Risk Management for Leather Manufacturing Industry
VerifiedAdded on  2023/04/21
|32
|5522
|454
AI Summary
This document discusses the importance of risk management in the leather manufacturing industry and the need for an effective inventory management system. It covers topics such as communication and consultation plan, stakeholder analysis, risk assessment process, risk treatment, and monitoring and review. The objective is to achieve sustainability and minimize wastage in managing leather inventory.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Risk Management
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Executive Summary
The ABS Private limited is the leather manufacturing industry which is facing problem in
managing the livestock. The organization is located in Queensland, Australia. The purpose of
this project is to develop an effective inventory management system for the industry. The
major objective of the project is to achieve sustainability in managing the leather inventory so
that wastage can be minimized. The communication between the internal and external parties
helps in identifying the gaps and problems which exists with the management of leather
inventory. The coordination and cooperation among the stakeholders helps in retrieving the
success of the project. The assessment of the risks at an early stage of the project helps in
developing the risks treatment and mitigation structure so that valuable infrastructure for
handling inventory can be developed. The risk register is prepared for managing the risks
effectively by analysing the risk impact and severity on the business operation for managing
the inventory control policies and program. The focus should be given on calculating the
risks ranking by adding the estimated values of risks severity and risks likelihood. The risk
monitoring and reviewing are the core processes of the risks management program. It helps in
developing the secured project. It helps in minimizing the conflict and area of concern of the
inventory management system.
The ABS Private limited is the leather manufacturing industry which is facing problem in
managing the livestock. The organization is located in Queensland, Australia. The purpose of
this project is to develop an effective inventory management system for the industry. The
major objective of the project is to achieve sustainability in managing the leather inventory so
that wastage can be minimized. The communication between the internal and external parties
helps in identifying the gaps and problems which exists with the management of leather
inventory. The coordination and cooperation among the stakeholders helps in retrieving the
success of the project. The assessment of the risks at an early stage of the project helps in
developing the risks treatment and mitigation structure so that valuable infrastructure for
handling inventory can be developed. The risk register is prepared for managing the risks
effectively by analysing the risk impact and severity on the business operation for managing
the inventory control policies and program. The focus should be given on calculating the
risks ranking by adding the estimated values of risks severity and risks likelihood. The risk
monitoring and reviewing are the core processes of the risks management program. It helps in
developing the secured project. It helps in minimizing the conflict and area of concern of the
inventory management system.
Contents
Executive Summary...................................................................................................................1
1 Introduction.........................................................................................................................4
Project information.................................................................................................................4
Project Scope..........................................................................................................................4
Project Objectives...................................................................................................................5
Risk management process......................................................................................................6
2 Communication and Consultation plan...............................................................................7
Main objectives......................................................................................................................7
Stakeholder analysis...............................................................................................................8
3 Establishing Context.........................................................................................................11
Internal context.....................................................................................................................12
External Context...................................................................................................................12
Organization Context............................................................................................................12
Risk management context.....................................................................................................12
Risk criteria..........................................................................................................................13
Stakeholders.........................................................................................................................13
Role and Responsibilities.....................................................................................................13
Risk management policy......................................................................................................15
4 Risk Assessment process..................................................................................................15
Risk identification................................................................................................................15
Identification method........................................................................................................16
Risk scope.........................................................................................................................16
Risk Register.....................................................................................................................16
Risk Analysis........................................................................................................................19
Analysis method...............................................................................................................20
Executive Summary...................................................................................................................1
1 Introduction.........................................................................................................................4
Project information.................................................................................................................4
Project Scope..........................................................................................................................4
Project Objectives...................................................................................................................5
Risk management process......................................................................................................6
2 Communication and Consultation plan...............................................................................7
Main objectives......................................................................................................................7
Stakeholder analysis...............................................................................................................8
3 Establishing Context.........................................................................................................11
Internal context.....................................................................................................................12
External Context...................................................................................................................12
Organization Context............................................................................................................12
Risk management context.....................................................................................................12
Risk criteria..........................................................................................................................13
Stakeholders.........................................................................................................................13
Role and Responsibilities.....................................................................................................13
Risk management policy......................................................................................................15
4 Risk Assessment process..................................................................................................15
Risk identification................................................................................................................15
Identification method........................................................................................................16
Risk scope.........................................................................................................................16
Risk Register.....................................................................................................................16
Risk Analysis........................................................................................................................19
Analysis method...............................................................................................................20
Existing risk controls........................................................................................................20
Risk acceptance criteria....................................................................................................20
Risk Evaluation....................................................................................................................21
Evaluation method............................................................................................................22
Key risks for treatment.....................................................................................................22
5 Risk Treatment..................................................................................................................23
Probable Treatment options..................................................................................................23
Effective treatment option....................................................................................................24
6 Risk monitoring and review..............................................................................................24
Process..................................................................................................................................24
Risk Closure.........................................................................................................................25
7 References:........................................................................................................................25
8 Appendix 1: Risk Register................................................................................................27
Risk acceptance criteria....................................................................................................20
Risk Evaluation....................................................................................................................21
Evaluation method............................................................................................................22
Key risks for treatment.....................................................................................................22
5 Risk Treatment..................................................................................................................23
Probable Treatment options..................................................................................................23
Effective treatment option....................................................................................................24
6 Risk monitoring and review..............................................................................................24
Process..................................................................................................................................24
Risk Closure.........................................................................................................................25
7 References:........................................................................................................................25
8 Appendix 1: Risk Register................................................................................................27
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 Introduction
The project can be successfully completed by identified the risks and associated action plan
to resolve the complexity during the project initialization. The risk management plan is the
key process for achieving the organization goal and objectives within specified time and cost.
The scope of the project should concentrate on identifying the potential risks and its impact
associated with the business core processes and operational plan. The research paper is design
by following Australian risk management standard AS/NZS ISO 31000 and ISO 31010 to
develop and implement a proactive risk management process in undertaken engineering
project.
Project information
The ABS Private limited is the leather manufacturing industry which is facing problem in
managing the livestock. The organization is located in Queensland, Australia. The purpose of
this project is to develop an effective inventory management system for the industry. The
systematic approach of handling the livestock and inventory is not handled which creates the
operational functionality and results in delivering the production of poor quality of leather.
The existing staff members are not having relevant skills to work on the new technology for
fostering the production of good quality leather products. The industry space is not properly
utilized for managing the inventory. The policies and strategies of the enterprise is not
properly constructed which creates a problematic situation in working culture of the
environment.
Project Scope
The scope of the undertaken project is to design an inventory management system for the
ABS leather industry. The approved project budget is $ 675000 and has to be completed
within the timeframe of 6 months. The scope management plan for the project is defined in
the table below:
In-scope activities
Identifying the problem domain of the existing architecture of the organization
Organizing meeting with top executives and employees to analyse their requirement
Designing of requirement plan
Determining alternative solutions
Selection of the alternative
The project can be successfully completed by identified the risks and associated action plan
to resolve the complexity during the project initialization. The risk management plan is the
key process for achieving the organization goal and objectives within specified time and cost.
The scope of the project should concentrate on identifying the potential risks and its impact
associated with the business core processes and operational plan. The research paper is design
by following Australian risk management standard AS/NZS ISO 31000 and ISO 31010 to
develop and implement a proactive risk management process in undertaken engineering
project.
