the project, the probability of
achieving project objectives under the current plan can be estimated using quantitative risk analysis
results.
Prioritised List of Quantified Risks—this list of risks includes those that pose the greatest threat or
present the greatest opportunity to the project. These include the risks that may have the greatest
effect on cost contingency and those that are most likely to influence the critical path. These risks may
be identified, in some cases, through a tornado diagram generated as a result of the simulation
analyses.
Trends in the analysis results. As this process is iterative, trends for particular types of risk may become
apparent. This information can be fed back into the risk management process.
Project risk estimating is a subsidiary process that enables an analysis of project risks and
allows removing or mitigating identified risks which threaten successful achievement of
project objectives or producing of project deliverables. A properly undertaken project risk
analysis increases a probability of successful completion of project in terms of time, cost
and performance objectives.
There are common suggestions for conducting the project risk analysis process. The
suggestions involve investigation of various risks and uncertainties, including the following:
All the listed uncertainties produce an exposure to risks which may cause a failure of:
Project budget
Completion dates
Performance objectives
In order to remove or at least mitigate risks, the project manager in cooperation with risk
analysts and experts analyses uncertainties of project activities and estimates risks. The
process of project risk estimating is usually divided into two sub-processes, including
Qualitative analysis and Quantitative analysis.
Qualitative analysis allows defining factors and causes that create a risk for project.
Qualitative analysis can be done by using checklists, questionnaires, interviews or
brainstorming sessions. The analysis uses risk assessment forms which describe the
impacts of each risk and a likelihood of risk occurrence. Qualitative analysis uses the
following documents:
38 | P a g e
Risk register
Project scope statement
Risk management plan
Risk register
Risk management plan
Cost management plan
Schedule management plan
Both analyses result in making updates to the risk register. After Qualitative analysis and
Quantitative analysis have been conducted, the results can be used to create a profile for
each risk. A risk profile is a signature that rates each risk and provides a foundation for
prioritizing risk treatment efforts. Risk profiles are also used later for reporting project risk
activities.
Activity 6
Select one risk analysis tool and describe how it can be used to analyse project risk.
39 | P a g e
Activity 6
40 | P a g e
Determine risk priorities in agreement with project client and other
stakeholders6
Risk analysis is about developing an understanding of each risk. It provides an input to decisions on
whether risks need to be further controlled and the most appropriate and cost-effective treatment
actions to take.
Risk analysis involves consideration of the positive and negative consequences and the likelihood that
those consequences may occur. Factors that affect consequences and likelihood may be identified.
Risk is analysed by combining consequences and likelihood, taking into account the existing controls.
Broadleaf uses a qualitative method of risk analysis to prioritise risks for attention, at least initially.
Even if quantitative analysis is required later, we normally find it efficient to use a qualitative system
for screening purposes.
Quantitative approaches can be used when more definition and rigour are needed. In general they are
only used:
We often conduct the risk rating process during the workshop used for risk identification. However,
sometimes it is preferable to analyse the risks at another time using subject matter specialists, and
then reconvene the original workshop team to agree and verify the ratings.
We always analyse the risk in terms of how the organisation currently operates, and in particular
taking into account existing controls and their effectiveness. We use control effectiveness (CE) to take
into account both the adequacy and effectiveness of the controls for a particular risk.
We also determine a measure of potential exposure (PE) that represents the total plausible maximum
impact on the organisation arising from a risk without regard to controls. This is estimated by
considering the consequences that could arise if all existing controls were ineffective or missing. This
measure is use to identify the key controls that should be subject to assurance and, in particular,
monitored continuously for effectiveness.
6
Source: Bright Hub PM, as at http://www.brighthubpm.com/risk-management/34628-risk-management-
prioritizing-risk/, as on 5th December, 2016; MDC Systems, as at http://mdcsystems.com/risk-management-
recognizing-and-prioritizing-project-risks/, as on 5th December, 2016.
41 | P a g e
The risks and the associated controls that should be subject to planned assurance, particularly
through continual monitoring as well as periodic review.
Assigning Priorities
The word risk may be looked at from many different angles. In risk management, risks are tools. The
trick is to align those tools in such a way that they will work for you and not against you.
During project initiation meetings, with the help of team members and stakeholders, identify risks.
The best way to accomplish this is through past experience, including positive and negative results.
What worked and what didn't? What made a prior risk a risk to begin with? Was the risk external or
internal? Was the risk handled properly? Who handled the risk?
For risk management to be effective, you must take the time to identify risks; otherwise it's impossible
to prioritize them. Once you've identified potential risks, use a risk treatment plan template to help
you prioritize them. Project managers need to be a sort of judge and jury when prioritizing risk.
42 | P a g e
Too much intervention to align your risks will produce chaos. To begin, put on that judge hat and get
a head start on your project using effective prioritizing skills.
43 | P a g e
Align Your Toolbox
To help you align and prioritize risks, follow these tips:
Project or Product Risk - This should be first. If an identified risk will affect the project or product,
that's important.
Process - What is your process for the project? How will it flow? Risks you identify here are
important to stay on track.
Resources - Who will be the best team for the project? Use Six Sigma to help you choose good
team members.
Stakeholders - Who are the stakeholders and at what level will they be involved with any risk?
Using stakeholder management is essential in risk management.
Risk Tools - What tools will you put in place to deal with risk? Your risk treatment plan can help
you define these tools.
Acceptable Risk - These should be a low priority and are not risks that affect a project's outcome.
Evaluate Risk - Hold a post-project meeting to evaluate your prioritised risks.
Use the tools and templates provided in this article to help you take a lot at potential risks before the
project begins. Scheduling time to analyse risks is essential if you want your projects, teams, and
processes to succeed.
Since every project is unique, the priorities of certain risks will be different for every project. Three
simple steps can be used to create a project Risk Matrix in order prioritize risk events. It is imperative
that all stakeholders are involved in this process so all points of view are taken into account. In order
for risks to be properly mitigated, the matrix should be revisited and updated on a regular basis.
1) Identify: Similar to recognizing risk, listing every potential risk to the project is necessary before any
assessments can take place. Even events that have only a slight chance of occurring should be
considered when creating the beginnings of your Risk Matrix. For example, a lost time accident could
occur on any project but, with the proper safety precautions in place, it is rare. On the other hand,
change orders due to unforeseen conditions are almost inevitable on any project, but with the proper
precautions taking place by all parties the cost of these could be minimised.
2) Measure Likelihood: Each risk identified should be given a ranking based on the likelihood of them
occurring. The scale for this ranking is at the discretion of the project team, it could be 1-5 with 1 being
unlikely and 5 being likely, or it could be on a likelihood percentage basis. Using the examples
discussed above, a lost time accident while using a contractor with a stellar safety record would be
ranked as a 1, while encountering unforeseen conditions on a renovation without existing drawings
would get a 5. Each risk on the list should be weighed and discussed with the stakeholders.
3) Assess Impact: Using the same guidelines established when calculating likelihood, the project
stakeholders should next rank the impact of different risks. Continuing with our examples, a lost time
accident could be devastating to a project with little to no float and given a ranking of 5. However, if
the project is not a tightly scheduled one and has a lot of float, then this occurrence may only be given
a 3. The impact may also change throughout the project duration. A change order from an unforeseen
condition may not affect the project if found early when there is float in the schedule or contingencies
are high, ranking it at a 1, but as the project draws to a close that same change request may cause
schedule disruption or budget problems, making the impact more like a 4.
44 | P a g e
4) Find the Overall Calculated Risk: Depending on the scale used to measure likelihood and impact, a
formula can be put together to calculate the overall risk associated with a certain event. From there,
the risks can be weighed low, medium, and high so that the team can determine which risks are
priorities. After the overall risk for each event is calculated, stakeholders should look at the urgency
of each kind of risk. If the majority of the risks are shown as high, they should be revisited and
reranked. If every risk on the project is labeled high priority, then in essence you have just
deprioritised all of them, because you won’t be able to concentrate on every risk all the time- the
entire point of the matrix is to demonstrate where to focus mitigation efforts.
Many projects begin in an organised manner with a strong Risk Matrix, and as the day to day
management of the project carries on, it becomes harder to stay on top of this document. The failure
to update the Risk Matrix is the most common reason that some risks seem to arise out of nowhere
at the last minute. In order to have a successful risk management program, the Risk Matrix must be
updated and controlled on a regular basis. Priorities will shift, impacts will change, and new risks will
arise. If the Risk Matrix is consistently being evaluated, plans to mitigate the high likely high impact
risks.
Mitigating the highest calculated risks does not completely deter them from occurring, but establishes
a workarounds and contingencies to lessen the overall impact to the project. Using the examples
discussed above, in order to mitigate the risk of a lost-time accident, you would ensure that all parties
are properly safety trained and have submitted their respective safety manuals. You would also build
your schedule to have little or no trade stacking in congested areas and continue regular jobsite safety
audits. In order to mitigate the risk of change orders resulting from unforeseen conditions, you would
have both the designer and contractor perform site surveys, have coordination and shop drawing
reviews, and have regular stakeholder meetings to discuss design issues. To lessen the project impact
should either of the above risk events occur, the project would ideally have float built into the schedule
as well as contingencies in the budget.
Every project comes with risks, and risk events will occur no matter the initial plan. A solid risk
management program is the best way to keep these risk factors low, keeping priorities in place for the
good of the project. Stakeholders from all parties must be involved in contributing to the Risk Matrix
early and regularly, which can be accomplished by following the three simple steps of recognizing,
prioritizing, and controlling.
45 | P a g e
Activity 7
46 | P a g e
Activity 7
Document risk analysis outcomes for inclusion in risk register and risk
management plan
A risk plan details how the project management team will perform risk management for this project.
It does not involve actually identifying project risk. The aim of the risk plan is to ensure that the risk
management protocol that is used on the project is commensurate with both the risks and the
importance of the project to the organisation.
Establishing this protocol early on in the project ensures that all members of the project management
team are using the same methods to evaluate risks and that the associated tasks are budgeted for in
the project plan.
The level of detail in the risk plan will depend upon the level of risk within the project and the level of
risk that the performing organisation is prepared to take. This plan will need to be consistent with
other certain other project documents. For example, the project charter document provides the
selected project manager with the authority to organise and control the defined resources of the
organisation for the duration of the project. It can also be referred to as the project definition, or
project statement and is a statement of the scope, objectives, and participants in a project.
47 | P a g e
It establishes the authority assigned to the project manager, especially in a matrix management
environment, and is completed by the sponsor or individual initiating the project. The project name is
usually shortened or abbreviated into a working title for ease of communication. There are several
key sections that you need to include in your project charter. They are:
1. Contact points for key individuals of the project.
2. Project Purpose—the issue/problem to be solved by the project.
3. Business Objectives for the project as they relate to the organisations strategic plan.
4. Assumptions that have been made as part of the project.
5. Description of the project.
6. Definition of the project scope and the limits identified.
7. Overview of major milestones and deliverables for the project.
8. Project Authority—including an organisation chart and definition of roles and responsibilities.
9. Resources required for the project including costings, equipment. staffing, support, operational &
IT facilities.
The scope statement defines the scope of the project, which will have a direct bearing on the type and
amount of risk that is likely to be encountered. It provides a clear definition of such risk areas.
