PMAN637 Project Risk Management : Solution Essays

Question:

Project Risk Background

Cynapse Inc. is bio-technology company that develops drugs based on proteins and peptides.  Many of their team’s work “virtually” and yet often, projects are not completed on time or within budget.   The growing company currently has one product approved by the U.S. government agency FDA (which must approve all new pharmaceuticals manufactured or distributed in the US), and two additional drugs undergoing clinical trials. There are about 700 employees at the company.

Due to the many scheduling risks, about half of the scientific and research staff are located near headquarters in San Diego, working as computational and pharmaceutical research scientists.

Since research is considered valuable IP (intellectual property) the Cynapse Corporation also has a large IT/information management department centralized in the headquarters office. Headed by Chief Information Officer (CIO) the IM department employs about 80 people and is charged with support of all communication, databases, cyber-security, software upgrades and computer systems used in company operations.

In addition to the IM professionals, Cynapse employs a number of highly skilled “computational scientists” who conduct research using mathematical models on a computer. These scientists are not members of the IM department, but use the IT systems extensively.  They report to the Director of Computational Biology, who, in turn, reports to the Chief Scientific Officer (CSO). A majority of these computational scientists, and Director herself, hold advanced degrees, and are quite proficient in computer programming. Just like the IM professionals, many of the computational scientists have been with Synaptic for years. Many maintain close personal friendships with their colleagues.   However, tensions are rising due to the many risks that management has at last identified which stem from unclear project scope, growing schedule risks, impacts to overall project budgets and lack of trained PMs (project managers) able to communicate effectively with upper management and IM specialists.

Solution and  Risks

In the past IM management attempted to reconcile this conflict by creating a formal business process to “transition projects from research into production”. This effort was ultimately abandoned since scientists refused to follow the standard procedure, preferring informal communication instead.  This triggered many IP (intellectual property) risks with data already developed on pharmaceuticals not yet ready for manufacture.   Of course, schedules were severely impacted as well and virtual teams often did not respond until several days after projects ended abruptly.

As a result of these frustrations, some of the computational scientists lost faith in the IM and started to create their own information technology systems. In the most prominent example, one scientist, Steve Levitt, Ph.D.., hosted his programs on a high-end PC located in his office. He has his own Oracle database on that PC (he downloads the latest version of Oracle whenever it is available, but then submits an invoice). Everything he has ever worked on is on that computer. The information stored on his PC includes, among other items, software and data for one of the key computational biology business processes. His work is known to very few of his colleagues in the company, but not in sufficient detail to reliably operate his “modified” software.

When Steve goes on vacation, he leaves his cell number behind to call in case of “issues”.   Realizing how important Dr. Levitt’s work is for the company, the corporate e IM manager repeatedly asked Steve to document his computational process, and to submit it for the “transition into production” process. Steve repeatedly took no action on these requests and attempts to avoid risks his manager pointed out at last backfired.  Other scientists have started to follow some of the same IT practices in their daily work “since Steve does it”.

The owners of Fast, Inc., a small consulting company that Cynapse retained to keep up with completing several of the “abandoned” projects were available for an interview. “We are former PhD research scientists ourselves, and so we know very well what scientists need. We operate lightning fast, and on most projects, we turn around so quickly, that they don’t even know what hit them.  Sorry, we don’t have documentation ready:  the Cynapse management never asked for that, and we will have to charge them next quarter.  Our bill may be very high, but we can’t forecast costs until the work is done.”  

 The consulting company Fast Inc three owners acknowledged that speed of development comes at a risk of “cutting corners” when it comes to documentation. “But we maintain our own computational infrastructure in our own office, and we keep the data and software that pertain to our work with Cynapse right here, and we know it all intimately. And eventually, these ad-hoc projects develop into products, and when they do, they could be sold!   We are excited about these horizons. What’s more, because of our favorable agreement with Cynapse, we retain all rights to the software.   It’s amazing to be in bio-technology since several other clients and government agencies are interested.”

 Over the years, the relationship between the many diverse scientists and Fast Inc. became quite close. Fast’s owners attend some of the research meetings on the latest intellectual property being developed for the FDA tough approval standards, and they have persuaded Cynapse’s management to buy stock shares in Fast. The consultants mentioned their plan to eventually sell off Fast, Inc. completely, and to move on to other business interests.

Black Swan Crisis Triggers Risks

The first harbinger of possible future problems hit on Christmas Eve of 2018. A large number of errors were found in Cynapse’s main database, and upon a two-month-long investigation, the errors were traced to Steve Levitt’s calculations. It appeared that some parameters in Steve’s process were changed as part of an experiment in the early days of Cynapse, but then both he and his supervisor forgot about it and failed to switch them back. The process operated with a wrong parameter set for nearly a year, invalidating much of the data accumulated for the past 13 months!

Cynapse’s IM Director was asked to correct the problem, but without understanding of Steve’s research and direct access to his software, the task proved extremely difficult. Ultimately, the CSO demanded that the Research IM Director be relieved of his duties: heads began to “roll” and this caused great concern throughout the IT divisions and Information Management project managers.