Project information
The ABS Private limited is the leather manufacturing industry which is facing problem in
managing the livestock. The organization is located in Queensland, Australia. The purpose of
this project is to develop an effective inventory management system for the industry. The
systematic approach of handling the livestock and inventory is not handled which creates the
operational functionality and results in delivering the production of poor quality of leather.
The existing staff members are not having relevant skills to work on the new technology for
fostering the production of good quality leather products. The industry space is not properly
utilized for managing the inventory. The policies and strategies of the enterprise is not
properly constructed which creates a problematic situation in working culture of the
environment.
Project Scope
The scope of the undertaken project is to design an inventory management system for the
ABS leather industry. The approved project budget is $ 675000 and has to be completed
within the timeframe of 6 months. The scope management plan for the project is defined in
the table below:
In-scope activities
Identifying the problem domain of the existing architecture of the organization
Organizing meeting with top executives and employees to analyse their requirement
Designing of requirement plan
Determining alternative solutions
Selection of the alternative
Project charter and proposal
Defining hardware and software requirement
Defining networking plan
Analysing resources required
Designing of inventory management system
Identifying risks
Risks assessment and evaluation
Risk Treatment process
Communication management system
Designing of stakeholder register
Implementation of inventory management system
Testing and monitoring of the new system
Out-of-scope activities
Monitoring program
Maintenance program
Training and development program organized for staff members
Hiring of new staff
Service level agreement
Assumption
Having skilled and expertise staff
Having required funds
Managing supply of hardware and software required
Success Criteria
Fulfilling requirement plan
Within time limit project gets complete
Within Expected cost project gets complete
Project Objectives
The major objective of the project is to achieve sustainability in managing the leather
inventory so that wastage can be minimized. The objectives of the project are as follows
 Identifying the problem domain of the existing working environment of the
organization
 Designing of communication management plan
Defining hardware and software requirement
Defining networking plan
Analysing resources required
Designing of inventory management system
Identifying risks
Risks assessment and evaluation
Risk Treatment process
Communication management system
Designing of stakeholder register
Implementation of inventory management system
Testing and monitoring of the new system
Out-of-scope activities
Monitoring program
Maintenance program
Training and development program organized for staff members
Hiring of new staff
Service level agreement
Assumption
Having skilled and expertise staff
Having required funds
Managing supply of hardware and software required
Success Criteria
Fulfilling requirement plan
Within time limit project gets complete
Within Expected cost project gets complete
Project Objectives
The major objective of the project is to achieve sustainability in managing the leather
inventory so that wastage can be minimized. The objectives of the project are as follows
 Identifying the problem domain of the existing working environment of the
organization
 Designing of communication management plan
 Designing of Stakeholder register
 Identifying risks
 Risks Criteria
 Stakeholder register
 Division of responsibilities and required authorities
 Development of risks management policies
 Development of risks control
 Risks Analysis
 Risk Acceptance criteria
 Designing of Risk Treatment process
Risk management process
The risks management process is designed for identifying the risks and setting priority to it so
that desired mitigation policies can be developed. The project risks are identified according to
the project charter plan. The internal and external environment of the business units are
interlinked so that risks can be clearly visualized (Kang, 2010). The diagram below shows the
risks management process which is comprised of five processes which are classified as risks
identification, risk assessment, risk treatment, risks communication, risk acceptance, and
monitoring and reviewing according to the Australian risk management standard AS/NZS
ISO 31000 and ISO 31010.
 Identifying risks
 Risks Criteria
 Stakeholder register
 Division of responsibilities and required authorities
 Development of risks management policies
 Development of risks control
 Risks Analysis
 Risk Acceptance criteria
 Designing of Risk Treatment process
Risk management process
The risks management process is designed for identifying the risks and setting priority to it so
that desired mitigation policies can be developed. The project risks are identified according to
the project charter plan. The internal and external environment of the business units are
interlinked so that risks can be clearly visualized (Kang, 2010). The diagram below shows the
risks management process which is comprised of five processes which are classified as risks
identification, risk assessment, risk treatment, risks communication, risk acceptance, and
monitoring and reviewing according to the Australian risk management standard AS/NZS
ISO 31000 and ISO 31010.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
2 Communication and Consultation plan
The communication plan is developed for minimizing the risks associated with the project by
following the standard of Australian risk management standard AS/NZS ISO 31000 and ISO
31010. The communication between the internal and external parties helps in identifying the
gaps and problems which exists with the management of leather inventory (Lammi, 2014).
The complexities and risks associated with the project can be identified easily by
demonstrating the communication with the stakeholder. The deployment of format and
informal communication between the stakeholders helps in signifies the problem area and
issues which exist in the operational plan of the enterprise.
Main objectives
The main objectives of communication management plan are:
The communication plan is developed for minimizing the risks associated with the project by
following the standard of Australian risk management standard AS/NZS ISO 31000 and ISO
31010. The communication between the internal and external parties helps in identifying the
gaps and problems which exists with the management of leather inventory (Lammi, 2014).
The complexities and risks associated with the project can be identified easily by
demonstrating the communication with the stakeholder. The deployment of format and
informal communication between the stakeholders helps in signifies the problem area and
issues which exist in the operational plan of the enterprise.
Main objectives
The main objectives of communication management plan are:
 Identifying risks and complexities associated with the undertaken project of inventory
system
 Analysing the impact of risks on the current working infrastructure of the organization
 Prioritizing risks
 Developing risk register
 Identifying status report of the project
 Risk evaluation and analysis
 Preparing risks management plan
 Preparing risks control policies and strategies
 Designing risks mitigation and treatment plan
Stakeholder analysis
The coordination and cooperation among the stakeholders helps in retrieving the success of
the project. The association and contribution of the stakeholders should be specified so that
environment of conflict can be avoided at top priority (Hyari, and Kandil, 2009). The formal
and informal communication should be performed between the stakeholders so that
grievances can be controlled effectively and new thoughts and views can be generated. The
power grid of stakeholder interest has to be developed for specifying the association with the
project risks management process according to the Australian risk management standard
AS/NZS ISO 31000 and ISO 31010.
system
 Analysing the impact of risks on the current working infrastructure of the organization
 Prioritizing risks
 Developing risk register
 Identifying status report of the project
 Risk evaluation and analysis
 Preparing risks management plan
 Preparing risks control policies and strategies
 Designing risks mitigation and treatment plan
Stakeholder analysis
The coordination and cooperation among the stakeholders helps in retrieving the success of
the project. The association and contribution of the stakeholders should be specified so that
environment of conflict can be avoided at top priority (Hyari, and Kandil, 2009). The formal
and informal communication should be performed between the stakeholders so that
grievances can be controlled effectively and new thoughts and views can be generated. The
power grid of stakeholder interest has to be developed for specifying the association with the
project risks management process according to the Australian risk management standard
AS/NZS ISO 31000 and ISO 31010.