The cost plan defines how risk in terms of budgets, contingencies, and management reserves will be
reported and accessed.
The schedule plan includes information about activities and their timing including aspects such as
internal and external constraints that will help identify risk areas.
The communications plan includes information on all key stakeholders and in particular their concerns
for specific risks, and hence, how such communications should be handled.
You will also need to take account of any legal obligations and regulatory frameworks that the
organisation may be subjected to as well as processes and procedures to be followed, the industry
and its norms towards risk and the organisations appetite towards risk.
48 | P a g e
Collective decision-making is very important area of project management that can make or break this
part of the project. Almost all risk management activities will involve meetings between the project
manager, the team and other stakeholders in order to make decisions about the activity definitions
and associated estimates.
How well these meetings are conducted will have a major impact on how smoothly the project runs.
The resulting risk management plan forms part of the project plan and describes how managing risk
will be structured and performed on the project. It contains the following elements:
Methodology
Defines the approaches, tools, and data sources that may be used.
Budgeting
This part of the plan assigns resources, estimates funds needed for managing risk. These are included
in the cost performance baseline, and establish how any extra funding required (if risks are realized)
will be raised.
Timing
This part of the plan defines when and how often the risk management activities will be performed
throughout the project life cycle.
49 | P a g e
Risk categories
This provides a structure that ensures a comprehensive process of systematically identifying risks to a
consistent level of detail. An organisation can use a previously prepared categorization framework,
which might take the form of a simple list of categories or might be structured into a risk breakdown
structure (RBS) as shown in the diagram.
This is a hierarchically organised depiction of the identified project risks arranged by risk category and
subcategory that identifies the various areas and causes of potential risks.
50 | P a g e
The table above is an example of definitions that could be used in evaluating risk impacts related to
scope, quality, time and cost. By using pre-defined definitions in this way, the project management
team ensures that everyone involved is talking the same language when it comes to risk.
The specific combinations of probability and impact that lead to a risk being rated as ‘extreme’, ‘high,’
‘moderate,’ ‘low’ or ‘minimal’ importance, with the corresponding importance for planning responses
to the risk, are usually set by the organisation.
51 | P a g e
Reporting Formats
This part of the plan describes how the outcomes of the risk management processes will be
documented, analysed, and communicated. It describes the content and format of the risk register as
well as any other risk reports required.
Tracking
This part of the plan describes how risk activities will be recorded for the benefit of the current project,
as well as for future needs and lessons learned, as well as whether and how risk management
processes will be audited.
Options
It is usually not cost-effective or even desirable to implement all possible risk treatments. It is,
however, necessary to choose, prioritise and implement the most appropriate combination of risk
treatments. Treatment options, or more usually combinations of options, are selected by
considering factors such as costs and benefits, effectiveness and other criteria of relevance to the
organisation. Factors such as legal, social, political and economic matters may need to be taken into
account.
Treatment of individual risks seldom occurs in isolation, and options should be considered together
as part of an overall treatment strategy. Having a clear understanding of a complete treatment
strategy is important to ensure that critical dependencies and linkages are not compromised and to
ensure the use of resources and budgets is efficient. For this reason development of an overall
treatment strategy should be a top-down process, driven jointly by the need to achieve objectives
and satisfy organisational and budgetary constraints while controlling uncertainty to the extent that
this is desirable.
We advise our clients to be flexible about risk treatment options and consult broadly with
stakeholders as well as with peers and specialists. Many treatments need be acceptable to
stakeholders or those who are involved in implementation if they are to be effective and
sustainable.
We often use bow-tie analysis to help our clients identify possible risk treatment measures based
on control gaps.
The primary consideration for most risks is whether the risk can be further treated in a way that is
reasonable and cost effective.
52 | P a g e
Determining the cost-effectiveness of further treatment involves the application of cost benefit
analysis. This should consider all direct costs and ancillary costs (dis-benefits) as well as all the direct
benefits and ancillary benefits (opportunities). If most of the costs or the benefits are unlikely to be
experienced within the first year or so then it may be necessary to discount the benefits and costs
to allow the assessment to be made ‘in today’s money’.
We help our clients identify possible options for risk treatment and then test each of these using
cost benefit analysis. As with risk assessment, preparation for a risk treatment workshop is vital if
it is to be effective and efficient.
The table below contains an example of cost benefit analysis applied to risk treatment options.
Table 1: Treatment options associated with surface traffic accidents at a mine site
Completion
Treatment option Benefits Disadvantages Result
date
Understand the current
Survey current rules and situation and the potential
Will require some
variations across for confusion. Move to
effort to achieve.
company. Develop a understand the need for
May conclude that
standard for safe driving despatch or the
the removal of Yes 31-Jul-13
in mines and safe alternatives. Ultimately it
despatch is not
behaviours. Consider the will reduce the likelihood of
desirable from a
role of despatch on each accidents that can cause
safety perspective.
mine. death and serious injury
and plant damage.
Currently there are no
Conduct a study to
standards or rules. Many
determine safe speeds Will require effort to
vehicles do not have
below and above ground. achieve (but could be
speedos. Speeds are Yes 31-Jul-13
Develop a strategy to limit conducted at the
enforced by removal of
speeds through blocking same time as 1).
gears which places motors
gears etc.
under stress.
Survey pedestrian and
vehicle interactions below
and above ground. Development of a solution
Consider proximity that is suitable for all mines. Will take some effort
devices as part of the Consistency between mines to achieve. Will lead
solution. Develop and avoidance of to some opposition Maybe 31-Dec-13
standards in terms of ambiguity. Provide a basis as it may restrict
delaminated areas, for training and where people walk.
walking areas etc. Train all enforcement of standards.
mine staff on rules and
enforce.
53 | P a g e
Risk treatment plans
We help our clients generate and record potential options for risk treatment as that shown above.
For each option, the benefit and costs or disadvantages are expressed and a decision is placed in
the final column. The decision is either ‘yes’ because the risk treatment option is value accretive, or
‘no’ because it is not. If the evaluation in inconclusive, a ‘maybe’ is recorded and more detailed
benefit-cost analysis may be required.
All those options marked ‘yes’ go ahead as risk treatment measures and plans are developed for
their implementation.
Activity 8
What information is documented in a risk register and who uses this information?
54 | P a g e
Activity 8
55 | P a g e
Identify and document existing risk controls
Project risks should be documented in the risk register, a list of all of the identified risks, their root
causes, categories and responses. Because the assessment of risk is an ongoing activity, the risk
register will be updated continuously throughout the life of the project.
All project team members should be encouraged to identify risks and this is an iterative process
because new risks may become known as the project progresses. The process of identification should
involve the project team so they can develop and maintain a sense of ownership and responsibility for
the risks and associated risk response actions.
The risk plan defines the level of risk that is considered tolerable for the project, how all this will be
managed, who will be responsible for them, what time and cost is needed for each, and how risk will
be communicated. The stakeholder register lists all of the project stakeholders as well as describing
and classifying them. This information will be useful in soliciting inputs for identifying risk, as it will
ensure that key stakeholders participate in the process.
Other elements of the overall project plan that describe how cost, schedule and quality are to be
managed and implemented will have a bearing on project risk, as will information on how project
human resources are going to be defined, staffed, managed, and eventually released. The scope of
the project in terms of the products to be created and the activities required will be a source of risks.
Any estimates of cost and duration are useful in identifying risk as they provide a quantitative
assessment of the likely cost to complete scheduled activities.
Reviewing these may indicate that the estimate is insufficient to complete the activity and hence poses
a risk to the project. These include, assumptions log, work performance reports, earned value reports,
network diagrams, baselines, and other project information proven to be valuable in identifying risks.
If the project requires buying-in of resources, procurement documents become a key input to this
process. The complexity and the level of detail of such documents should be consistent with the value
of, and risks associated with, planned procurement.
56 | P a g e
Laws and regulations governing the creation or use of the projects products need to be taken into
account along with the operational environment within which the project is taking place. The views of
the project stakeholders and their willingness to accept risk must also be taken into consideration.
Risks can be identified directly by experts with relevant experience of similar projects or business
areas. These should be identified by the project manager and invited to consider all aspects of the
project and suggest possible risks based on their previous experience and areas of expertise, and there
are several techniques that can also be used to identify project risk.
Documentation Reviews
These are structured reviews of all project documentation up to this point in time including plans,
assumptions, previous project files, contracts, and other information. The quality of the plans, as well
as consistency between those plans and the project requirements and assumptions, can be indicators
of risk in the project. Missing, inaccurate or incomplete information may hinder the identification of
risks and may itself be a source of risk. You can also use the risk breakdown structure developed either
from this project or from a previous project to help ensure that all significant risks or categories have
been identified.
Assumptions Analysis
Every identified project risk is based on a set of hypotheses, scenarios, or assumptions.
Assumptions analysis explores the validity of assumptions as they apply to the project. It identifies
risks to the project from the inaccuracy, inconsistency or incompleteness of assumptions.
Fishbone Diagrams
Risk diagramming techniques include cause and effect diagrams, also known as Ishikawa or fishbone
diagrams, and are useful for identifying causes of risks. Flow charts can also be used to show how
various elements of a system interrelate, and the mechanism of causation, as can influence diagrams,
which show causal influences, time ordering of events, and other relationships among variables and
outcomes.
SWOT Analysis
This technique looks at the project from the perspective of its internal strengths and weaknesses as
well as external opportunities, and threats. SWOT analysis is a useful approach to risk assessment.
Identified risks should be documented in a risk register that consists of the list of all the identified
risks, their root causes, categories and responses. This information may be used to update the risk
breakdown structure.
57 | P a g e
Because of risk is an ongoing activity, the risk register will be updated continuously throughout the life
of the project and it is a key tool to aid in the management of risks within a project. The risk register
ultimately contains the outcomes of the other risk management processes as they are conducted,
resulting in an increase in the level and type of information contained in the risk register over time.
Activity 9
58 | P a g e
Activity 9
When you are building a team to work on the project, keep in mind that not every team member will
see the project through from start to finish. If you only have one person who is capable of performing
a vital portion of the work, you are exposed to risk if that person should leave for any reason. Instead,
there should be as much redundancy as possible—especially in the critical areas of the project—so
the loss of one or two people along the way doesn’t derail the entire project.
59 | P a g e
Doing what you can to limit your exposure to risk throughout the project, while still giving the project
a chance to succeed is the task that a project manager takes on. No one likes to have to deal with risk,
but it is an unavoidable part of doing business.
The best that can be done is to evaluate each risk that you might face, and weigh it against the
potential rewards that are waiting at the end of the project. Project managers also plan how they will
control risks using a variety of tools and techniques shown in the diagram below.
The goal is to make the level of risk acceptable to the organisation and to take steps that minimise the
element of risk as much as possible.
Risk Treatment Plan is one of the key documents in ISO 27001, however it is very often confused with
the documentation that is produced as the result of a risk treatment process. Here’s the difference7:
Risk treatment is a step in the risk management process that follows the risk assessment step – in the
risk assessment all the risks need to be identified, and risks that are not acceptable must be selected.
The main task in the risk treatment step is to select one or more options for treating each unacceptable
risk, i.e. decide how to mitigate all these risks. Four risk treatment options exist:
1. Apply security controls from Annex A to decrease the risks – see this article ISO 27001 Annex
A controls.
