Project Management: Risk Planning for Dining Cafe Development (ITC505)

Verified

Added on  2022/10/17

|9
|356
|5
Project
AI Summary
This assignment focuses on risk planning for a dining cafe development project. The project involves establishing a 24-hour dining cafe with diverse menu options and food providers. The core of the project involves the implementation of a system, requiring the installation of swipe card readers and special access cards. The assignment identifies and analyzes various risks, including financial, time-related, and technical risks. Financial risks are associated with the costs of system implementation, specifically the choice between two models, Model A and Model B. Time-related risks are linked to project delays, and technical risks are related to the project's technical aspects. The assignment also mentions a risk matrix for a comprehensive approach to risk management.
Document Page
Risk Planning in Dining
Café Development
System
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Scenario of the case
project
The main scope of the project involves to implement a system for dining
café that will open for 24 hours. There must have various kinds of menus
depending of hours. There must have food types provided by food
providers. For food ordering purposes, no extra money will require
because the charges of all foods as well as drinks will be included in the
year basis residence charge. In the initial time, this project was
undertaken by a company which was bankrupt and for that the project is
rejected for this company. Now, to complete this project, it needs to install
some kinds of cards such as Swipe card readers as well as special access
cards. To implement this developing system, it is necessary to identify
risks related to this project so that the project can execute smoothly.
Document Page
Steps for identifying
project risk
Identification of project
risk
Definition of project
risk
Risk identification tools
& techniques
Stakeholders for
identification of risk
Capture
project risk
Document Page
Types of project risks
There are various kinds of risks that arise in this case
project.
Project risk
|Financia
l Risk Time
related
risk
Technical
risk
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Financial risk
There are two models such as Model A
and Model B for completion of this
project. Model A consists of swipe card
readers and special access cards. The
cost of these two cards will approx. $
17,000. It is the continuation of
previous work. But to develop a new
system which costs approx. $30,000
which will be more from the previous
system. If the project team will select
the second one, in that case there will
arise financial risk.
Time-related risk
If the project team will
delay to identify the risks,
then the project will not
complete within the time
and therefore it causes the
time related risks. This
time related risks are
directly proportional with
the budget related risks.
Document Page
Technical risk
Risk Id Risk Name Risk Description Occurren
ces
Chances
Impact Mitigation
1. Connection
related risk
All of the functions of the system will
happen over the internet. The loss of the
internet connection can occur the
technical risk
Medium Very high Always needs
to secure the
connection for
this system.
2. Easy
implementat
ion
The implementation of whole system has
to be done in an easy way so that all the
staffs and students can easily handle it,
otherwise it causes customer related
risks.
High High Easy
implementatio
n of the
system
3. Involving
staffs in
checking
purpose
The company wants to involve few
members at the entrance of the building
for checking purpose. But it will difficult
for those members to stay overnight for
checking purposes.
Medium Low It needs to
provide a
shifting
structure to
the staffs.
4. Security
needs
Proper security needs to install
otherwise hacking will attack the all over
system.
High Very high Cyber
security is
needed to
implement
Document Page
Technical risk
Risk Id Risk Name Risk Description Occurr
ences
Chance
s
Impact Mitigation
5. Crushing
with another
system
It needs to develop the system in
such a way so that it will not crush
with another system.
Low Medium Proper
development is
required
6. Disruption of
system
Implement the correct software as
well as algorithm for this system.
Due to this wrong algorithms, the
overall system will disrupt.
Low Very
high
Proper
algorithms are
required.
7. Updating the
system
In the system, it needs to update for
24 hours about the availability of
foods and drinks in the dining café.
Otherwise, it will loss students
loyalty which is considered as risk.
Low High Needs to
update each
moment
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Risk
matrix
Occur
rence
chanc
es
V H
H 2 4
M 3 1
L 5 7 6
V l
V L L M H V H
Document Page
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]