Communication Method:
Power interest Region Communication Methods
Manage Closely The communication between the internal and
external parties by deploying various
communication tools for exchanging on-time
information such as Emails, Video calling,
Teleconferencing, Audio calling, Face to face
interaction, Interview, Newsletter, Social
Media, Notices, and Circulars
Keep satisfied Face to face interaction for collecting
relevant reports from the sub-ordinates with
respect to the project status report, financial
status report, and others
Keep informed Formal letters and emails are drafted for
sending information to the internal and
external stakeholders
Monitor The awareness program is arranged for the
stakeholders according to the requirement of
the project
3 Establishing Context
The Australian risk management standard AS/NZS ISO 31000 and ISO 31010 is used for
identifying the internal context, external context, organization context, risk criteria,
stakeholders, and risks management plan. The risk management policies can be effectively
designed by identifying the internal and external context of the ABS leather industry. The
risks criteria and parameters of risks avoidance can be judged by analysing the internal and
external situation of the enterprise.
Internal context
The ABS leather industry was developed in the year 2000 for supplying the good quality
leather in whole of Australia. The head office of the organization was located in Queensland,
Australia. The organization is having 2000 employees for keeping the plan operational. High
Power interest Region Communication Methods
Manage Closely The communication between the internal and
external parties by deploying various
communication tools for exchanging on-time
information such as Emails, Video calling,
Teleconferencing, Audio calling, Face to face
interaction, Interview, Newsletter, Social
Media, Notices, and Circulars
Keep satisfied Face to face interaction for collecting
relevant reports from the sub-ordinates with
respect to the project status report, financial
status report, and others
Keep informed Formal letters and emails are drafted for
sending information to the internal and
external stakeholders
Monitor The awareness program is arranged for the
stakeholders according to the requirement of
the project
3 Establishing Context
The Australian risk management standard AS/NZS ISO 31000 and ISO 31010 is used for
identifying the internal context, external context, organization context, risk criteria,
stakeholders, and risks management plan. The risk management policies can be effectively
designed by identifying the internal and external context of the ABS leather industry. The
risks criteria and parameters of risks avoidance can be judged by analysing the internal and
external situation of the enterprise.
Internal context
The ABS leather industry was developed in the year 2000 for supplying the good quality
leather in whole of Australia. The head office of the organization was located in Queensland,
Australia. The organization is having 2000 employees for keeping the plan operational. High
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
standard of accuracy and transparency is maintained in the reporting system of the
organization so that chaotic environment can be avoided and business operational plan can be
smoothly completed within the dedicated exposure of time. The ABS organization is looking
forward to increase their turnover and profitability up to 30% of their current profit.
External Context
The ABS is the fastest growing company and had establishes its branch offices at five sites of
Australia which are named as Sydney, New South Wales, Queensland, Brisbane, and Darwin.
The organization is facing problem in managing transfer of inventory status report between
the different branch office and head office. The inventory available in the industry is not
effectively circulated which results in the poor quality of leather generation (Kharaiweish,
2013). The reputation of the company gets negatively affected.
Organization Context
The systematic approach of handling the livestock and inventory is not handled which creates
the operational functionality and results in delivering the production of poor quality of
leather. The existing staff members are not having relevant skills to work on the new
technology for fostering the production of good quality leather products. The industry space
is not properly utilized for managing the inventory. The policies and strategies of the
enterprise is not properly constructed which creates a problematic situation in working
culture of the environment (Monnappa, 2017). The organization is looking forward to
develop an effective inventory management system for the industry. The project risks are
identified according to the project charter plan. The internal and external environment of the
business units are interlinked so that risks can be clearly visualized.
Risk management context
The Australian risk management standard AS/NZS ISO 31000 and ISO 31010 is used for
identifying risks and develop associated proactive action plan. The issues and challenges of
the enterprise should be searched and analysed so that risks can be identified effectively
(LLveskoski, 2014). The assessment of the risks at an early stage of the project helps in
developing the risks treatment and mitigation structure so that valuable infrastructure for
handling inventory can be developed.
organization so that chaotic environment can be avoided and business operational plan can be
smoothly completed within the dedicated exposure of time. The ABS organization is looking
forward to increase their turnover and profitability up to 30% of their current profit.
External Context
The ABS is the fastest growing company and had establishes its branch offices at five sites of
Australia which are named as Sydney, New South Wales, Queensland, Brisbane, and Darwin.
The organization is facing problem in managing transfer of inventory status report between
the different branch office and head office. The inventory available in the industry is not
effectively circulated which results in the poor quality of leather generation (Kharaiweish,
2013). The reputation of the company gets negatively affected.
Organization Context
The systematic approach of handling the livestock and inventory is not handled which creates
the operational functionality and results in delivering the production of poor quality of
leather. The existing staff members are not having relevant skills to work on the new
technology for fostering the production of good quality leather products. The industry space
is not properly utilized for managing the inventory. The policies and strategies of the
enterprise is not properly constructed which creates a problematic situation in working
culture of the environment (Monnappa, 2017). The organization is looking forward to
develop an effective inventory management system for the industry. The project risks are
identified according to the project charter plan. The internal and external environment of the
business units are interlinked so that risks can be clearly visualized.
Risk management context
The Australian risk management standard AS/NZS ISO 31000 and ISO 31010 is used for
identifying risks and develop associated proactive action plan. The issues and challenges of
the enterprise should be searched and analysed so that risks can be identified effectively
(LLveskoski, 2014). The assessment of the risks at an early stage of the project helps in
developing the risks treatment and mitigation structure so that valuable infrastructure for
handling inventory can be developed.
Risk criteria
The criteria of the risks are limited to the following:
 Definition of In-scope activities
 Risks Management
 Estimation and Scheduling of time
 Analysis of risks
 Budget and cost estimation
 Sequencing of project activities
 Developing monitoring program
 Identifying team leadership
Stakeholders
Stakeholder Type of Stakeholder
Project Owner Internal
Project Sponsor External
Project Manager Internal
Risk Manager Internal
IT engineer Internal
Software Designer Internal
Accountant Internal
Planning Manager Internal
Consultant External
Role and Responsibilities
The division of role and responsibilities helps in minimizing the chaotic working
environment within the organization. The table below shows the division of role and
responsibilities of the staff members. The stakeholders which are associated with the
undertake project are categorised as project owner, project sponsor, project manager, IT
engineer, Software designer, risk manager, planning manager, accountant, and consultant.
The project can be successfully completed by managing strong communication links between
the internal and external stakeholders.
Role Responsibilities
Project Owner Designing of the Requirement plan
The criteria of the risks are limited to the following:
 Definition of In-scope activities
 Risks Management
 Estimation and Scheduling of time
 Analysis of risks
 Budget and cost estimation
 Sequencing of project activities
 Developing monitoring program
 Identifying team leadership
Stakeholders
Stakeholder Type of Stakeholder
Project Owner Internal
Project Sponsor External
Project Manager Internal
Risk Manager Internal
IT engineer Internal
Software Designer Internal
Accountant Internal
Planning Manager Internal
Consultant External
Role and Responsibilities
The division of role and responsibilities helps in minimizing the chaotic working
environment within the organization. The table below shows the division of role and
responsibilities of the staff members. The stakeholders which are associated with the
undertake project are categorised as project owner, project sponsor, project manager, IT
engineer, Software designer, risk manager, planning manager, accountant, and consultant.
The project can be successfully completed by managing strong communication links between
the internal and external stakeholders.