7
Source: 27001 Academy, as at http://advisera.com/27001academy/knowledgebase/risk-treatment-plan-and-
risk-treatment-process-whats-the-difference/, as on 5th December, 2016.
60 | P a g e
Annex A of ISO 27001 is probably the most famous annex of all the ISO standards – this is because
it provides an essential tool for managing security: a list of security controls (or safeguards) that are
to be used to improve security of information.
It would be a violation of intellectual property rights if I listed all the controls here, but let me just
explain how the controls are structured, and the purpose of each of the 14 sections from Annex A:
A.5 Information security policies – controls on how the policies are written and reviewed
A.6 Organisation of information security – controls on how the responsibilities are
assigned; also includes the controls for mobile devices and teleworking
A.7 Human resources security – controls prior to employment, during, and after the
employment
A.8 Asset management – controls related to inventory of assets and acceptable use, also
for information classification and media handling
A.9 Access control – controls for Access control policy, user access management, system
and application access control, and user responsibilities
A.10 Cryptography – controls related to encryption and key management
A.11 Physical and environmental security – controls defining secure areas, entry controls,
protection against threats, equipment security, secure disposal, clear desk and clear screen
policy, etc.
A.12 Operational security – lots of controls related to management of IT production:
change management, capacity management, malware, backup, logging, monitoring,
installation, vulnerabilities, etc.
A.13 Communications security – controls related to network security, segregation, network
services, transfer of information, messaging, etc.
A.14 System acquisition, development and maintenance – controls defining security
requirements and security in development and support processes
A.15 Supplier relationships – controls on what to include in agreements, and how to
monitor the suppliers
A.16 Information security incident management – controls for reporting events and
weaknesses, defining responsibilities, response procedures, and collection of evidence
A.17 Information security aspects of business continuity management – controls requiring
the planning of business continuity, procedures, verification and reviewing, and IT
redundancy
A.18 Compliance – controls requiring the identification of applicable laws and regulations,
intellectual property protection, personal data protection, and reviews of information
security
One of the biggest myths about ISO 27001 is that it is focused on IT – as you can see from the above
sections, this is not quite true: while IT is certainly important, IT alone cannot protect information.
Physical security, legal protection, human resources management, organisational issues – all of
them together are required to secure the information.
The best way to understand Annex A is to think of it as a catalogue of security controls you can
select from – out of the 114 controls that are listed in Annex A, you can choose the ones that are
applicable to your company.
61 | P a g e
2. Transfer the risk to another party – e.g. to an insurance company by buying an insurance
policy.
3. Avoid the risk by stopping an activity that is too risky, or by doing it in a completely different
fashion.
4. Accept the risk – if, for instance, the cost of mitigating that risk would be higher that the
damage itself.
Risk treatment is usually done in a form of a simple sheet, where you link mitigation options and
controls with each unacceptable risk; this can also be done with a risk management tool, if you use
one. According to ISO 27001, it is required to document the risk treatment results in the Risk
assessment report, and those results are the main inputs for writing Statement of Applicability. This
means that results of risk treatment are not directly documented in Risk Treatment Plan.
So, where is the Risk Treatment Plan in this whole process? The answer is: it can be written only after
Statement of Applicability is finished.
Why is this so? To start thinking about Risk Treatment Plan, it would be easier to think of it is an
“Action plan” where you need to specify which security controls you need to implement, who is
responsible for them, what are the deadlines, and which resources (i.e. financial and human) are
required. But in order to write such a document, first you need to decide which controls need to be
implemented, and this is done (in a very systematic way) through Statement of Applicability.
The question is – why didn’t ISO 27001 require the results from risk treatment process to be
documented directly in the Risk Treatment Plan? Why was this step in between needed, in the form
of Statement of Applicability? My opinion is that the authors of ISO 27001 wanted to encourage
companies to get a comprehensive picture of information security – when deciding which controls are
applicable in Statement of Applicability and which are not, the result of risk treatment is not the only
input – other inputs are legal, regulatory and contractual requirements, other business needs, etc. In
other words, SoA serves as a kind of a checklist that takes a global view of the organisation, and Risk
Treatment Plan wouldn’t be complete without such a check.
To conclude – Risk Treatment Plan is the point where theory stops, and real life begins according to
ISO 27001. Good risk assessment and risk treatment process, as well as comprehensive Statement of
Applicability, will produce very usable action plan for your information security implementation; skip
some of these steps and Risk Treatment Plan will only confuse you.
Risk Treatment8
Now that the risks have been identified with their impacts and probability scored, it is time to think
about how to treat each risk. Risk treatment will generally by 1 of these 5 options:
8
Source: Striking Project Management, as at http://strikingprojectmanagement.com/qualitative-risk-analysis/,
as on 5th December, 2016.
62 | P a g e
accept
transfer
mitigate
avoid
exploit
Accept – perhaps the risk has low impact and low probability, or the cost to mitigate may be too
high. One option is to just accept it and monitor the risk.
Transfer – Transferring a risk is quite common through insurance and contracts, issuing a contract
to a supplier is essentially transferring some of the risk to the supplier, especially in a fixed price
contract.
Mitigate – Do something to reduce the impact of the risk, we mitigated the risk of the Chinese
port strike by having a backup plan in place and multiple tranches to build in extra capacity in the
schedule
Avoid – Perhaps the risk is too great, cannot be transferred or the cost of mitigation it too high.
You may choose to avoid the risk, either by changing or removing certain scope items or changing
the approach.
Exploit – Perhaps the risk has a positive outcome? A change in the exchange rate might mean that
your forward purchase certain materials.
Options should be assessed based on extent of risk reduction and the extent of any additional benefits
or opportunities related taking into account the criteria developed previously. A number of options
may be considered and applied either individually or in combination. Selection of the most appropriate
option involves balancing the cost of implementing each option against the benefits derived from it.
In general, the cost of managing risks needs to be commensurate with the benefits obtained. Where
large reductions in risk may be obtained with relatively low expenditure, such options should be
implemented. Further options for improvement may be uneconomic and judgment needs to be
exercised as to whether they are justifiable.
Decisions should take account of the need to carefully consider rare but severe risks, which may
warrant risk reduction measures that are not justifiable on strictly economic grounds. In general, the
adverse impact of risks should be made as low as reasonably practicable, irrespective of any absolute
criteria. If the level of risk is high, but considerable opportunities could result from taking the risk, such
as the use of new technology, then acceptance of the risk needs to be based on an assessment of the
costs of risk treatment, and the costs of rectifying the potential consequences versus the opportunities
afforded by taking the risk. In many cases, it is unlikely that any one-risk treatment option will be a
complete solution for a particular problem. Often the organisation will benefit substantially by a
combination of options such as reducing the likelihood of risks, reducing their consequences, and
transferring, or retaining any residual risks. An example is the effective use of contracts and risk
financing supported by a risk reduction program. Where the cumulative cost of implementing all risk
treatment exceeds the available budget, the plan should clearly identify the priority order in which
individual risk treatments should be implemented. Priority ordering can be established using various
techniques, including risk ranking and cost-benefit analysis.
63 | P a g e
Risk treatments which cannot be implemented within the limit of the available budget must either
await the availability of further financial resources or, if for whatever reason any or all of the remaining
treatments are considered important, a case must be made to secure additional finances. Risk
treatment options should consider how risk is perceived by affected parties and the most appropriate
ways to communicate to those parties.
Activity 10
Who would you need to consult with to determine your treatment options?
64 | P a g e
Record and implement agreed risk treatments
It is important that planned responses are appropriate to the significance of the risk, cost effective in
meeting the challenge, realistic within the project context, agreed upon by all parties involved, and
owned by a responsible person. The individual owner of each risk will need to communicate with the
appropriate stakeholders who may be impacted by it’s occurrence as part of managing the risk.
The risk plan defines the level of risk which is seen as acceptable, how risks will be managed, who will
be responsible for carrying out risk related activities, the time and cost of each risk activity and how
the communication of risk is to occur. You will need to use this along with the risk register to plan your
responses.
There are four possible strategies for dealing with threats or risks that may have negative impacts on
the project.
1. Avoid—This involves taking action to either reduce the probability of the risk and/or its impact to
zero. In either case this response enables the risk to be circumvented entirely. For example, using a
certain supplier might carry the risk of them going out of business during the course of the project.
This risk could be avoided by using a supplier who was bigger, better established and more financially
secure.
2. Transfer—This involves transferring the risk to a third party so that they are responsible for its
management and impact. It does not eliminate the risk it simply transfers the liability to someone else.
This can be done by:
○ Taking out insurance (the insurance company is now liable) or
○ Having the work done under a fixed-price contract (the contractor is now liable).
65 | P a g e
Risk transference nearly always involves payment of a risk premium to the party taking on the risk and
may introduce new risks. For example, an insurance company may contest the claim or a contractor
might dispute the terms and conditions of the contract if they are having problems delivering.
3. Mitigate—Taking early action to reduce the probability and/or impact of a risk occurring is often
more effective than trying to repair the damage after it has occurred. Adopting less complex
processes, conducting more tests, or choosing a more stable supplier are examples of mitigation
actions.
4. Accept—The most common acceptance strategy is to establish a contingency reserve, including
amounts of time, money, or resources to handle the risks. It is usually chosen either because: the risk
is low in terms of impact or probability, or the cost and effort of taking a different action is out of
proportion to the risk itself.
66 | P a g e
Planned risk responses that are included in the project plan are executed during the life cycle of the
project, but the project work should be continuously monitored for new, changing, and outdated risks.
There are several techniques that can be used to control risks
Reassessment
Project risk reassessments should be regularly scheduled to keep the risk register updated. The
amount and detail of repetition that is appropriate depends on how the project progresses relative to
its objectives, as well as, which risks (if any) actually manifest themselves.
Audits
These should be scheduled in the risk plan and examine the effectiveness of risk responses in dealing
with identified risks and their root causes. The objectives should be clearly defined in advance and the
audit may form part of the routine project review meetings, or may be run separately, each producing
its own project audit report.
Trend Analysis
Earned value analysis and other methods of project variance and trend analysis may be used for
monitoring overall project performance. Outcomes from these analyses may forecast potential
deviation of the project at completion from cost and schedule targets. Deviation from the baseline
plan may indicate the potential impact of threats or opportunities.
67 | P a g e
Performance Measurement
This is designed to indicate the degree of technical risk faced by the project. Where deliverables can
be measured against the plans in a quantitative way e.g.: Response times, Number of defects, etc. This
can predict the degree of success in achieving the technical aims of the project.
Reserve Analysis
This compares the contingency reserves remaining to the amount of risk remaining at any time in the
project in order to determine if the remaining reserve is adequate. Implementing contingency plans
or workarounds sometimes results in a change request. Recommended preventive actions are
documented directions to perform on activity that can reduce the probability of negative
consequences associated with project risks.
Recommended corrective actions include contingency plans and workarounds. The latter are
responses that were not initially planned, but are required to deal with emerging risks that were
previously unidentified or accepted passively.
If the approved change requests have an effect on the process of managing risk, the corresponding
component documents of the project plan are revised and reissued to reflect the approved changes.
Just as in any project, there’s always a certain amount of paperwork that is part of the finished
deliverable. In the case of risk management, that’s the action plan for implementing risk treatment.
