This scenario presents a negative risk for the project management process. The installation of network infrastructure is intended to increase the number of users, and failure to reach critical areas presents a high probability risk for this process. The management will fail to realize a high priority objective in the project management process. Therefore, the consequences of the risk are severe. The users targeted in this project are crucial areas that cannot carry out their activities without network infrastructure, which impacts on the ability to deliver quality services. A failure of the network system is a failure of the project altogether. Since effectiveness of the network system is mandatory, avoidance, transfer, and mitigation is an appropriate risk management strategy to realize this objective. It is important to acknowledge the challenges to be experienced in providing network infrastructure in various areas. In case it happens, transferring network services to other crucial areas helps in avoiding this risk or having appropriate resources to mitigate the risk is better. A project management tool to employ in this situation is simulation modeling (Gupta, 2013). A simulation model enables accurate representation of information in a hierarchical order and allows incorporation of information from a single infrastructure system to other networks and sub networks.
This is a positive risk for the project management process. The ability to increase network infrastructure in a particular market is a priority of the project, and to avoid potential problems like breakdown in network infrastructure in necessary areas, it is important to expand the number of users. Therefore, the risk probability is medium because increasing applicability of network infrastructure by selecting vendors ready to offer specialized email address book for users is an important step in increasing the number of users in the project. In order to avoid risks involved with adding users through choosing vendors, exploiting, sharing, and enhancing is a crucial risk management strategy. However, the impact of the risk is high because it will take additional costs to set up email infrastructure for vendors, and vendors offering email services may compromise quality services. Therefore, it is important to adopt a IT cloud computing system for the vendors because through this software, the project will monitor on the vendors ability to ensure network security and privacy that may compromise quality services. Integrated reporting is an appropriate management tool to avoid this risk. The integrated reporting can be dramatically represented through a chart representing the identification, assessment, monitoring, review, and mitigation processes to monitor the email system of vendors (Alberts & Dorofee, 2004).
This is a negative risk opportunity for the project management process. The installation of network infrastructure in crucial areas requires sufficient network engineers. This may involve additional costs to the project, but it important to ensure the provision of quality services to users. In the case of a business analyst, the availability of information is important in various project decisions and actions. Therefore, lack of networks engineers and a business analyst is a high priority risk for the project management and may have severe consequences on the process. Not only will it fail to offer quality services to users, the project managers will lack sufficient information to make crucial decisions needed to ensure efficient operation of the project. Therefore, the management should avoid, transfer, and mitigate this risk in order to avoid inconveniences, and the project can adopt a cost benefit analysis tool in order to determine the opportunity cost of forgoing an alternative.
This is both a negative and positive risk opportunity for the project. Negatively, there is a likelihood of losing a potential key candidate product for the project thus additional costs for evaluating other alternatives. Positively, the project management avoids additional costs in terms of legal costs and implementation costs and focuses on necessary users for the network infrastructure. This is a low priority risk because there is no urgency in making decisions about other considerations. Therefore, their consequence on the project management process is low. If the management focuses on the necessary users and candidates for products, it will avoid unnecessary risks incurred if another product candidate is included. A cost benefit analysis is important in order to determine additional benefits to expect from choosing a particular key candidate product (Gupta, 2013).
This is a positive risk opportunity for the project management. The consideration by Ohio Department to adopt one of these email systems is likely to increase availability of network infrastructure in many areas of the state. It is a high probability risk because adoption of email systems will expand the market and network infrastructure for the project. Moreover, the consequences of the positive risk opportunity are low, but it is important to exploit, share, and enhance access to new users through this email system, and determine the Ohio Department’s ability to adopt this system. A PERT risk management software is necessary in mapping available network infrastructures in the state.
References
Alberts, C. J., & Dorofee, A. J. (2004). Managing information security risks: The OCTAVE
approach. Boston: Addison-Wesley. Gupta, A. (2013). Risk management and simulation. CRC Press
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more