While the Chief Scientific Officer assumed his responsibilities on the stressful day that the IM Manager quit, in the interim, teams are unclear what will happen to enforcement of Information Management policies and procedures. Steve and his supervisor were not reprimanded, and they are now risking schedules set months prior.

The Chief Scientific Officer was available for a very short interview. When asked about his assessment of the database problem, he started by stating, “Ultimately, we all are to blame for these risks.  If only we could have forecast these risks to our budget more carefully!”

To address the snowballing problems, the IM senior management decided to create an additional position. The new job would serve as a middleman “liaison” between the IM and the scientific group. It would require a degree in the biological sciences (to earn respect from the Computational Biology workers) along with multiple years of IT experience and even security clearance.

After their efforts to locate an individual with suitable qualifications failed, the Cynapse upper management team has contacted you, a consultant in independent practice, to develop a Risk Management Plan and make recommendations on standards to follow.

Project Management Risk Identification & Recommendations

You have just visited Cynapse offices where you’ve met, and interviewed individuals described above. You have been offered a contract this month as a consultant to Cynapse. You have been told that your ultimate job is to identify risks and make recommendations to management.  Hence, in a 5-page overview (no Appendix), you are asked to:

1) Create a Risk Register identifying major project management risks and

2) Make managerial recommendations for both teams at Cynapse

From the practical standpoint, it is not likely that you would have an authority to hire and fire top managers, or to perform mergers and acquisitions, so proposals involving any of these are not likely to be accepted by the client organization.   No organization charts are required.  You need to first address the risks facing the Information Management/IM process.  You also must address the growing IP risks!

 

Answer:

Identification of the project risks:

PMBOK Guide (PMI, 2017, 6th edition), for successful running of an organisation, it is essential to identify the risks in the company. This not only help the organisation to identify the threats present in an organisation but also for finding the techniques for mitigating them (Buttrick, 2015).

Identification of the project scope:

The scope of the Risk Management are:

  • Identification of the project management risks using risk register
  • Determining the techniques for mitigation

Budget of the project: 

According to the PMBOK Guide (PMI, 2017, 6th edition), a budget of a project is determined after estimating the overall cost of the project. The benefit of the project budgeting is to create the baseline estimation for the project expenses upon which the performance of the stakeholders of the project can be controlled and monitored (Dash, 2015).

Risk register:

Risk Id.  

Risk

Description of the risk

Impact

Likelihood

Rating

People responsible

Mitigation

1

Estimation of time

The project charter created along with the Gantt chart may fail to estimate time. The time management is one of the very important to follow the time slots divided for particular works; otherwise the chances of the project delays increases.

High

Medium

4

Project manager

Implementation of proper project schedule.

Making use of Gantt chart.

2

Change requirements

The changes done in the system may affect the entire process of the system. The production of the organization as well as the system may be affected in that case.

Medium

Medium

3

Client

Keeping in touch with the client on a daily basis.

Arranging meetings with the stakeholders regularly.

3

Budget risk

The risk of the budget is most prevalent in a project management. The failure of a project manager to estimate the budget of a project is one of the greatest failure. The project may completely fail due to that.

High

High

4

Project manager

Proper scheduling of the project.

Identification of the proper products for the project.

4

Technical risk

The risk of the system failure may occur due to the poor maintenance of the system.

High

Medium

3

IT expert

Proper maintenance of the equipment on a regular basis.

5

Database risks

The databases are one of the most vulnerable parts of the system as they are prone to the hackers. A simple “drop” command can erase the existence of the data bases.

High

High

5

IT expert

Regular up-gradation of the system.

Implementation of the security protocols.

6

Human error

Human is prone to error. Improper training, lacking in proper knowledge about the system leads to the human error.

Medium

Low

2

Employees

Proper training of the employees.

7

Scope creep

Improper documentation of the project leading to un-controlled results.

Medium

Medium

3

Client

Planning project scopes in front of the stakeholders.

8.

Conflict

The difference in opinions among the employees of the organisation gives rise to the conflict. There are more than one way to perform a task, imposing one’s opinion on the other gives birth to conflict.

High

Medium

3

Stakeholders

Proper communication between the team members and other stake holders.

9

Resource shortage

The shortage of resources, like raw materials, the labours, modern technology, human resources. etc.

High

Low

2

Project manager

Requirement of proper documentation.

10

Quality risk

Reduced quality of the products developed in an organisation hampers the reputation of the organisation.

Medium

Low

2

Project manager

Keeping up with the stakeholders.

Sticking to the timeline and the scope of the project.

Monitoring the suppliers’ activities along with the employee performance.

 

 

Risk management recommendations: 

Tools and practises to mitigate schedule risks: 

A Project schedule is prepared such that the project can be completed and wrapped-up within time. Certain practises that can reduce the risk of the project schedule failure. They are given below:

Reduction in the amount of critical paths: A project is most likely to have more than one critical path. With more number of critical paths in a project schedule, the chances of finishing the project on time reduces.

Lesser dependencies on the activities: If there are multiple dependency factors in project where a certain procedure is dependent on the previous processes, the risk of schedule failure can occur. This is because the steps cannot be completed without the completion of the step on which it is dependent upon.