You can have the best ideas and plans, but until it’s written down and distributed to interested parties,
it won’t accomplish anything.
After a treatment option has been chosen for a particular risk, an action plan can be developed in
order to implement the treatment option. This action plan should state at a minimum:
As with any business process, the implementation of the treatment plan should include:
Identifying stakeholders
Identifying key personnel
Developing timelines
Training and communication processes
Collection of data and formation of baselines
Development of performance outcomes measures
Examination of outcomes
Feedback
68 | P a g e
Activity 11
69 | P a g e
Update risk plans and allocate risk responsibilities to project team members9
Not only do you need to distribute the risk management plan to relevant parties, you’ll need to insure
that copies are created and stored in your company’s information management system. In many
companies, this is a computerized system for the storage of all pertinent company information. Since
part of your risk factors include the possibility of something happening to the company’s computer
systems, you should also insure that hard copies are created and stored.
It is essential that all copies of the risk management plan are created equal. Nothing can cause more
confusion than to have two different versions of a contingency plan floating around, when it is time
to implement that plan. Instead of the plan becoming a tool to insure that everyone knows what to
do, it becomes a point of argument, impeding corrective action.
To insure that all copies are created equal, you want to limit people’s ability to copy it. That can be a
little tricky, considering the ready access to copy machines in most companies. The one thing that can
work in your favor is that most people don’t like standing in front of a copy machine, waiting for it. So,
by placing notices in the plan, instructing people where they can get their own copy, you reduce the
likelihood of them copying somebody else’s.
Now that you have everyone coming to the same place to receive their copies of the risk management
plan, your next step is to insure that you keep an accurate log of who has those copies. This log should
contain a minimum of:
Person’s name
Title
Department
Phone number or extension
Office location
This list will then become your distribution list for any changes. While not everyone will be quick to
put the updates into their binder, those who have secretaries will be sure to have accurate binders,
with all the latest updates. In other words, the people who have the greatest responsibility and
authority in your company will have the updated copies; not because they do the updating, but
because secretaries are really good at making sure that gets done.
9
Source: Fortress Learning, as at http://students.fortresslearning.com.au/bsbrsk501a-manage-risk/section-4-
select-and-implement-treatments-4/, as on 5th December, 2016.
70 | P a g e
Activity 12
71 | P a g e
Establish regular risk review processes to maintain currency of risk plans10
On a regular basis, the project manager must review the risk log with the project team. The risk log
must be kept up-to-date at least on a weekly basis. In a risk based approach to managing project, this
should be the first thing in the agenda of any status meeting. Client should be part of the risk log
reviews. The objectives are to 1) determine if any of the risk item severity score has changed, and 2)
capture any new risk events. Go over the high severity risk items first, and then quickly review if any
of the low severity risk items need adjustment. If there are new risk items, they must go through the
same process and added to the risk log.
How would the risk owner know when to act on the risk response strategy? Each risk item also has a
trigger event. When a risk trigger event occurs, that would be the time for the owner to act. He/she
must inform the project manager and then start executing on the risk response strategy.
As the project progresses towards completion, the total risk severity score should display a downward
trend. This can be presented visually with a trending chart. If the severity score is not trending lower,
then most likely the initial round of risk identification did not capture most of the events. The PM
should conduct a risk review session with the team to ensure its completeness.
Early on in the project the likelihood of risks occurring is much greater due to the relative uncertainty
compared to the end of a project. Also the impact of risks changes over time; for example if you cancel
s project at the beginning you have expended less labour costs that at the end.
10
Source: Risk Based PM, as at http://riskbasedpm.com/risk-management-best-practices/, as on 5th December,
2016.
11
Source: Better Projects, as at http://www.betterprojects.net/2007/02/monitor-your-risks.html, as on 5th
December, 2016.
72 | P a g e
A project’s success factors change over time also. For example a building development may acquire a
success factor of dealing successfully with local anti-development protestors. The risks associated with
dealing with these stakeholders will change as their importance and influence changes.
As well as monitoring existing risks you will have the opportunity to monitor for new risks. Have new
opportunities for risk come up as a result of changing environment or scope? Has the project’s
business case or relationship with the rest of the world changed?
73 | P a g e
Risk Owners: Ensure all risks have an owner, even if there is no active management plan for
them. It is best if these risk owners will have to deal with the results of the risk occurring to
give them motivation to pay attention.
Risk Meetings: Have formal risk review meetings where people have time to stop and think
about risks. Time may cost money but often risks can be much more expensive that they first
appear. You can also schedule low likelihood and impact risks to future dates.
Triggers: Identify triggers for reviewing risks. If a risk is minor today but will become important
if something occurs, look out for the something.
Activity 13
74 | P a g e
Activity 13
75 | P a g e
Determine risk responses to changed environment12
In developing Contingency Plans, the Project Team engages in a problem solving process. The end
result will be a plan that can be put in place on a moment’s notice.
What a Project Team would want to achieve is an ability to deal with blockages and barriers to their
successful completion of the project on time and/or on budget. Contingency plans will help to ensure
that they can quickly deal with most problems as they arise. Once developed, they can just pull out
the contingency plan and put it into place.
Implement agreed risk responses and modify plans to maintain currency of risk
treatments and controls
Invariably, your risk management plan will require a number of actions to be taken in order to
implement it. I’ve already mentioned the need to take the initiative to insure that those items are
completed. You can’t count on others, even other managers doing it, because they are all busy with
other work
.
It would be advisable to create a master list of action items that need to be done to implement your
risk management plan. Depending upon how many risk factors you have discovered, and the types of
options you have selected for dealing with these risks, you may have a rather extensive list of items
on your to do list.
Hopefully, there will be some overlap in different action items, where the same action item may deal
with several different risks. Take insurance for example; you may have identified several different risks
(fire, hurricane, earthquake) for which the option decided upon was to share the risk with a third
party, an insurance company. In reality, that’s only one action item, although it deals with three
separate risks. You can take that one action item to the appropriate party, and track the progress of it
as one line item on your master list.
12
Source: Business Improvement Architects, as at https://bia.ca/risk-management-the-what-why-and-how/, as
on 5th December, 2016.
76 | P a g e
While there are parts of the risk management plan which require your direct involvement to
implement, especially if the appropriate manager doesn’t have the time or resources to implement
them, there are other parts which will be implemented by other. You will still want to track these
areas, to insure that they are actually completed and not derailed mid-stream.
Once the action items have been implemented, you also need to check and monitor, to insure that
they will function as expected. There are always a certain number of plans that don’t work out the
way we expect. Don’t be so rigid that you can’t recognize a failure when you see it. Should that happen,
be willing to admit your fault and try something else. People will respect you for admitting your fault.
Activity 14
77 | P a g e
Activity 14
78 | P a g e
Review project outcomes to determine effectiveness of risk-management
processes and procedures
Risk management is actually a never ending process. Reaching a point of completion in a risk
management project, only means that it’s time to go back and review everything over again. In the
months that it took to accomplish the project, there could have been enough change in one of the
variables to require review and changes to your plan.
It is critical to constantly monitor and review the processes and outcomes. Monitoring and reviewing
risk management processes helps to incorporate risk management as not only a corporate value, but
an employee value as well. The risk management process in not static but is taken in the context of
the internal and external environments. As these environments change, the variables affecting risk
also change. Evaluating the process of risk management can be assigned to individuals within
departments or to dedicated staff depending upon the nature of the organisation and the resources
available. Consultants may be brought in at critical times to evaluate processes and institute changes
based on risk contexts or environmental, social and political changes.
When a risk management plan is initiated, the set of variables that define the parameters are
evaluated and a course of action is taken. During that course, new variables are discovered and new
risks uncovered. Take a bike race, for example. When the race is begun, a biker has a given set of
parameters for the race: personal capabilities, bike performance, race route, etc. The racer may have
even trained on the course in a variety of different weather conditions in order to mitigate weather
conditions as a risk. As prepared as the racer is to face the known risks, other variables can emerge
that create risk before and during the race. New race conditions including cracks in the asphalt and
crowded conditions may create an entirely different set of risks that need to be identified, analysed,
evaluated, and treated while on the course itself.
In addition to planned and scheduled monitoring and review sessions to examine new risk, review of
the management plan must be ongoing in order to stay relevant. As policies, procedures, and visions
of a corporation change, risk changes. As external contexts change, risks change. Suitability and cost
factors for treatment options change. Treatment options or contingency plans may lose relevancy
throughout the process. External variables such as legislative actions may develop which creates a
different context under which to analyse and evaluate risk.
79 | P a g e
One of the key components to the risk management process is keeping an accurate record of
documentation relating to the communications, justifications, analyses and relevant information
pertaining to risk. Remember how we began the risk assessment process? With research relating to:
Developing logs in order to keep accurate records can greatly facilitate the research process. Logs and
records help us remember the reasons why things have been done in the way that they have been
done. They are also critical in cases where we need to pass the baton on to another risk manager.
However, lessons learned may be identified and documented at any point during the project’s life
cycle.
The purpose of documenting lessons learned is to share and use knowledge derived from experience
to:
• Promote the recurrence of desirable outcomes
• Preclude the recurrence of undesirable outcomes
As a practice, lessons learned includes the processes necessary for identification, documentation,
validation, and dissemination of lessons learned. Utilization and incorporation of those processes
includes identification of applicable lessons learned, documentation of lessons learned, archiving
lessons learned, distribution to appropriate personnel, identification of actions that will be taken as a
result of the lesson learned, and follow-up to ensure that appropriate actions were taken.
Lessons learned document the cause of issues and the reasoning behind any corrective action taken
to address those issues. When thinking about how to effectively document a project’s lessons learned,
consider these types of questions:
• What was learned about the project in general?
• What was learned about project management?
13
Source: Mind Tools, as at https://www.mindtools.com/pages/article/newPPM_69.htm, as on 5th December,
2016.
80 | P a g e
• What was learned about communication?
• What was learned about budgeting?
• What was learned about procurement?
• What was learned about working with sponsors?
• What was learned about working with customers?
• What was learned about what went well?
• What was learned about what did not go well?
• What was learned about what needs to change?
• How will/was this incorporated into the project?
Lessons learned should draw on both positive experiences – good ideas that improve project efficiency
or save money, and negative experiences – lessons learned only after an undesirable outcome has
already occurred. Every documented lesson learned should contain at least these general elements:
• Project information and contact information for additional detail
• A clear statement of the lesson
• A background summary of how the lesson was learned
• Benefits of using the lesson and suggestion how the lesson may be used in the future
At any point during the project life cycle, the project team and key stakeholders may identify lessons.
The lessons learned are compiled, formalized, and stored through the project’s duration. Upon project
completion a lessons learned session is conducted that focuses on identifying project success and
project failures, and includes recommendation to improve future performance on projects.
Participants in lessons learned sessions typically discuss questions similar to the following:
• Did the delivered product meet the specified requirements and goals of the project?
• Was the customer satisfied with the end product(s)? If not, why not?
• Where costs budgets met? If not, why not?
• Was the schedule met? If not, why not?
• Were risks identified and mitigated? If not, why not?
• Did the project management methodology work? If not, why not?
• What could be done to improve the process?
• What bottlenecks or hurdles were experienced that impacted the project?
• What procedures should be implemented in future projects?
• What can be done in future projects to facilitate success?
• What changes would assist in speeding up future projects while increasing communication?