Role Responsibilities
Project Owner Designing of the Requirement plan
Identifying the Problem Domain of the
organization
Project Approval and sign off of project
charter
Project Sponsor Specifying the Project Funds
Approval of project Budget
Financial Status Report (Merrit, and Ricketts,
2012)
Project Manager Developing Project Schedule
Defining Stakeholder Register by providing
relevant role and responsibilities
Developing Reporting system
Developing Communication plan
Defining Resource Levelling and allocation
Risk Manager Risks Identification
Risks Severity
Risk Impact
Risks Acceptance Criteria
Risk Avoidance
Risks Control
Risks Reviewing
Risk Treatment
Risks Management plan
IT engineer Placement of Hardware requirement
Placement of Software Requirement
Placement of Networking Requirement
System Analysis and reviewing process
Software Designer Design of Inventory management system
Providing Alternative solutions design
Accountant Developing Cost Estimation and budget
organization
Project Approval and sign off of project
charter
Project Sponsor Specifying the Project Funds
Approval of project Budget
Financial Status Report (Merrit, and Ricketts,
2012)
Project Manager Developing Project Schedule
Defining Stakeholder Register by providing
relevant role and responsibilities
Developing Reporting system
Developing Communication plan
Defining Resource Levelling and allocation
Risk Manager Risks Identification
Risks Severity
Risk Impact
Risks Acceptance Criteria
Risk Avoidance
Risks Control
Risks Reviewing
Risk Treatment
Risks Management plan
IT engineer Placement of Hardware requirement
Placement of Software Requirement
Placement of Networking Requirement
System Analysis and reviewing process
Software Designer Design of Inventory management system
Providing Alternative solutions design
Accountant Developing Cost Estimation and budget
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
preparation
Planning Manager Scheduling of activities
Work Breakdown structure
Resource Levelling
Status Report
Consultant Marketing Trends and innovative ideas
Risk management policy
The risks management policy is comply with the identification of risks associated with the
development of the inventory management system. The assessment of risks should be done so
that priority can be set to the risks so that relevant action plan can be developed to optimize
the working schedule of the project activities.
4 Risk Assessment process
Risk identification
The risks identification process focuses on recognizing the issues and gaps which exist in the
managing plan for inventory supply in the industrial space of the organization within the head
office and branch offices by following the Australian risk management standard AS/NZS ISO
31000 and ISO 31010. Some of the risks identified are listed below:
Risk Identification
Failure of Hardware
Failure of Software
Failure of network Connection
Employee Resistance
Incompatibility with the new technology
New marketing Trends and competition
Unskilled Staff members
Supply of resources is not according to demand placed
Natural Disaster
Unskilled staff members
Planning Manager Scheduling of activities
Work Breakdown structure
Resource Levelling
Status Report
Consultant Marketing Trends and innovative ideas
Risk management policy
The risks management policy is comply with the identification of risks associated with the
development of the inventory management system. The assessment of risks should be done so
that priority can be set to the risks so that relevant action plan can be developed to optimize
the working schedule of the project activities.
4 Risk Assessment process
Risk identification
The risks identification process focuses on recognizing the issues and gaps which exist in the
managing plan for inventory supply in the industrial space of the organization within the head
office and branch offices by following the Australian risk management standard AS/NZS ISO
31000 and ISO 31010. Some of the risks identified are listed below:
Risk Identification
Failure of Hardware
Failure of Software
Failure of network Connection
Employee Resistance
Incompatibility with the new technology
New marketing Trends and competition
Unskilled Staff members
Supply of resources is not according to demand placed
Natural Disaster
Unskilled staff members
Identification method
The risks associated with the project are identified by arranging the interview session with the
top executives of the enterprise, by analysing the data collected from the questionnaire round
with the focused group, preparing checklist, and observation.
Interview:
The interview is arranged with the top executives of the business organization so that
problem domain of the existing working culture can be identified (Otieno, 2014). The
discussion should be carried on proposed project for managing the inventory and having
control over it.
Questionnaire:
The questionnaire session is arranged with the focused group so that their views and thought
about the undertaken project can be identified. It helps in evaluating the positive and negative
side of the proposed project and helps in developing the risks register for the smooth
functioning of the project.
Risk scope
The risk scope activities of the project are:
 Identifying risks and complexities associated with the undertaken project of inventory
system
 Analysing the impact of risks on the current working infrastructure of the organization
(Muller, and Oppe, 2012)
 Prioritizing risks
 Developing risk register
 Identifying status report of the project
 Risk evaluation and analysis
 Preparing risks management plan
 Preparing risks control policies and strategies
 Designing risks mitigation and treatment plan
Risk Register
The risk register is prepared for managing the risks effectively by analysing the risk impact
and severity on the business operation for managing the inventory control policies and
The risks associated with the project are identified by arranging the interview session with the
top executives of the enterprise, by analysing the data collected from the questionnaire round
with the focused group, preparing checklist, and observation.
Interview:
The interview is arranged with the top executives of the business organization so that
problem domain of the existing working culture can be identified (Otieno, 2014). The
discussion should be carried on proposed project for managing the inventory and having
control over it.
Questionnaire:
The questionnaire session is arranged with the focused group so that their views and thought
about the undertaken project can be identified. It helps in evaluating the positive and negative
side of the proposed project and helps in developing the risks register for the smooth
functioning of the project.
Risk scope
The risk scope activities of the project are:
 Identifying risks and complexities associated with the undertaken project of inventory
system
 Analysing the impact of risks on the current working infrastructure of the organization
(Muller, and Oppe, 2012)
 Prioritizing risks
 Developing risk register
 Identifying status report of the project
 Risk evaluation and analysis
 Preparing risks management plan
 Preparing risks control policies and strategies
 Designing risks mitigation and treatment plan
Risk Register
The risk register is prepared for managing the risks effectively by analysing the risk impact
and severity on the business operation for managing the inventory control policies and
program. The focus should be given on calculating the risks ranking by adding the estimated
values of risks severity and risks likelihood. The risk severity and risk likelihood are divided
into four categories which are 4 is for very high, 3 for high, 2 for medium, and 1 for low.
Risk
Identification
Risks
Severity
Risks
Likelihood
Risk
Ranking
Risk
Impact
Risks
Probability
Risks
Mitigation
plan
Failure of
Hardware
3 2 5 High Low Backup of
hardware
should be
maintained
Failure of
Software
1 2 3 Low Low Backup of
software
should be
maintained
Failure of
network
Connection
2 4 6 High Medium Mesh
Topology
should be
used for
minimizing
the network
failure
Employee
Resistance
1 1 2 Low High Training and
development
program
should be
arranged for
sharpening
their skills
and
expertise
(Von, 2012)
Incompatibilit
y with the new
2 3 5 Medium Medium Training and
development
values of risks severity and risks likelihood. The risk severity and risk likelihood are divided
into four categories which are 4 is for very high, 3 for high, 2 for medium, and 1 for low.
