Professional Documents
Culture Documents
PMCH3
PMCH3
PMCH3
Haramaya, Ethiopia
March 14, 2024
Contents
• Control thresholds
• Reporting formats
• Process descriptions
Defining Activities
• Involves identifying the specific actions that will
produce the project deliverables in enough detail to
determine resource and schedule estimates.
• The activity list is a tabulation of activities to be
included on a project schedule.
• The list should include the activity name, an activity
identifier or number, and a brief description of the
activity.
Defining Activities cont.…
1. Find all of the activities that start at node 1. Draw their finish nodes and
draw arrows between node 1 and those finish nodes. Put the activity letter or
name and duration estimate on the associated arrow .
2. Continuing drawing the network diagram, working from left to right. Look
for bursts and merges. Bursts occur when a single node is followed by two
or more activities. A merge occurs when two or more nodes precede a single
node.
3. Continue drawing the project network diagram until all activities are included
on the diagram that have dependencies.
4. As a rule of thumb, all arrowheads should face toward the right, and no
arrows should cross on an AOA network diagram.
Task Dependencies
Precedence Diagramming Method (PDM)
http://www.smartsheet.com/blog/gantt-chart-excel
Critical Path Method (CPM)
• CPM is a network diagramming technique used to
predict total project duration.
• A critical path for a project is the series of activities
that determines the earliest time by which the
project can be completed.
• The critical path is the longest path through the
network diagram and has the least amount of slack
or float.
• Slack or float is the amount of time an activity may
be delayed without delaying a succeeding activity or
the project finish date.
Finding the Critical Path
D=7 5 F=2
• Variance analysis, such as analyzing float or slack and using earned value
• What-if scenario analysis, which can be done manually or with the aid of software
Financial risk
Technology risk
People risk
Structure/process risk
A risk breakdown structure(RBS)
• RBS is a hierarchy of potential risk categories for a
project like WBS The timing of risk management is also
an important consideration.
• Sample Risk Breakdown Structure:
Potential Negative Risk Conditions
Associated with Each Knowledge Area
Identifying Risks
• Identifying risks is the process of understanding what
potential events might hurt or enhance a particular
project
• Risk identification tools and techniques include:
• Brainstorming
• The Delphi Technique
• Interviewing
• SWOT analysis
Cont..
• Brainstorming is a technique by which a group attempts to
generate ideas or find a solution for a specific problem by
amassing ideas spontaneously and without judgment.
• The Delphi Technique is used to derive a consensus among a
panel of experts who make predictions about future
developments. Provides independent and anonymous input
regarding future events.
• Interviewing is a fact-finding technique for collecting
information in face-to-face, phone, e-mail, or instant-
messaging discussions.
• SWOT analysis (strengths, weaknesses, opportunities, and
threats) can also be used during risk identification.
Risk Register
• The main output of the risk identification process is a list
of identified risks and other information needed to begin
creating a risk register.
• A risk register is:
• A document that contains the results of various risk management
processes and that is often displayed in a table or spreadsheet
format.
• A tool for documenting potential risk events and related
information.
• Risk events refer to specific, uncertain events that may
occur to the detriment or enhancement of the project.
Risk Register Contents
• An identification number for each risk event [ID]
• A rank for each risk event [RANK]
• The name of each risk event [NAME]
• A description of each risk event [DESCRIPTION]
• The category under which each risk event falls
[CATEGORY]
• The root cause of each risk [ROOT CAUSE]
• Triggers for each risk; triggers are indicators or
symptoms of actual risk events [INDICATORS]
• Potential responses to each risk [RESPONSE]
Risk Register Contents (continued)
• The risk owner or person who will own or take responsibility for
each risk [HANDLER]
• The probability and impact of each risk occurring
• [PROBABILITY]
• The status of each risk [STATUS]
Sample Risk Register
Performing Qualitative Risk Analysis
• Assess the likelihood and impact of identified risks to
determine their magnitude and priority.
• Risk quantification tools and techniques include:
• Probability/impact matrixes
• The Top Ten Risk Item Tracking
• Expert judgment
Probability/Impact Matrix
• A probability/impact matrix or chart lists the relative
probability of a risk occurring on one side of a matrix or
axis on a chart and the relative impact of the risk
occurring on the other.
• List the risks and then label each one as high, medium, or
low in terms of its probability of occurrence and its
impact if it did occur.
• Can also calculate risk factors
• Numbers that represent the overall risk of specific
events based on their probability of occurring and the
consequences to the project if they do occur.
Top Ten Risk Item Tracking
• Top Ten Risk Item Tracking is a qualitative risk
analysis tool that helps to identify risks and maintain an
awareness of risks throughout the life of a project
• Establish a periodic review of the top ten project risk
items
• List the –
• current ranking,
• previous ranking,
• number of times the risk appears on the list over a period
of time, and a summary of progress made in resolving the
risk item
Example of Top Ten Risk Item Tracking
Watch List
• A watch list is a list of risks that are low priority but
are still identified as potential risks.