Lessons learned and comments regarding project assessment should be documented, archived,
presented, and openly discussed with the intent of eliminating the occurrence of avoidable issues on
future projects.
81 | P a g e
Since most issues are, by their nature, unexpected, how do you make sure you'll be able to deal with
them quickly and effectively? Ideally, you need an issue resolution process in place before you start
your project – to make sure that you stay on schedule, and meet your objectives.
Issue management is the process of identifying and resolving issues. Problems with staff or suppliers,
technical failures, material shortages – these might all have a negative impact on your project. If the
issue goes unresolved, you risk creating unnecessary conflicts, delays, or even failure to produce your
deliverable.
Issues and risks are not quite the same thing. However, the exact nature of both is largely unknown
before you begin. With risks, you usually have a general idea in advance that there's a cause for
concern. An issue tends to be less predictable; it can arise with no warning. For example, being unable
to find qualified staff is an identifiable risk. However, when one of your staff is in a car accident, and
hospitalized for three weeks, that becomes an issue!
It's important to identify risks before the project begins. A Risk/Impact Probability Chart provides a
useful framework to help you prioritize your risks. You can then develop a plan to manage those risks
proactively with solutions that you've already thought through and prearranged. However, when it
comes to issues, you have to deal with them as they happen. Issue management, therefore, is a
planned process for dealing with an unexpected issue – whatever that issue may be – if and when one
arises.
Tip:
When you don't identify and reduce risks at the beginning of a project, they can often become issues
later on. Make sure you understand your risks early. Learn from previous projects, and benefit from
the team's past experiences. This way, you'll have fewer issues to manage as you move forward.
Issues Log
Issues – otherwise known as problems, gaps, inconsistencies, or conflicts – need to be recorded when
they happen. When you create an issues log*, you provide a tool for reporting and communicating
what's happening with the project. This makes sure that issues are indeed raised, and then
investigated and resolved quickly and effectively. Without a defined process, you risk ignoring issues,
or not taking them seriously enough – until it's too late to deal with them successfully.
Have a safe and reliable method for the team to raise issues.
Track and assign responsibility to specific people for each issue.
Analyse and prioritize issues more easily.
Record issue resolution for future reference and project learning.
Monitor overall project health and status.
82 | P a g e
You can create an issues log by hand, build your own spreadsheet or database, or buy issue
management software from a wide variety of vendors.
However, do bear in mind that the success of your issue management process doesn't necessarily
depend on which tracking mechanism you use, but rather on the type of information you track.
Issue type – Define the categories of issues that you're likely to encounter. This helps you
track issues and assign the right people to resolve them. You could have broad descriptions
like these:
Technical – Relating to a technological problem in the project.
Business process – Relating to the project's design.
Change management – Relating to business, customer, or environmental changes.
Resource – Relating to equipment, material, or people problems.
Third party – Relating to issues with vendors, suppliers, or another outside party.
Identifier – Record who discovered the issue.
Timing – Indicate when the issue was identified.
Description – Provide details about what happened, and the potential impact. If the issue
remains unresolved, identify which parts of the project will be affected.
Priority – Assign a priority rating to the issue. Here's an example:
High priority – A critical issue that will have a high impact on project success, and has
the potential to stop the project completely.
Medium priority – An issue that will have a noticeable impact, but won't stop the
project from proceeding.
Low priority – An issue that doesn't affect activities on the critical path, and probably
won't have much impact if it's resolved at some point.
Assignment/owner – Determine who is responsible for resolving the issue. This person may
or may not actually implement a solution. However, he or she is responsible for tracking it,
and ensuring that it's dealt with according to its priority.
Target resolution date – Determine the deadline for resolving the issue.
If a date for resolution changes, keep both the old date and the new date visible. This helps you spot
issues that have been on the log for a long time. Then you can either give them extra attention, or
take them off the list if they're no longer important.
Status – Track the progress of the resolution with a clear label identifying the issue's overall
status. Here's an example:
Open – The issue has been identified, but no action has yet been taken.
Investigating – The issue, and possible solutions, are being investigated.
Implementing – The issue resolution is in process.
Escalated – The issue has been raised to management or the project sponsor/steering
committee, and directions or approval of a solution is pending.
Resolved – The resolution has been implemented, and the issue is closed.
Use 'traffic lights' when reporting issues. This provides an easy-to-see indication of whether issues are
under control. Traffic lights could be used as follows:
83 | P a g e
Red – Cannot proceed before issue is resolved.
Yellow – Resolution in process, and you'll be able to proceed soon.
Green – Resolution implemented, and issue no longer exists.
Action/resolution description – Describe the status of the issue, and what has been done to
find and implement a resolution. Include the dates of each action. Here's an example:
January 5 – Assigned issue to Samantha.
January 7 – Testing started to identify origin of problem.
January 8 – Solution suggested, and sent to steering committee for approval.
January 10 – Approval received. Assigned implementation to Gregory.
January 14 – Solution successful. Issue resolved.
Final resolution – Include a brief description of what was done to address the issue.
Supplement your issues log with a framework, or process, for dealing with those issues. This
framework helps the project team understand what to do with issues once they've been identified
and logged. Developing the framework answers questions like these:
How will you assign responsibility for resolving the issue? For example, is there one person
who handles all technical issues? Who would handle a vendor issue?
How will you know when to escalate an issue to management or the steering committee? You
may want to create a matrix of potential business impact versus issue complexity to help you
decide which issues should be taken to higher levels of management.
Which criteria will determine an issue's priority status?
Who will set the target resolution date?
How will issues be communicated within the team? Will you use regular meetings, log checks,
status update emails, and so on?
How will you identify different issues if several occur during one project? It is helpful to
number them so that you can identify issues easily when discussing them in progress
meetings.
If change orders are needed, how will those be handled?
When the resolution affects the budget or schedule, what will the update process be, and who
will be responsible?
One of the key challenges of issues management is to resolve the problem quickly and then move on,
with as little impact to the project as possible. The framework provides a structure for making
decisions when issues arise. Remember to consider your team's needs as you develop the framework.
It's also important to make sure you cover all issues in your Post-Implementation Review. This is where
you capture lessons learned for future projects. The more you learn about your issues, the better
prepared you'll be for the next project. Some issues might occur again, so by recording what you've
learned from previous projects, it will be easier for subsequent project teams to identify the issues,
and resolve them successfully. Other issues might be part of a risk pattern that you can proactively
identify and manage with early risk assessment.
84 | P a g e
An issues management process gives you a robust way of identifying and documenting issues and
problems that occur during a project. The process also makes it easier to evaluate these issues, assess
their impact, and decide on a plan for resolution. An issues log helps you capture the details of each
issue, so that the project team can quickly see the status, and who is responsible for resolving it. When
you add an issues management framework, you have a comprehensive plan to deal with issues quickly
and effectively. This organised approach to managing issues provides many valuable insights that can
be used to refine and improve future project results.
The ultimate purpose of documented lessons learned is to provide future project teams with
information that can increase effectiveness and efficiency and to build on the experience that has
been earned by each completed project. If documented and disseminated properly,
lessons learned provide a powerful method of sharing ideas for improving work processes, operation,
quality, safety and cost effectiveness, etc. and helps improve management decision making and
worker performance through every phase of a project. They also helps validate some of the tougher
times endured during the project’s life and helps future Project Managers avoid similar difficulties.
Best Practices
The following are recommended best practice approaches to Lessons Learned:
• Include All Experiences
- Lessons learned should draw on both positive and negative experiences.
• Act Quickly
- Obtain feedback as quickly as possible to avoid people forgetting the challenges faced during the
course of a project.
• Document
- Store lessons learned throughout the project in a central repository.
• Make Accessible
- Make lessons learned accessible to other projects.
• Archive Lessons
- Lessons learned should be archived as historical project data and incorporate into the organisations
lessons learned.
• Disseminate Lessons
- Disseminate lessons learned to the project management community.
• Reuse Lessons
- Reuse lessons learned from past projects to help better manage current projects.
• Involve Stakeholders
- Involve all project participants and stakeholders in the lessons learned process.
• Solicit Feedback
- Conduct a post-project survey to solicit feedback on the project from the project team, customers,
and stakeholders who were well-acquainted with the management of the project.
• Identify Lessons Learned
- Convene a lessons learned session to promote the success of future projects.
• Archive Data
- Archive all project data in a central repository. Include best practices, lessons learned, and any other
relevant project documentation.
85 | P a g e
Activity 15
86 | P a g e
Activity 15
87 | P a g e
Business, Accounting and Finance
BSBPMG517 MANAGE PROJECT RISK
BSBPMG517 Manage project risk
Identify project risks
3 4
*Ibbs, C. William and Young Hoon Kwak. “Assessing Project Management Maturity,” *Kulik, Peter and Catherine Weber, “Software Risk Management Practices – 2001,
8 ”
Project Management Journal (March 2000). 7
KLCI Research Group (August 2001).
NEGATIVE RISK
RISK CAN BE POSITIVE
• A dictionary definition of risk is “the possibility of loss or injury”
• Negative risk involves understanding potential problems that might • Positive risks are risks that result in good things happening;
occur in the project and how they might impede project success sometimes called opportunities
9 10
11 12
RISK UTILITY FUNCTION AND PROJECT RISK MANAGEMENT
RISK PREFERENCE PROCESSES
• Risk management planning: deciding how to approach and plan the
risk management activities for the project
13 14
16
15
25 26
27 28
29 30
OTHER RISK IDENTIFICATION
SWOT ANALYSIS
METHODS
• SWOT analysis (strengths, weaknesses, opportunities, and threats) can • Checklists based on risks encountered in previous projects
also be used during risk identification
• Analyze the validity of project assumptions as incomplete,
• Project teams focus on the broad perspectives of potential risks for
particular projects
inaccurate and/or inconsistent assumptions can lead to
• What are the company’s strengths and weaknesses related to this project identifying more risks
• What opportunities and threats exist • Diagramming techniques: cause-and-effect, fishbone,
• Helps identify the broad negative and positive risks that apply to a flowcharts and influence diagrams
project
• Influence diagrams represent decision problems by displaying
essential elements, including decisions, uncertainties, causality and
objectives and how they influence each other
31 (www.lumina.com/software/influencediagrams.html) 32
37
38
43 44
TOP TEN RISK ITEM TRACKING EXAMPLE OF TOP TEN RISK ITEM
TRACKING
• Keeps management and the customer aware of the major influences
that could prevent or enhance the project’s success
• By involving the customer, the project team may be able to consider
alternative strategies for addressing the risks
• It’s a means of promoting confidence in the project team by
demonstrating to management and the customer that the team is aware
of the significant risks, has a strategy in place and is effectively
carrying out that strategy
45 46
• Often follows qualitative risk analysis, but both can be done together
• A watch list is a list of risks that are low priority, but are still • Large, complex projects involving leading edge technologies often
require extensive quantitative risk analysis
identified as potential risks
• Main techniques include:
• Qualitative analysis can also identify risks that should be evaluated
• Decision tree analysis
on a quantitative basis
• Simulation
• Sensitivity analysis
47 48
DECISION TREES AND EXPECTED MONETARY VALUE (EMV)
EXPECTED MONETARY VALUE (EMV)
• A decision tree is a diagramming analysis technique used to help
select the best course of action in situations in which future outcomes
are uncertain
• Estimated monetary value (EMV) is the product of a risk event
probability and the risk event’s monetary value
• You can draw a decision tree to help find the EMV
49 50
55 56
59 60
MEDIA SNAPSHOT RISK MONITORING AND CONTROL
• Involves executing the risk management process to
• A highly publicized example of a risk response to respond to risk events
corporate financial scandals, such as those affecting Enron, • This is an ongoing activity – new risks identified, old risks
Arthur Andersen, and WorldCom, was legal action disappear, weaken or get stronger
• The Sarbanes-Oxley Act is considered the most significant
• Workarounds are unplanned responses to risk events
change to federal securities laws in the United States since
the New Deal that must be done when there are no contingency plans
• Fines, prison sentences up to 20 years for anyone who knowingly alters or • Main outputs of risk monitoring and control are:
destroys a record or document with the intent to obstruct an investigation
• Requested changes
• This Act has caused many organizations to initiate projects
and other actions to avoid litigation • Recommended corrective and preventive actions
• Updates to the risk register, project management plan, and
organizational process assets
61 62
• Risk registers can be created in a simple Word or Excel file or as part • Unlike crisis management, good project risk management often goes
of a database unnoticed
• More sophisticated risk management software, such as Monte Carlo • Well-run projects appear to be almost effortless, but a lot of work
simulation tools, help in analyzing project risks goes into running a project well
• The PMI Risk Specific Interest Group’s Web site at www.risksig.com • Project managers should strive to make their jobs look easy to reflect
has a detailed list of software products to assist in risk management the results of well-run projects
63 64
Any Questions?