Risk
Identification
Risks
Severity
Risks
Likelihood
Risk
Ranking
Risk
Impact
Risks
Probability
Risks
Mitigation
plan
Failure of
Hardware
3 2 5 High Low Backup of
hardware
should be
maintained
Failure of
Software
1 2 3 Low Low Backup of
software
should be
maintained
Failure of
network
Connection
2 4 6 High Medium Mesh
Topology
should be
used for
minimizing
the network
failure
Employee
Resistance
1 1 2 Low High Training and
development
program
should be
arranged for
sharpening
their skills
and
expertise
(Von, 2012)
Incompatibilit
y with the new
2 3 5 Medium Medium Training and
development
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
technology program
should be
arranged for
sharpening
their skills
and
expertise
New
marketing
Trends and
competition
3 4 7 Very
High
High Training and
development
program
should be
arranged for
sharpening
their skills
and
expertise
Unskilled Staff
members
1 4 5 Medium Low Recruitment
of new and
skilled staff
Training and
development
program
should be
arranged for
sharpening
skills and
expertise of
existing
staff
members
Supply of
resources is
not according
4 4 8 Low High Signing
service level
agreement
should be
arranged for
sharpening
their skills
and
expertise
New
marketing
Trends and
competition
3 4 7 Very
High
High Training and
development
program
should be
arranged for
sharpening
their skills
and
expertise
Unskilled Staff
members
1 4 5 Medium Low Recruitment
of new and
skilled staff
Training and
development
program
should be
arranged for
sharpening
skills and
expertise of
existing
staff
members
Supply of
resources is
not according
4 4 8 Low High Signing
service level
agreement
to demand
placed
with the
contractor
and sub-
contractor
Natural
Disaster
3 2 5 Medium Low Backup of
database
should be
kept so that
recovery of
the
information
can be done
Risk Analysis
The risks analysis can be done by evaluating the risk probability and its impact on the
working process. It will help in allocating priority to the associated risk register.
Risk Analysis Risk impact Risks probability Allocating Risks
Priority
Failure of Hardware High Low High
Failure of Software Low Low Low
Failure of network
Connection
High Medium Medium
Employee Resistance Low High High
Incompatibility with
the new technology
Medium Medium Low
New marketing
Trends and
competition
Very High High Low
Unskilled Staff
members
Medium Low Medium
Supply of resources
is not according to
Low High High
placed
with the
contractor
and sub-
contractor
Natural
Disaster
3 2 5 Medium Low Backup of
database
should be
kept so that
recovery of
the
information
can be done
Risk Analysis
The risks analysis can be done by evaluating the risk probability and its impact on the
working process. It will help in allocating priority to the associated risk register.
Risk Analysis Risk impact Risks probability Allocating Risks
Priority
Failure of Hardware High Low High
Failure of Software Low Low Low
Failure of network
Connection
High Medium Medium
Employee Resistance Low High High
Incompatibility with
the new technology
Medium Medium Low
New marketing
Trends and
competition
Very High High Low
Unskilled Staff
members
Medium Low Medium
Supply of resources
is not according to
Low High High
demand placed
Natural Disaster Medium Low High
Analysis method
The table below shows the analysis process which is used for evaluating the risks severity
and risks likelihood associated with the identified risks.
Existing risk controls
The organization is not having relevant risks control policies for controlling the risks after
their occurrence in the business organization. The risk manager plays a vital role in
identifying the risks associated with the project activities schedule. The significant mitigation
plan should be developed so that risks can be avoided at top priority and their relevant impact
can be minimized.
Risk acceptance criteria
The risks standard should be developed for identifying the acceptance criteria of the risks.
The acceptable risks are those risk which do not affect the working schedule and operational
plan of the enterprise. The Alarm region risks are those risks which can be severe if
corrective action plan is not prepared within the time limit. The unacceptable risks are those
risks which directly or indirectly affects the functioning of the proposed inventory
management system (XERO, 2013). The diagram below shows the zonal distribution for the
acceptance criteria of the risks.
Natural Disaster Medium Low High
Analysis method
The table below shows the analysis process which is used for evaluating the risks severity
and risks likelihood associated with the identified risks.
Existing risk controls
The organization is not having relevant risks control policies for controlling the risks after
their occurrence in the business organization. The risk manager plays a vital role in
identifying the risks associated with the project activities schedule. The significant mitigation
plan should be developed so that risks can be avoided at top priority and their relevant impact
can be minimized.
Risk acceptance criteria
The risks standard should be developed for identifying the acceptance criteria of the risks.
The acceptable risks are those risk which do not affect the working schedule and operational
plan of the enterprise. The Alarm region risks are those risks which can be severe if
corrective action plan is not prepared within the time limit. The unacceptable risks are those
risks which directly or indirectly affects the functioning of the proposed inventory
management system (XERO, 2013). The diagram below shows the zonal distribution for the
acceptance criteria of the risks.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Risk Evaluation
The risks associated with the project are evaluated by analysing the risks severity and risks
likelihood associated with the project.
Risk Severity:
The table below shows the criteria which is developed for analysing the level of risks severity
associated with the business process:
Risk Severity
Category Description
4 Very High
3 High
2 Medium
1 Low
Risk Likelihood:
The table below shows the criteria which is developed for analysing the level of risks
likelihood associated with the business process:
Risk Likelihood
Category Description
4 Very High
3 High
2 Medium
1 Low
The risks associated with the project are evaluated by analysing the risks severity and risks
likelihood associated with the project.
Risk Severity:
The table below shows the criteria which is developed for analysing the level of risks severity
associated with the business process:
Risk Severity
Category Description
4 Very High
3 High
2 Medium
1 Low
Risk Likelihood:
The table below shows the criteria which is developed for analysing the level of risks
likelihood associated with the business process:
Risk Likelihood
Category Description
4 Very High
3 High
2 Medium
1 Low
Risk Rank:
The ranking of the risks can be calculated by adding the risks severity and likelihood
associated with the business activities (Witcher, 2015). The risk rank is used for addressing
the risk impact on the operational plan of the enterprise.
Risk Ranking
Category Description
8 Very High
6 and 7 High
4 and 5 Medium
1, 2, and 3 Low
Evaluation method
The risks which come under the region of unacceptable risks are treated for minimizing their
impact. The strategies and plans are developed to implement the risks response methodology
so that their severity can be minimized and can be controlled during the project start-up
phase. The risks which come under alarm region are set at top priority to that effective risks
mitigation plan can be developed and avoided at top priority so that it does not affect the
functionality of the proposed inventory management system.
Key risks for treatment
The table below shows the rank provided to the key risks. The risks should be treated
according to the rank provided to them.
Key Risks Rank
Failure of Hardware 5 Medium
Failure of Software 3 Low
Failure of network Connection 6 High
Employee Resistance 2 Low
Incompatibility with the new technology 5 Medium
New marketing Trends and competition 7 High
Unskilled Staff members 5 Medium
Supply of resources is not according to
demand placed
8 Very High
The ranking of the risks can be calculated by adding the risks severity and likelihood
associated with the business activities (Witcher, 2015). The risk rank is used for addressing
the risk impact on the operational plan of the enterprise.
Risk Ranking
Category Description
8 Very High
6 and 7 High
4 and 5 Medium
1, 2, and 3 Low
Evaluation method
The risks which come under the region of unacceptable risks are treated for minimizing their
impact. The strategies and plans are developed to implement the risks response methodology
so that their severity can be minimized and can be controlled during the project start-up
phase. The risks which come under alarm region are set at top priority to that effective risks
mitigation plan can be developed and avoided at top priority so that it does not affect the
functionality of the proposed inventory management system.