Scheduling the activities with risks earlier: The activities which are complicated must be planned earlier in order to complete the work on time. This helps in early realisation of the costs in the projects.

Reviewing the schedule: regular checking up on the table reduces the chances of the failure in the schedule. For this Gantt charts can be used. Gantt chats helps in the identification of the time required to complete a certain task. This also helps in identifying the areas where extra efforts has to be implemented (Varajão, Colomo-Palacios & Silva, 2017).

Methods to mitigate resource risks and loss of IP

The intellectual property risks can be reduced if the following steps are followed:

  • Sharing of the limited data: Not all data is needed to be shared. Sharing only the required contents helps in reducing the risks of the loss of the IP.
  • Use of the non-disclosure agreements: While making an agreement it is essential to create an NDA. NDA or the Non-Disclosure Agreement is very significant as legal actions can be taken with the agreement is broken anyhow.
  • Achieving the Provisional Patent: Provisional patent can be achieved for the purpose of the project.
  • Making a trademark of the product: Protection can be achieved when the ideas of the organization is strongly in favor of the name of the company.
  • Listening to the intuitions: If something wrong is sensed, it must not be taken for granted, this may be an alarm for the risk.

Techniques and tools to limit “scope creep”

Project scope is very essential for a project. According PMBOK Guide (PMI: 6th edition, 2017) Section 11.5.2, it determines the path in which the project is moving towards. The way to gain control over the project are given below:

Documentation of the requirements: The items required for the execution of the project must be documented while the initial planning of the project was done. This was the project scope can be kept in mind and followed strictly. Straying away from the project scope causes difficulties in handling the projects.

Setting up proper change management process: Change is necessary for a project according to the requirements of the project and sometimes due to the change in the demands by the client. These changes has to be monitored such that project requirements are fulfilled.

Developing a project schedule: clear scheduling is important as the sequence of the task to be performed can be analysed and understood from there.

Verification of the scope of the project from the stakeholders: The stakeholders are the ones who are directly involved in a project (Hopkin, 2018). The client as well as the employees must be aware of the project scope such that any change in the scope can be administered in the initial phase.

Engagement of a project team: Teamwork is essential for the successful completion of a project. Thus as a project manager, creating a team and involving them in the project correctly helps in avoiding scope-creep.

Methods for budgetary risks 

Planning of a budget in a project management is a significant step. According to the PMBOK, this determines the successful completion of a project within a given timeline and the provided resources (Ho et al., 2015). The budget risk can be avoided with the help of the steps:

  1. Identification of the major items for the project and estimation of the cost of those items in the initial phase of the project helps in reducing the budget failure in a project.
  2. Advisories from the key personnel on the major products of the project can help in identification of the correct item for the project along with correct price.
  3. More information must be gathered on the items from the SMEs.

Recommendations for managing documentation risks

For the purpose of the mitigation of the risks, proper analysis of threats must be performed and they must be documented. Documentation helps in keeping track of the activities occurring in a project. In any case if the documentation has some sort if discrepancies, someone or the other from the project management team has to take responsibility for it. Reviewing the documentation on a regular basis reduces the chances of the documentation risk and helps in managing the project efficiently.

 

References: 

Buttrick, R. “Thoughts on IT Project Risk”, Praxis, 2015 (Black Swans)

Dash, S.N. (MPGU, 2015) “PMP Prep: Qualitative vs. Quantitative Risk”

Ho, W., Zheng, T., Yildiz, H., & Talluri, S. (2015). Supply chain risk management: a literature review. International Journal of Production Research, 53(16), 5031-5069.

Hopkin, P. (2018). Fundamentals of risk management: understanding, evaluating and implementing effective risk management. Kogan Page Publishers.

PMBOK Guide (PMI, 2017, 6th edition), Part 1, Section 11.2.3 “Identify Risks: Outputs” p.417 to 11.2.3.3 “Project Document Updates”, p.418.

PMBOK Guide (PMI, 2017, 6th edition), Part 1, section 11.4 “Perform Quantitative Risk Analysis” to 11.4.3.1 “Project Management Update”, pages 428-.436.
PMBOK Guide (PMI, 2017) Part II section 3.9 “Estimate Activity Duration”, p.574 to 3.9.3 “Project Document Updates”, p.575

PMBOK Guide (PMI: 6th edition, 2017) Section 11.5.2 “Plan Risk Responses: Tools and Techniques” p.441 through 11.5.3.2 “Project Risk Mgt. Plan Updates”, page 447.

Rose, K. H. (2013). A Guide to the Project Management Body of Knowledge (PMBOK® Guide)—Fifth Edition. Project management journal, 44(3), e1-e1.

Varajão, J., Colomo-Palacios, R., & Silva, H. (2017). ISO 21500: 2012 and PMBoK 5 processes in information systems project management. Computer Standards & Interfaces, 50, 216-222.

Place your order
(550 words)

Approximate price: $22

Homework help cost calculator

600 words
We'll send you the complete homework by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 customer support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • 4 hour deadline
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 300 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
× How can I help you?