65
Student Assessment Information
The process you will be following is known as competency-based assessment. This means that
evidence of your current skills and knowledge will be measured against national and international
standards of best practice, not against the learning you have undertaken either recently or in the
past. (How well can you do the job?)
Some of the assessment will be concerned with how you apply the skills and knowledge in your
workplace, and some in the training room.
The assessment tasks utilized in this training have been designed to enable you to demonstrate the
required skills and knowledge and produce the critical evidence required so you can successfully
demonstrate competency at the required standard.
What happens if your result is ‘Not Yet Competent’ for one or more assessment tasks?
The assessment process is designed to answer the question “has the participant satisfactorily
demonstrated competence yet?” If the answer is “Not yet”, then we work with you to see how we can
get there.
In the case that one or more of your assessments has been marked ‘NYC’, your Trainer will provide
you with the necessary feedback and guidance, in order for you to resubmit/redo your assessment
task(s).
What if you disagree on the assessment outcome?
You can appeal against a decision made in regards to an assessment of your competency. An appeal
should only be made if you have been assessed as ‘Not Yet Competent’ against specific competency
standards and you feel you have sufficient grounds to believe that you are entitled to be assessed as
competent.
You must be able to adequately demonstrate that you have the skills and experience to be able to
meet the requirements of the unit you are appealing against the assessment of.
You can request a form to make an appeal and submit it to your Trainer, the Course Coordinator, or
an Administration Officer. The RTO will examine the appeal and you will be advised of the outcome
within 14 days. Any additional information you wish to provide may be attached to the form.
What if I believe I am already competent before training?
If you believe you already have the knowledge and skills to be able to demonstrate competence in this
unit, speak with your Trainer, as you may be able to apply for Recognition of Prior Learning (RPL).
Credit Transfer
Credit transfer is recognition for study you have already completed. To receive Credit Transfer, you
must be enrolled in the relevant program. Credit Transfer can be granted if you provide the RTO with
certified copies of your qualifications, a Statement of Attainment or a Statement of Results along with
Credit Transfer Application Form. (For further information please visit Credit Transfer Policy)
88 | P a g e
LEARNING OUTCOMES
The following critical aspects must be assessed as part of this unit:
1. Interact with customers, collect the necessary information and match customers' needs to company
products or service
2. Sell products and services including matching customers' requirements to company products and
services and finalise and record the sale
LEARNING ACTIVITIES
Class will involve a range of lecture based training, activities, written task, case study and questioning.
STUDENT FEEDBACK
We welcome your feedback as one way to keep improving this unit. Later this semester, you will be
encouraged to give unit feedback through completing the Quality of Teaching and Learning Survey
LEARNING RESOURCES
Other Learning Resources available to students include:
TEXTBOOKS
You do not have to purchase the following textbooks but you may like to refer to them:
Unit Code(s) Unit Title Reference Book/ Trainer & Learner Resource
ASSESSMENT DETAILS
Assessment Summary
The assessment for this unit consists of the following items.
Knowledge Assessment
Formative Activities
In addition to the two assessment tasks, students will be required to complete activities as outlined
by their trainer/assessor – these will be taken from class resources, Enhance Your Future Learner
Guides.
Referencing Style
Students should use the referencing style outlined by the Trainer when preparing assignments. More
information can be sought from your Course Trainer.
2. All assignments must be within the specified timeframe (please refer to Due Date).
90 | P a g e
Assignment Marking
Students should allow 14 days’ turnaround for written assignments.
Plagiarism Monitoring
Students should use the referencing style outlined by when preparing assignments. More information
can be sought from your Trainer.
Marking Guide
C Competent: for students who have achieved all of the learning outcomes specified for
that unit/module to the specified standard.
NYC Not Yet Competent: for students who are required to re-enrol in a unit/ module in their
endeavour to achieve competence
Every student at Danford College can expect to have “timely fair and constructive assessment of
work.” Assessment tasks must be marked in such a way that the result reflects how well a student
achieved the learning outcomes and in accordance with the assessment criteria. In addition to the
final result, returned assignments must be accompanied by feedback that clearly explains how the
marking result/s was derived (summative), as well as how the student can improve (formative).
Refer to observation checklist below and/or consult your trainer/assessor for marking criteria for
this unit.
91 | P a g e
Students’ responsibility to attend, update personal details and enrolment
Course Progress Policy and Attendance
Deadlines, appeals, and grievance resolution
Student feedback
Other policies and procedures.
Electronic communication with students
International Students Please also refer to ESOS framework for further details
https://internationaleducation.gov.au/Regulatory-Information/Education-Services-for-Overseas-
Students-ESOS-Legislative-Framework/ESOS-Act
ADDITIONAL INFORMATION
Contacts:
If you have a query relating to administrative matters such as obtaining assessment results, please
contact your Course co-ordinator.
Deferrals/Suspensions/Cancellations
Danford College will only allow deferrals/student requested suspensions under exceptional
compassionate circumstances. Once a student has commenced studies, students are not allowed to
take leave unless there are compelling and compassionate reasons. Please refer to the College’s
Deferment, Suspension and Cancellation Policy available in the Student Handbook and at Student
Administration. This policy has been explained to you at Orientation.
Assessment Conditions
92 | P a g e
feedback from project stakeholders about how risks were managed.
93 | P a g e
Lesson/Session Plan
For face-to-face classroom based delivery as per timetable.
3 Identify project risks using valid and Work through corresponding sections
reliable risk identification methods of Learner Materials and Assessment
(Page 21) Tasks
Classify project risks within agreed risk Activity 3 (Page 23)
categories (Page 24) Activity 4 (Page 27)
PowerPoint Presentation – Slides 26 –
37
94 | P a g e
Delivery Day Delivery Topics Activities to be undertaken
8 Identify and document existing risk Work through corresponding sections
controls (Page 56) of Learner Materials and Assessment
Tasks
Activity 9 (Page 58)
9 Consider and determine risk Work through corresponding sections
treatment options using agreed of Learner Materials and Assessment
consultative methods (Page 59) Tasks
Activity 10 (Page 64)
10 Record and implement agreed risk Work through corresponding sections
treatments (Page 65) of Learner Materials and Assessment
Update risk plans and allocate risk Tasks
responsibilities to project team Activity 11 (Page 69)
members (Page 70) Activity 12 (Page 70)
11 Establish regular risk review processes Work through corresponding sections
to maintain currency of risk plans of Learner Materials and Assessment
(Page 72) Tasks
Regularly monitor risk environment to Activity 13 (Page 74)
identify changed circumstances PowerPoint Presentation – Slides 61 -
impacting project risks (Page 72) 64
12 Determine risk responses to changed Work through corresponding sections
environment (Page 76) of Learner Materials and Assessment
Tasks
13 Implement agreed risk responses and Work through corresponding sections
modify plans to maintain currency of of Learner Materials and Assessment
risk treatments and controls (Page 76) Tasks
Activity 14 (Page 77)
14 Review project outcomes to Work through corresponding sections
determine effectiveness of risk- of Learner Materials and Assessment
management processes and Tasks
procedures (Page 79) Activity 15 (Page 85)
Identify and document risk Complete Written Questions
management issues and
recommended improvements for
application to future projects (Page
80)
15 ASSESSMENT Complete Task 1 – Managing Project
Risk
95 | P a g e
Knowledge Assessment (Written Tasks)
3. Qualitative risk analysis typically involves examining historical information to make informed
decisions while for each possible outcome, quantitative risk analysis identifies the:
(a) Cost and time
(b) Type and category
(c) Formal and informal
(d) Magnitude and probability
4. During risk management planning, team members identify the triggers associated with each risk.
These warning signs represent the:
(a) Budget allocated to managing the risk
(b) Resources assigned to handling the risk
(c) Events that result in the risk actually occurring
(d) Actions the team should take when the risk actually occurs
96 | P a g e
5. Project managers identify preventive actions for risks that represent threats. They also need to
prepare for events that represent:
(a) Strengths
(b) Weakness
(c) Opportunities
(d) Contingencies
7. Which of the following tools and techniques are used in the Identify Risks process to identify
events that might impact the project and document their characteristics
(a) Brainstorming
(b) SWOT Analysis
(c) Expert Judgment
(d) All of the Above
9. During which phase does the project manager implement approved actions to minimise the
impact of negative events on the project?
(a) Initiation
(b) Planning
(c) Executing
(d) Monitoring and Controlling
(e) Closing
10. Your project sponsor has asked you to present your project’s high-level risk register to him in
the next project update meeting. Which of the following processes must be started to have your
high level risk register?
(a) Perform Qualitative Risk Analysis
(b) Plan Risk Management
(c) Identify Risks
(d) Control Risks
97 | P a g e
11. Andrew is a Project Manager for Green Valley project. A risk management plan has been
prepared for the project. Which of the following should Andrew do next?
(a) Perform Qualitative risk analysis
(b) Perform Quantitative risk analysis
(c) Identify Risks
(d) Plan Risk responses
12. Which of these is a valid response to negative risks and not positive risks?
(a) Exploit
(b) Mitigate
(c) Enhance
(d) Share
13. As the project manager, of a project to construct a city park, you have yourself identified 39 risks
on the project, determined what would trigger the risks, rated them on a risk rating matrix, tested
the assumptions and assessed the quality of the data used. You now plan to move to the next step
of the risk management process. What have you missed?
(a) Overall risk ranking for the project
(b) Involvement of other stakeholders
(c) Risk Mitigation
(d) Simulation
14. John Strauss is a Project Manager for a reforestation project. To identify the risks involved, John
sends a questionnaire to gather inputs from experts. Which technique is John using?