Key risks for treatment
The table below shows the rank provided to the key risks. The risks should be treated
according to the rank provided to them.
Key Risks Rank
Failure of Hardware 5 Medium
Failure of Software 3 Low
Failure of network Connection 6 High
Employee Resistance 2 Low
Incompatibility with the new technology 5 Medium
New marketing Trends and competition 7 High
Unskilled Staff members 5 Medium
Supply of resources is not according to
demand placed
8 Very High
Natural Disaster 5 Medium
5 Risk Treatment
Probable Treatment options
The treatment plan should be developed for the identified risks so that their impact can be
minimized and working program can be smoothly completed within the expected date of
delivery.
Risk Identification Risks Mitigation plan
Failure of Hardware Backup of hardware should be maintained
Failure of Software Backup of software should be maintained
Failure of network Connection Mesh Topology should be used for minimizing the
network failure
Employee Resistance Training and development program should be arranged
for sharpening their skills and expertise
Incompatibility with the new
technology
Training and development program should be arranged
for sharpening their skills and expertise
New marketing Trends and
competition
Training and development program should be arranged
for sharpening their skills and expertise
Unskilled Staff members Recruitment of new and skilled staff
Training and development program should be arranged
for sharpening skills and expertise of existing staff
members
Supply of resources is not
according to demand placed
Signing service level agreement with the contractor and
sub-contractor
Natural Disaster Backup of database should be kept so that recovery of
the information can be done
5 Risk Treatment
Probable Treatment options
The treatment plan should be developed for the identified risks so that their impact can be
minimized and working program can be smoothly completed within the expected date of
delivery.
Risk Identification Risks Mitigation plan
Failure of Hardware Backup of hardware should be maintained
Failure of Software Backup of software should be maintained
Failure of network Connection Mesh Topology should be used for minimizing the
network failure
Employee Resistance Training and development program should be arranged
for sharpening their skills and expertise
Incompatibility with the new
technology
Training and development program should be arranged
for sharpening their skills and expertise
New marketing Trends and
competition
Training and development program should be arranged
for sharpening their skills and expertise
Unskilled Staff members Recruitment of new and skilled staff
Training and development program should be arranged
for sharpening skills and expertise of existing staff
members
Supply of resources is not
according to demand placed
Signing service level agreement with the contractor and
sub-contractor
Natural Disaster Backup of database should be kept so that recovery of
the information can be done
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Effective treatment option
The risks can be minimized by developing an effective communication plan between the
internal and external parties. The data should be assembled from various locations and stored
at single database so that required information about the inventory can be collected and the
financial status of the organization can be judged. The centralised system for information
flow should be developed so that accuracy in data collection from branch offices and head
quarter of ABS company. The highly skilled staff members should be hired from outside so
that undertaken project can be completed on time. The training and development program
should be arranged for the existing staff members so that they can work effectively in the
direction of proposed project and use of new technology.
6 Risk monitoring and review
Process
The risk monitoring and reviewing are the core processes of the risks management program.
It helps in developing the secured project. It helps in minimizing the conflict and area of
concern of the inventory management system. The reviewing and monitoring processes are as
follows:
Checklist: The checklist is prepared which is used for mapping the requirement placed by the
project owner in the project initiation phase and project output (Halil, Nasir, Hassan, Shukur,
2016). It helps in identifying the level of satisfaction of the stakeholders. The working
efficiency of the proposed project can be judged.
Auditing: The auditing reports are prepared by inspecting the business processes and their
impact on the organization objectives and goal.
Inspection: The business processes and working of the stakeholders should be inspected
periodically so that the critical path of the activities can be highlighted and can be resolved at
top priority.
Risks Register: The risk Register is prepared for checking that the risks identified are
minimized by the undertaken strategies and risks treatment plan or not.
The risks can be minimized by developing an effective communication plan between the
internal and external parties. The data should be assembled from various locations and stored
at single database so that required information about the inventory can be collected and the
financial status of the organization can be judged. The centralised system for information
flow should be developed so that accuracy in data collection from branch offices and head
quarter of ABS company. The highly skilled staff members should be hired from outside so
that undertaken project can be completed on time. The training and development program
should be arranged for the existing staff members so that they can work effectively in the
direction of proposed project and use of new technology.
6 Risk monitoring and review
Process
The risk monitoring and reviewing are the core processes of the risks management program.
It helps in developing the secured project. It helps in minimizing the conflict and area of
concern of the inventory management system. The reviewing and monitoring processes are as
follows:
Checklist: The checklist is prepared which is used for mapping the requirement placed by the
project owner in the project initiation phase and project output (Halil, Nasir, Hassan, Shukur,
2016). It helps in identifying the level of satisfaction of the stakeholders. The working
efficiency of the proposed project can be judged.
Auditing: The auditing reports are prepared by inspecting the business processes and their
impact on the organization objectives and goal.
Inspection: The business processes and working of the stakeholders should be inspected
periodically so that the critical path of the activities can be highlighted and can be resolved at
top priority.
Risks Register: The risk Register is prepared for checking that the risks identified are
minimized by the undertaken strategies and risks treatment plan or not.
Round table discussion: The round table discussions are arranged between the top executives
of the project so that the failure and success of the undertaken project can be measured. The
innovative ideas of the stakeholder can be added for improving the projected plan in future.
Interview: The interview is arranged with the top executives of the business organization so
that problem domain of the existing working culture can be identified.
Risk Closure
The risks management program closes with the preparation of the risks register so that the
mapping of risks identified and associated risks treatment plan can be analysed and evaluated.
The feedbacks are collected on the risks treatment plan by the stakeholders (Anand, Wamba,
and Gnanzou, 2013). The positive responses on the strategies and risks mitigation plan will
result in the implementation of the risks treatment policies in the working schedule of the
project. The negative responses on the strategies and risks mitigation plan will result in the
development of the new strategies by adding innovative ideas to the existing risks mitigation
policies.
7 References:
Anand, A., Wamba, S., and Gnanzou, D. (2013). A literature review on business process
management. 1st ed. [ebook] Online. Available at:
https://pdfs.semanticscholar.org/c3f1/26f8ea7a89a80f1af8e2066b6c2fcb64d402.pdf
[Accessed 02 April, 2019].
Halil, F., Nasir, N., Hassan, A., Shukur, A. (2016). Feasibility study and economic
assessment in green building projects, 222(2016). International journal of social and
behavioural science. Available at: https://core.ac.uk/download/pdf/82616822.pdf [Accessed
on 28 Mar, 2019]
Hyari, K, and Kandil, A. (2009). Validity of feasibilities studies for infrastructure
construction projects. International journal of civil engineering, 3(1). Available at:
https://pdfs.semanticscholar.org/90e4/d6cf49e287b6b6bb3d0c091f7e85a4aecf5c.pdf
[Accessed on 28 Mar, 2019]
Kang, B. (2010). Research support building and infrastructure modernization. Ebook
[Online]. Available at:
of the project so that the failure and success of the undertaken project can be measured. The
innovative ideas of the stakeholder can be added for improving the projected plan in future.
Interview: The interview is arranged with the top executives of the business organization so
that problem domain of the existing working culture can be identified.