(a) Delphi technique
(b) Interviews
(c) Brain storming
(d) Documentation review
15. Mathew is a Project Manager for software migration at a bank. A major risk that has been
identified is attrition of resources. As a strategy to respond to this risk, Mathew, with support from
Senior Management, provides good increments to his team members. What type of risk response is
Mathew following?
(a) Accept
(b) Avoid
(c) Transfer
(d) Mitigate
98 | P a g e
17. During which stage of risk planning are risks prioritised based on their relative probability and
impact?
(a) Plan Risk Responses
(b) Identify Risks
(c) Perform Qualitative risk analysis
(d) Perform Quantitative risk analysis
99 | P a g e
Task 1 – Managing Project Risk
This assessment task requires you to:
conduct effective risk management for a project of sufficient complexity to demonstrate the
full range of performance requirements
Apply risk management techniques, strategies and tools.
A service provider is being sought for the technical upgrade of the Archives’ website Destination:
Australia. In order to ensure the best value for money and optimal functionality (for the website
and related exhibition interactive) going forward, it is necessary for the website to be transferred
from a proprietary CMS to a commonly available CMS (including, but not limited to, an Open Source
CMS).
The website will enable the National Archives of Australia to collect user contributed data about
the photographic collection featured on the site. The interface must be modern, engaging and user-
friendly, designed to meet the needs of people of all ages, and differing levels of computer and
English literacy. The website must interact successfully with an exhibition interactive via an existing
API. There is an option for hosting, maintenance and support services to be provided from contract
execution until 31 December 2019.
Timeframe for Delivery: November/December 20XX with a possible extension of up to 3 years for
hosting and maintenance.
The Requirement
The National Archives of Australia (Archives) (the Customer) is responsible under the Archives Act
1983 (Cth) for the preservation and storage of Commonwealth records, including the archival
resources of the Commonwealth.
100 | P a g e
This procurement request relates to the website redevelopment and hosting and maintenance
services for website Destination: Australia. The current website is located at
https://www.destinationaustralia.gov.au
The photographs showcased on this website are part of the Immigration Photographic Archive
(Series A12111). This collection comprises more than 22,000 black-and-white and colour
photographs taken by government photographers between 1946 and 1999 to record the arrival and
settlement of migrants in Australia after World War II. The photographs were used in newspapers,
magazines, posters, brochures and displays to promote Australia as a prosperous welcoming nation
to potential migrants and to reassure the Australian public that new migrants would readily settle
into the Australian way of life.
In 2014, Destination: Australia was upgraded to encourage users to upload their own photographs
and stories to share their migrant experience, further adding rich personal context to the Archives’
collection. These ‘Feature Stories’ are also available (via an API) in a ‘Globe’ interactive in the
Archives’ exhibition A Ticket to Paradise? which is touring nationally from April 2016 to September
2019.
Required:
Redevelopment of existing website Destination: Australia
Software to be either open source or common-use proprietary Content Management
System (CMS)
One website prototype round, with testing and feedback
Website testing including content review
Final revisions
Final testing and bug fixes
Website handover
Final documentation including website style guides, master templates, admin user
guidelines, technical specifications. This must be written in English with clear instructions
for non-technical experts to operate the CMS.
Optional:
External hosting and ongoing support with a service level agreement (3 years).
Updates and post implementation changes in response to user feedback.
Required deliverables
API compatibility:
The website must continue to work with the pre-existing API linking the content with an
exhibition interactive.
The administrator account to the Destination: Australia CMS must have a check box
function that allows the administrator to select which feature stories will be published
through the API to the exhibition interactive.
The API must be able to draw all user-added content in the selected feature stories,
including photographs, through to the linked exhibition interactive.
101 | P a g e
The website will support sourcing and storing its data from the Archives’ API, according to
API calls provided by the Archives, to ensure valid, up to date data is displayed on the
website.
The website must successfully GET, POST and PUT and DELETE data using the API within
agreed timeframes.
Data from the API contains a mix of official records and user generated content.
API compatibility and function must be maintained at all times until December 2019.
The successful supplier will be provided with further documentation on the API.
Accessibility/compatibility:
All elements of the solution must comply with the relevant Australian Government
mandatory criteria including meeting Web Content Accessibility Guidelines (WCAG) 2.0 –
to Level AA. Refer to the Australian Government Digital Transformation Office website for
more information – https://www.dto.gov.au/standard/design-guides/.
Any online forms should include identifying mandatory fields, error validation and error
suggestion on input fields (e.g. include @ for email addresses), as per the WCAG 2.0 Level
AA.
All elements of the solution must display consistently across popular Windows, Macintosh
and Linux browsers including Internet Explorer (V9 up), Firefox, Chrome, Safari and Opera.
Code to ensure ease of use and accessibility from desktop, tablet and smart phone / mobile
platforms using responsive interface design.
Hosting:
The website application must be built to be hosted externally to the Archives’ IT
infrastructure taking into account data sovereignty, data protection controls (see the
Australian Government Protective Security Policy Framework (PSPF) and Information
Security Manual) and compliance with the Privacy Act.
Please see ‘Optional Deliverables’ for information on the optional hosting component of
this procurement process.
Aesthetic design:
The aesthetic design of the website must be maintained for the upgraded website.
Style guides and other necessary components will be provided to the successful Supplier.
102 | P a g e
Content Management System:
The website must support formats to enable crowd sourced data and display of collection
data including images.
The solution must provide an easy way for administrators to view and record user-
generated activity across the site from within the administration CMS.
The website’s supporting CMS or web application must have both a design and source
interface enabling recognition of user contributed data and has the ability to manage full
user administration and content moderation in-house. This must include tasks such as
updating all content (including descriptions on collection photographs), monitoring and
moderating user-generated data and where necessary, blocking, removing, editing and/or
extracting user-generated data.
Administration module must be secure.
Administration page displays name (as well as screen ID) of contributing users.
The solution must support Google Analytics for website visitor statistics and pre-scripted
database reports for listing and exporting all user generated content.
The website must comply with records management requirements to enable the website
to be archived with user-generated data extracted (e.g. XML, CSV format and image
formats) with relevant references for future re-purposing.
Navigation:
Website navigation must align with pre-existing information architecture for Destination:
Australia.
Breadcrumbs must be added to the top of each page to enhance user navigation.
103 | P a g e
Search function:
Ability to query search and return search results, this will be supported through the API
calls, and the interface will need to be configured to return merged search requirements
and apply search parameters (e.g. filters) for the Discovering Anzacs interface.
Required: free text feature stories and comments contributed by users must be posted back
to the API to become searchable on Destination: Australia.
User-added tags on stories must be posted back through the API to become searchable.
User-added locations on stories must be searchable and clickable to sort stories by place.
Adding terms to the search parameters should refine the search (it currently expands the
result field).
The website must include all images within the A12111 series/collection, and search results
must display all relevant images. Check that search picks up all photographs in collection
(or that Destination: Australia captures all images in A12111) – e.g. searching for “Petrus
Mouwmans” does not give a result, although it is listed in RecordSearch: A12111,
1/1963/14/9.
Results distinguish between feature stories, collection items and user added photographs.
Results able to be sorted by category (feature story, collection item) or by date range
(earliest to latest or vice versa).
Image title to appear at the top of the results display (currently “view this photograph”).
Hit highlighting - the search interface will support search term (eg. keyword, name) hit
highlighting using bold or similar.
Updates/fixes to ‘add your story’ form (see Attachment B for images of changes):
All free text fields must allow users to copy and paste text from other programs.
The fields ‘Year’, ‘Country of origin’, ‘Theme’ and ‘Photos’ (at least one) must be
compulsory.
Adding images:
‘Add photos’ must be moved to location above ‘Add Your Story’.
When adding an image from the website, the citation and image caption must also be
imported. The citation (e.g. NAA: A12111, 2/1969/4A/18) must be locked in, with the option
for the user to personalise the caption.
When adding an image from the website, users must be able to search by collection control
symbols and non-consecutive key words.
When adding an image from the website, user has the ability to refine the search using date
range.
When adding an image from the website, clicking ‘enter’ after typing keyword must initiate
the search (currently takes user to blank error page).
‘Add image from website’ search must return all results available through Destination:
Australia.
The website must perform checks to ensure the user is uploading an accepted size and
format (e.g. png, jpeg) and provide error messages where limits are exceeded.
Optional: add a new function to allow users to select from their ‘Favourite’ images to add
to their story.
Optional: users able to crop images before they upload.
104 | P a g e
Add your story:
‘Add your story’ text field must allow simple formatting: paragraph breaks, italics.
Must display Latin diacritics (accents e.g. acute é, grave è, circonflex ê, caron č; dots e.g.
diaeresis ë; cedilla ç, ogonek ą).
Home page:
Optional: preview of ‘Feature stories’ displays feature stories at random.
Testing:
The Supplier must outline the project plan and team roles and the testing strategy and plan.
It should also include any handover files and documentation to be provided for
implementation.
Extensive testing will be required prior to the website launch. This includes iterative testing
during development, implementation of changes and subsequent re-testing.
On implementation and handover the Destination: Australia website should be fully
functional and populated with relevant content and data. As part of the website handover,
training sessions and support documentation for nominated administrators will also be
required.
105 | P a g e
Testing must include success of API calls to/from the Destination: Australia website for
creation, deletion, updates and retrieval of data in conjunction A Ticket to Paradise? ‘globe’
interactive.
The National Archives will determine when the website is ready to be launched and the
date. However, the supplier must be able to meet the nominal launch date of 25 October
2016.
Acknowledgements:
The banner (visible on all pages) must include:
Optional:
Should the option of host services be agreed to by the Customer, the Supplier must attend
ongoing support meetings or maintain regular communication as required, up until the end
of the contract.
106 | P a g e
After delivery
The Supplier must commit to providing defect resolution in the post-launch period, up to 30 April
20xx, in response to Archives user testing and feedback. In this period the Supplier must complete
full internal testing and bug fixes before any solution release for publishing.
Optional deliverables
Within your practice environment, complete each of the following parts (Note: Parts of this
assessment task, such as project execution, will be simulated in your practice environment):
Identify project risks, Analyse project risks and Establish risk treatments and controls
1. Describe the risk context in which the project is operating. The risk context may include
legislation and regulation controls, nature of the project, organisational risk policies and
procedures, project environment and/or stakeholder expectations (including risk appetite and
tolerances) :
107 | P a g e
2. Describe your approach to identifying the risks on the project.
3. Complete a risk register for the project (including both positive/opportunities and negative
risks) and two action plans for the top two priority risks using the templates below. Risk
Register:
<The risk register should list all risks on the project – not just work health and safety risks. It should
include both positive and negative risks>
108 | P a g e
RiskNo# Risk Risk Mitigation
Category Description Strategy/Response
including
existing
Likelihood
Likelihood
risk
Impact
Impact
Rating
Rating
controls
Initial Residual
<Provide the risk rating scales and overall rating for the above register>
109 | P a g e
Risk Action Plan #1
Action Plan:
Proposed Actions:
<risk response>
Resource Requirements:
Responsibilities:
<who will be responsible for putting the risk response into place>
Scope Impact:
Time Impact:
Cost Impact:
<Position> <Position>
110 | P a g e
Risk Action Plan #2
Action Plan:
Proposed Actions:
<risk response>
Resource Requirements:
Responsibilities:
<who will be responsible for putting the risk response into place>
Scope Impact:
Time Impact:
Cost Impact:
<Position> <Position>
111 | P a g e
Monitor and control project risks
1. What activities did you undertake to monitor the risk environment to identify changed
circumstances that would or did impact on your project?