Risk Closure
The risks management program closes with the preparation of the risks register so that the
mapping of risks identified and associated risks treatment plan can be analysed and evaluated.
The feedbacks are collected on the risks treatment plan by the stakeholders (Anand, Wamba,
and Gnanzou, 2013). The positive responses on the strategies and risks mitigation plan will
result in the implementation of the risks treatment policies in the working schedule of the
project. The negative responses on the strategies and risks mitigation plan will result in the
development of the new strategies by adding innovative ideas to the existing risks mitigation
policies.
7 References:
Anand, A., Wamba, S., and Gnanzou, D. (2013). A literature review on business process
management. 1st ed. [ebook] Online. Available at:
https://pdfs.semanticscholar.org/c3f1/26f8ea7a89a80f1af8e2066b6c2fcb64d402.pdf
[Accessed 02 April, 2019].
Halil, F., Nasir, N., Hassan, A., Shukur, A. (2016). Feasibility study and economic
assessment in green building projects, 222(2016). International journal of social and
behavioural science. Available at: https://core.ac.uk/download/pdf/82616822.pdf [Accessed
on 28 Mar, 2019]
Hyari, K, and Kandil, A. (2009). Validity of feasibilities studies for infrastructure
construction projects. International journal of civil engineering, 3(1). Available at:
https://pdfs.semanticscholar.org/90e4/d6cf49e287b6b6bb3d0c091f7e85a4aecf5c.pdf
[Accessed on 28 Mar, 2019]
Kang, B. (2010). Research support building and infrastructure modernization. Ebook
[Online]. Available at:
https://www-ssrl.slac.stanford.edu/lcls/reviews/rsb_project/2009_rsb_may18-19/
supporting_docs/rsb_risk_management_plan.pdf[Accessed on 28 Mar, 2019]
Kharaiweish, M. (2013). Project Monitoring and control measures. International Journal of
computer science and information technology, 5(5). Available at:
http://airccse.org/journal/jcsit/5513ijcsit03.pdf[Accessed on 28 Mar, 2019]
Lammi, H. (2014). Supplier Evaluation and Selection process. 1st ed. [ebook] Online.
Available at: https://www.theseus.fi/bitstream/handle/10024/105758/Lammi_Hannele.pdf?
sequence=1 [Accessed 02 April, 2019].
LLveskoski, O. (2014). Building construction. Ebook [Online]. Available at:
https://www.theseus.fi/bitstream/handle/10024/82098/HAMK_Building_construction_2014_
ekirja.pdf?sequence=1[Accessed on 28 Mar, 2019]
Mansfield Community. (2013). Introduction to project management. Ebook [Online].
Available at:
http://www.mansfield.vic.gov.au/Libraries/Community_Development/Intro_to_Project_Mana
gement_Manual.sflb.ashx [Accessed on 28 Mar, 2019]
Merrit, F., and Ricketts, J. (2012). Building design and construction handbook. Ebook
[Online]. Available at:
https://www.uop.edu.jo/download/research/members/[Architecture_Ebook]_Building_Design
_and_Construction_Handbook.pdf[Accessed on 28 Mar, 2019]
Monnappa. (2017). Project scope management: What it is and why it is important. Ebook
[Online]. Available at: https://www.simplilearn.com/project-scope-management-importance-
rar89-article [Accessed on 28 Mar, 2019]
Muller, C., Oppe, M. (2012). Conceptual design and design examples for multi-storey
buildings. Ebook [Online]. Available at:
http://eurocodes.jrc.ec.europa.eu/doc/WS2008/EN1993_6_Mueller.pdf[Accessed on 28 Mar,
2019]
Otieno, F. (2014). The role of monitoring and evaluation in projects. Ebook [Online].
Available at: https://www.irbnet.de/daten/iconda/CIB8942.pdf [Accessed on 28 Mar, 2019]
supporting_docs/rsb_risk_management_plan.pdf[Accessed on 28 Mar, 2019]
Kharaiweish, M. (2013). Project Monitoring and control measures. International Journal of
computer science and information technology, 5(5). Available at:
http://airccse.org/journal/jcsit/5513ijcsit03.pdf[Accessed on 28 Mar, 2019]
Lammi, H. (2014). Supplier Evaluation and Selection process. 1st ed. [ebook] Online.
Available at: https://www.theseus.fi/bitstream/handle/10024/105758/Lammi_Hannele.pdf?
sequence=1 [Accessed 02 April, 2019].
LLveskoski, O. (2014). Building construction. Ebook [Online]. Available at:
https://www.theseus.fi/bitstream/handle/10024/82098/HAMK_Building_construction_2014_
ekirja.pdf?sequence=1[Accessed on 28 Mar, 2019]
Mansfield Community. (2013). Introduction to project management. Ebook [Online].
Available at:
http://www.mansfield.vic.gov.au/Libraries/Community_Development/Intro_to_Project_Mana
gement_Manual.sflb.ashx [Accessed on 28 Mar, 2019]
Merrit, F., and Ricketts, J. (2012). Building design and construction handbook. Ebook
[Online]. Available at:
https://www.uop.edu.jo/download/research/members/[Architecture_Ebook]_Building_Design
_and_Construction_Handbook.pdf[Accessed on 28 Mar, 2019]
Monnappa. (2017). Project scope management: What it is and why it is important. Ebook
[Online]. Available at: https://www.simplilearn.com/project-scope-management-importance-
rar89-article [Accessed on 28 Mar, 2019]
Muller, C., Oppe, M. (2012). Conceptual design and design examples for multi-storey
buildings. Ebook [Online]. Available at:
http://eurocodes.jrc.ec.europa.eu/doc/WS2008/EN1993_6_Mueller.pdf[Accessed on 28 Mar,
2019]
Otieno, F. (2014). The role of monitoring and evaluation in projects. Ebook [Online].
Available at: https://www.irbnet.de/daten/iconda/CIB8942.pdf [Accessed on 28 Mar, 2019]
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Patanakul, P. (2010). An Empirical study on the use of project management tools and
techniques across project life cycle and their impact on project success. Ebook [Online].
Available at:
https://www.researchgate.net/publication/260059419_An_Empirical_Study_on_the_use_of_
Project_Management_Tools_and_Techniques_across_Project_Life-
Cycle_and_their_Impact_on_Project_Success[Accessed on 28 Mar, 2019]
Von, V. (2012). Research in business process management. 1st ed. [ebook] Online. Available
at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.472.581&rep=rep1&type=pdf
[Accessed 02 April, 2019].
Witcher, R. (2015). Gartner Decision tools for vendor selection. 1st ed. [ebook] Online.
Available at:
http://www.bus.umich.edu/KresgePublic/Journals/Gartner/research/118500/118544/118544.p
df [Accessed 02 April, 2019].
XERO. (2013). Small business Rank XERO best accounting system. 1st ed. [ebook] Online.
Available at: https://www.xero.com/content/dam/xero/pdf/media-release/small-businesses-
rank-xero-best-accounting-software-for-third-year%20running.pdf [Accessed 02 April,
2019].
8 Appendix 1: Risk Register
Risk
Identification
Risks
Severit
y
Risks
Likelihoo
d
Risk
Rankin
g
Risk
Impact
Risks
Probabilit
y
Risks
Mitigation
plan
Allocatin
g Risks
Priority
Failure of
Hardware
3 2 5 High Low Backup of
hardware
should be
maintained
High
Failure of
Software
1 2 3 Low Low Backup of
software
should be
maintained
Low
Failure of
network
2 4 6 High Medium Mesh
Topology
Medium
techniques across project life cycle and their impact on project success. Ebook [Online].
Available at:
https://www.researchgate.net/publication/260059419_An_Empirical_Study_on_the_use_of_
Project_Management_Tools_and_Techniques_across_Project_Life-
Cycle_and_their_Impact_on_Project_Success[Accessed on 28 Mar, 2019]
Von, V. (2012). Research in business process management. 1st ed. [ebook] Online. Available
at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.472.581&rep=rep1&type=pdf
[Accessed 02 April, 2019].
Witcher, R. (2015). Gartner Decision tools for vendor selection. 1st ed. [ebook] Online.
Available at:
http://www.bus.umich.edu/KresgePublic/Journals/Gartner/research/118500/118544/118544.p
df [Accessed 02 April, 2019].
XERO. (2013). Small business Rank XERO best accounting system. 1st ed. [ebook] Online.
Available at: https://www.xero.com/content/dam/xero/pdf/media-release/small-businesses-
rank-xero-best-accounting-software-for-third-year%20running.pdf [Accessed 02 April,
2019].
8 Appendix 1: Risk Register
Risk
Identification
Risks
Severit
y
Risks
Likelihoo
d
Risk
Rankin
g
Risk
Impact
Risks
Probabilit
y
Risks
Mitigation
plan
Allocatin
g Risks
Priority
Failure of
Hardware
3 2 5 High Low Backup of
hardware
should be
maintained
High
Failure of
Software
1 2 3 Low Low Backup of
software
should be
maintained
Low
Failure of
network
2 4 6 High Medium Mesh
Topology
Medium
Connection should be
used for
minimizing
the
network
failure
Employee
Resistance
1 1 2 Low High Training
and
developme
nt program
should be
arranged
for
sharpening
their skills
and
expertise
(Von,
2012)
High
Incompatibili
ty with the
new
technology
2 3 5 Mediu
m
Medium Training
and
developme
nt program
should be
arranged
for
sharpening
their skills
and
expertise
Low
New
marketing
Trends and
competition
3 4 7 Very
High
High Training
and
developme
nt program
Low
used for
minimizing
the
network
failure
Employee
Resistance
1 1 2 Low High Training
and
developme
nt program
should be
arranged
for
sharpening
their skills
and
expertise
(Von,
2012)
High
Incompatibili
ty with the
new
technology
2 3 5 Mediu
m
Medium Training
and
developme
nt program
should be
arranged
for
sharpening
their skills
and
expertise
Low
New
marketing
Trends and
competition
3 4 7 Very
High
High Training
and
developme
nt program
Low
should be
arranged
for
sharpening
their skills
and
expertise
Unskilled
Staff
members
1 4 5 Mediu
m
Low Recruitmen
t of new
and skilled
staff
Training
and
developme
nt program
should be
arranged
for
sharpening
skills and
expertise
of existing
staff
members
Medium
Supply of
resources is
not according
to demand
placed
4 4 8 Low High Signing
service
level
agreement
with the
contractor
and sub-
contractor
High
Natural 3 2 5 Mediu Low Backup of High
arranged
for
sharpening
their skills
and
expertise
Unskilled
Staff
members
1 4 5 Mediu
m
Low Recruitmen
t of new
and skilled
staff
Training
and
developme
nt program
should be
arranged
for
sharpening
skills and
expertise
of existing
staff
members
Medium
Supply of
resources is
not according
to demand
placed
4 4 8 Low High Signing
service
level
agreement
with the
contractor
and sub-
contractor
High
Natural 3 2 5 Mediu Low Backup of High
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Disaster m database
should be
kept so that
recovery of
the
informatio
n can be
done
Appendix 2: Communication plan
Stakeholders Messages and
information
Communication
Tools
Frequency Receiver
Project Owner Requirement
plan
Problem
Domain
Project
Approval and
sign off of
project charter
Emails
Video calling
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Within a month Project Manager
Project Sponsor
Project Sponsor Project Funds
Budget
Financial Status
Report
Emails
Video calling
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Within a Month Project Manager
Project Owner
should be
kept so that
recovery of
the
informatio
n can be
done
Appendix 2: Communication plan
Stakeholders Messages and
information
Communication
Tools
Frequency Receiver
Project Owner Requirement
plan
Problem
Domain
Project
Approval and
sign off of
project charter
Emails
Video calling
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Within a month Project Manager
Project Sponsor
Project Sponsor Project Funds
Budget
Financial Status
Report
Emails
Video calling
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Within a Month Project Manager
Project Owner
Notices
Circulars
Project Manager Project Schedule
Stakeholder
Register
Reporting
system
Communication
plan
Resource
Levelling and
allocation
(Mansfield
community,
2013)
Emails
Video calling
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Throughout the
project
Project owner
Project Sponsor
Risk Manager Risks
Identification
Risks Severity
Risk Impact
Risks
Acceptance
Criteria
Risk Avoidance
Risks Control
Risks
Reviewing
Risk Treatment
Risks
Management
plan (Patanakul,
2010)
Emails
Video calling
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Throughout the
project
Project Manager
IT engineer Hardware
requirement
Software
Emails
Video calling
Daily Project Manager
Circulars
Project Manager Project Schedule
Stakeholder
Register
Reporting
system
Communication
plan
Resource
Levelling and
allocation
(Mansfield
community,
2013)
Emails
Video calling
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Throughout the
project
Project owner
Project Sponsor
Risk Manager Risks
Identification
Risks Severity
Risk Impact
Risks
Acceptance
Criteria
Risk Avoidance
Risks Control
Risks
Reviewing
Risk Treatment
Risks
Management
plan (Patanakul,
2010)
Emails
Video calling
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Throughout the
project
Project Manager
IT engineer Hardware
requirement
Software
Emails
Video calling
Daily Project Manager
Requirement
Networking
Requirement
System Analysis
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Software
Designer
Design of
Inventory
management
system
Alternative
solutions design
Emails
Video calling
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Weekly Project Manager
Accountant Cost Estimation
and budget
preparation
Emails
Video calling
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Monthly Project Manager
Planning
Manager
Scheduling of
activities
Work
Emails
Video calling
Weekly Project Manager
Networking
Requirement
System Analysis
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Software
Designer
Design of
Inventory
management
system
Alternative
solutions design
Emails
Video calling
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Weekly Project Manager
Accountant Cost Estimation
and budget
preparation
Emails
Video calling
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Monthly Project Manager
Planning
Manager
Scheduling of
activities
Work
Emails
Video calling
Weekly Project Manager
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Breakdown
structure
Resource
Levelling
Status Report
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Consultant Marketing
Trends and
innovative ideas
Emails
Video calling
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Twice in a
month
Project Manager
Project owner
structure
Resource
Levelling
Status Report
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Consultant Marketing
Trends and
innovative ideas
Emails
Video calling
Teleconferencing
Audio calling
Face to face
interaction
Interview
Newsletter
Social Media
Notices
Circulars
Twice in a
month
Project Manager
Project owner
1 out of 32
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.