2. What was the outcome of this review and how did you manage the changed risk responses to
maintain the currency of your risk register and action plans and responses?
112 | P a g e
1. Review your project performance in terms of risk management. Would your risk management
processes and procedures be considered effective? Why/why not?
2. List all risk management issues you may have experienced on the project (in the table below)
including a recommendation for future projects. Note: these are not issues with your risks but
how you managed the project risks.
113 | P a g e
Date Description of Recommended Action for next Lesson Learnt
problem/opportunity time/project Raised By
Task 2
Case Study
The following classwork may be completed in class in small groups or individually or at home
individually. 20 minutes will be allowed to complete this task. The answer will be assessed as
Satisfactory/ Not Satisfactory.
Instructions
For project of your choice (or using the Case Study below), outline:
Write your answers on a piece of paper, clearly writing the contributors and describing the project.
Hand this to your facilitator on completion.
Case Study
Read Case Study 1 Tsunami Cricket Benefit Match (see embedded attachment below).
114 | P a g e
Australia many appeals were launched to raise money for humanitarian agencies to provide relief
to the many injured and traumatized survivors.
The international cricket community launched one such appeal. With cricket being a popular sport
in many of the affected countries, especially India, Sri Lanka and Bangladesh, and several Sri Lankan
players’ families injured in the tsunami, the cricket community decided to organise a charity cricket
match to raise funds for the relief effort. The match between an Asian team and “Rest of World”
team, featuring some the world’s best players from Australia, New Zealand, Pakistan, India, Sri
Lanka, the West Indies, England and Bangladesh was played at the Melbourne Cricket Ground on
January 10, 2005.
Organising the charity match was a remarkable exercise in project management. With a busy
international cricket calendar, organising matches between international teams usually takes
approximately a year, yet this match was organised in the days immediately after the tsunami struck
and played just 15 days later. Cricket Australia, the governing body of cricket in Australia,
volunteered to organise and host the match and quickly set about the complicated process of
organising the match.
Among the many tasks that needed to be completed were gaining permission from cricket’s world
governing body, the International Cricket Council (ICC) to host the match, as well as the blessing of
the game’s regional governing body in Asia, the Asian Cricket Council (ACC), and the individual
cricketing authorities in each of the countries who provided players for the match.
The next step was to gain support from the International Cricket Players’ Association. This was
quickly obtained, as the players were keen to support the match. Organising the teams proved to
be a difficult exercise. Although Australia, Pakistan and the West Indies were playing in Australia at
the time, the New Zealand, Indian and Bangladeshi players were at home, as were Sri Lankan players
who had cancelled the remainder of their tour to New Zealand after the tsunami struck. The
majority of the English team and all of the South African players were engaged in a cricket series in
South Africa at the time, and unfortunately the best players from these two teams were unable to
participate.
Among the many other tasks that had to be completed were gaining permission from the
Melbourne Cricket Ground’s owners, the Melbourne Cricket Club, to use the stadium for the match
and arranging to get the players to Melbourne from all around the world at short notice.
Publicising the match via television and print media, preparing a pitch, issuing tickets, and designing
and making players’ uniforms, tasks that usually take months to prepare, were all accomplished
promptly. A wide range of sponsorships were organised, including a 1 million dollar naming rights
sponsorship, and hundreds of corporate boxes were sold at short notice during the traditional
summer holiday period.
Negotiations were also required to be undertaken with construction unions and building
contractors to stop work for a day, as the Melbourne Cricket Ground was in the middle of a
redevelopment in preparation for the Melbourne 2006 Commonwealth Games. In addition, enough
staff to run a match with a crowd of 70,0000, such as ground staff, curators, security personnel,
115 | P a g e
catering staff and cleaners needed to be obtained. The match proved to be a tremendous success,
raising over $15 million for the relief agency World Vision’s Asia Tsunami Appeal.
Likelihood Scales
Very Low 1 Highly unlikely to occur; however, still needs to be monitored as certain
circumstances could result in this risk becoming more likely to occur during
the project
Medium 3 Likely to occur as it is clear that the risk will probably eventuate
Very High 5 Highly likely to occur as the circumstances which will cause this risk to
eventuate are also very likely to be created
Impact Scales
Very 1 Insignificant impact on the project. It is not possible to measure the impact on
Low the project as it is minimal
Low 2 Minor impact on the project, e.g. < 5% deviation in scope, scheduled end-date
or project budget
Medium 3 Measurable impact on the project, e.g. 5-10% deviation in scope, scheduled
end-date or project budget
High 4 Significant impact on the project, e.g. 10-25% deviation in scope, scheduled
end-date or project budget
Very 5 Major impact on the project, e.g. >25% deviation in scope, scheduled end-date
High or project budget
IMPACT
1 2 3 4 5
Overall Level/Rating
Risk Register
RiskNo# Risk Mitigation
Likelihoo
Likelihoo
Description Strategy/Response
Impact
Impact
Rating
Rating
d
Initial Residual
117 | P a g e
RiskNo# Risk Mitigation
Likelihoo
Likelihoo
Description Strategy/Response
Impact
Impact
Rating
Rating
d
d
Initial Residual
118 | P a g e
BSB51415 –DIPLOMA OF PROJECT MANAGEMENT
College Copy
Student Signature:
Date :
119 | P a g e
BSB51415 –DIPLOMA OF PROJECT MANAGEMENT
Student Copy
Student Signature:
Date :
120 | P a g e
ASSESSMENT SUMMARY / COVER SHEET
This form is to be completed by the assessor and used a final record of student competency.
All student submissions including any associated checklists (outlined below) are to be attached to
this cover sheet before placing on the students file. Student results are not to be entered onto the Student
Database unless all relevant paperwork is completed and attached to this form.
Student Name:
Student ID No:
Unit
Assessors Name:
Outcome
C NYC
Result: S = Satisfactory, NYS = Not Yet Satisfactory, NA = Not Assessed
Knowledge Assessment - Questions and Answers S | NYS | NA
Task 1 S | NYS | NA
Task 2 S | NYS | NA
Is the Learner ready for assessment? Yes No
Has the assessment process been explained? Yes No
Does the Learner understand which evidence is to be collected and
Yes No
how?
Have the Learner’s rights and the appeal system been fully
Yes No
explained?
Have you discussed any special needs to be considered during
Yes No
assessment?
I agree to undertake assessment in the knowledge that information gathered will only be used for
professional development purposes and can only be accessed by my manager and the RTO:
Learner Signature:
Date:
I have received, discussed and accepted my result as mentioned above for
this unit assessment and I am aware about my rights to appeal.
Assessor Signature:
Date:
I declare that I have conducted a fair, valid, reliable and flexible
assessment with this student, and I have provided appropriate feedback.
121 | P a g e
ASSESSMENT COVER SHEET
Group: Date
Title of
Knowledge Assessment - Questions and Answers
Assignment:
Assessor Name:
Declaration:
1. I am aware that penalties exist for plagiarism and unauthorized collusion with other
students.
2. I am aware of the requirements set by my educator with regards to the presentation
of documents and assignments.
3. I have retained a copy of my assignment.
Student Signature:___________________________
Date:________________________________________
122 | P a g e
QUESTION & ANSWER CHECKLIST
S NYS
Learner’s name:
Assessor’s name:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Feedback to Learner:
Assessor’s Signature:
Date:
123 | P a g e
ASSESSMENT COVER SHEET
Group: Date
Title of
Task 1
Assignment:
Assessor Name:
Declaration:
1. I am aware that penalties exist for plagiarism and unauthorized collusion with other
students.
2. I am aware of the requirements set by my educator with regards to the presentation
of documents and assignments.
3. I have retained a copy of my assignment.
Student Signature:___________________________
Date:________________________________________
124 | P a g e
TASK 1 CHECKLIST
S NYS
Learner’s name:
Assessor’s name:
Observation Criteria S NS
Determined risk objectives and standards, with input from stakeholders
Established project risk context to inform risk management processes
Identified project risks using valid and reliable risk identification methods
Classified project risks within agreed risk categories
Determined risk analysis classification criteria and apply to agreed risk ranking system
Used risk analysis processes, within delegated authority, to analyse and qualify risks,
threats and opportunities
Determined risk priorities in agreement with project client and other stakeholders
Documented risk analysis outcomes for inclusion in risk register and risk management
plan
Identified and document existing risk controls
Considered and determined risk treatment options using agreed consultative methods
Recorded and implemented agreed risk treatments
Updated risk plans and allocated risk responsibilities to project team members
Established regular risk review processes to maintain currency of risk plans
Regularly monitored risk environment to identify changed circumstances impacting
project risks
Determined risk responses to changed environment
Implemented agreed risk responses and modify plans to maintain currency of risk
treatments and controls
Reviewed project outcomes to determine effectiveness of risk-management processes
and procedures
Identified and documented risk management issues and recommended improvements
for application to future projects
Feedback to Learner:
Assessor’s Signature:
Date:
125 | P a g e
ASSESSMENT COVER SHEET
Group: Date
Title of
Task 2
Assignment:
Assessor Name:
Declaration:
1. I am aware that penalties exist for plagiarism and unauthorized collusion with other
students.
2. I am aware of the requirements set by my educator with regards to the presentation
of documents and assignments.
3. I have retained a copy of my assignment.
Student Signature:___________________________
Date:________________________________________
126 | P a g e
TASK 2 CHECKLIST
S NYS
Learner’s name:
Assessor’s name:
Observation Criteria S NS
Determined risk objectives and standards, with input from stakeholders
Established project risk context to inform risk management processes
Identified project risks using valid and reliable risk identification methods
Classified project risks within agreed risk categories
Determined risk analysis classification criteria and apply to agreed risk ranking system
Used risk analysis processes, within delegated authority, to analyse and qualify risks,
threats and opportunities
Determined risk priorities in agreement with project client and other stakeholders
Documented risk analysis outcomes for inclusion in risk register and risk management
plan
Identified and document existing risk controls
Considered and determined risk treatment options using agreed consultative methods
Recorded and implemented agreed risk treatments
Updated risk plans and allocated risk responsibilities to project team members
Established regular risk review processes to maintain currency of risk plans
Regularly monitored risk environment to identify changed circumstances impacting
project risks
Determined risk responses to changed environment
Implemented agreed risk responses and modify plans to maintain currency of risk
treatments and controls
Reviewed project outcomes to determine effectiveness of risk-management processes
and procedures
Identified and documented risk management issues and recommended improvements
for application to future projects
Feedback to Learner:
Assessor’s Signature:
Date:
127 | P a g e
Student Feedback Form
Unit BSBPMG517 - Manage project risk
Student Name: Date
Assessor Name:
Please provide us some feedback on your assessment process. Information provided on this form
is used for evaluation of our assessment systems and processes.
This information is confidential and is not released to any external parties without your written
consent. There is no need to sign your name as your feedback is confidential.
Strongly Strongly
Agree
Disagree Agree
I received information about the assessment
1 2 3 4 5
requirements prior to undertaking the tasks
Great
The pace of this unit was: Too Slow Too Fast
Pace
Comments:
128 | P a g e