Discuss about the Qualitative Risk Analysis and Identification.
The 5-level consequence table is constructed as follows.
Risk |
Consequence |
Changing Requirements of Users with Time |
Insignificant |
Supply Cut Down from One Supplier |
Minor |
Lack of Manpower |
Moderate |
Cost |
Major |
Poaching |
Catastrophic |
This table has been developed in order to arrange the risks associated with the project i.e. utilization of wood in construction structure in Malaysia. As per the initial analysis, there are numerous risks associated in the relevant project area. However, it is clear that all the associated risks cannot be managed or mitigated together. Hence, it is required to arrange the risks in terms of consequences so that the risks with bigger consequence on the project will be analysed, addressed and mitigated prior to the other associated risks. From the consequence table created, it can be seen that there are five risk elements that have been arranged in terms of their consequences in the project (Haimes 2015). The most catastrophic risk is poaching that have been discussed previously. This risk will have a massive impact on the wood industry in Malaysia. The risk element that can have major impact on the project is cost. If the cost of wood rises up significantly in the Malaysian market, the cost of processing and construction of wooden structures will also increase significantly. As a result, people will look for cheaper alternatives for construction of structures and hence, the wood industry will face a difficult challenge to overcome. Lack of manpower is another risk associated with the field of the project. Since this chosen industry is mainly related to the construction of structures, it is important to maintain sufficient manpower for providing continuous service for building of wooden structures. The next two risk elements include cut down of supply from one supplier and changes in user requirements within a short period of time (Hopkinson 2017). These two risk elements have minor or insignificant effects on the project and hence, they can be treated and managed later.
Descriptor |
Criteria / Objective |
Almost Certain |
The event is expected to occur in most circumstances |
Likely |
The event will probably occur in most circumstances |
Possible |
The event should occur at some time |
Unlikely |
The event could occur at some time |
Rare |
The event will only occur in exceptional circumstances |
Combining the consequence table and the likelihood table, the following table is generated that defines the priority of mitigation of a particular risk.
RISK RATING |
Insignificant |
Minor |
Moderate |
Major |
Catastrophic |
Almost Certain |
Moderate |
Moderate |
High |
Extreme |
Extreme |
Likely |
Low |
Moderate |
High |
High |
Extreme |
Possible |
Low |
Moderate |
Moderate |
High |
High |
Unlikely |
Low |
Low |
Moderate |
Moderate |
Moderate |
Rare |
Low |
Low |
Low |
Moderate |
Moderate |
Now, the likelihood table for the identified risks can be developed as follows.
Risk |
Likelihood |
Changing Requirements of Users with Time |
Possible |
Supply Cut Down from One Supplier |
Rare |
Lack of Manpower |
Possible |
Cost |
Likely |
Poaching |
Almost Certain |
Furthermore, the risks can now be categorized and prioritized based on both consequences and likelihood as shown in the following table.
Risk |
Consequence |
Likelihood |
Risk Rating |
Changing Requirements of Users with Time |
Insignificant |
Possible |
Low |
Supply Cut Down from One Supplier |
Minor |
Rare |
Low |
Lack of Manpower |
Moderate |
Possible |
Moderate |
Cost |
Major |
Likely |
High |
Poaching |
Catastrophic |
Almost Certain |
Extreme |
Based on this table and the created risk rating, it can be seen that poaching is by far the most top priority risk that must be considered and suitable actions must be taken before the other risks.
The risk register for the project is developed as follows.
Risk Register |
|||||||
Risk No. |
Risk Description |
Cause |
Consequences |
Impact |
Likelihood |
Rating |
|
1 |
Legal/Regulatory |
Extensive poaching of valuable trees may result in Government ban for purchase and use of wood from non-verified sources. |
Extensive timber poaching in the forests |
Government ban, strong restriction regarding procurement and supply of wood |
5-Catastrophic |
5-Almost Certain |
Extreme |
2 |
Finance |
High cost of wood may result in significant rise in the cost of construction or supply of wood. |
Increase in prices of wood due to lack of supply or government restrictions |
Customers looking for cheaper and better alternatives |
4-Major |
4-Likely |
High |
3 |
Commercial |
Lack of sufficient manpower in the industry may result in the delay of construction and customer dissatisfaction due to the same reason |
Reduction in manpower in the industry |
Customer dissatisfaction, rise of other alternative industries |
3-Moderate |
3-Possible |
Medium |
4 |
Commercial |
One supplier may get shut down and will not be able to provide sufficient amount of supply wood to the organization |
Various external reasons related to the supplier |
Cut down in supply will result in decrease in service time and progress of wood construction works |
2-Minor |
1-Rare |
Low |
5 |
Commercial |
Rapid change in the user requirements will result in losses of the company to change the project at various points of time |
Changes in user requirements |
Slow down in project progress, rapid and repeated change management processes |
1-Insignificant |
3-Possible |
Low |
Treatment |
Residual Risk |
Residual Risk Probability |
Residual Rating |
Who |
When |
Status |
Verify source of wood before purchase |
Incorrect information |
High |
High |
Marketing Manager |
PLEASE FILL |
Active |
Regulate costs to meet customer needs |
Rapid changes in market |
High |
High |
Marketing Manager |
PLEASE FILL |
Active |
Recruit skilled manpower |
None |
– |
– |
HR Manager |
PLEASE FILL |
Active |
Choose reliable and verified supplier |
None |
– |
– |
Marketing Manager |
PLEASE FILL |
Active |
Provide services based on contracts |
Too much demands from customer |
Medium |
Medium |
Operations Manager |
PLEASE FILL |
Active |
A major risk that happened in a project that I was involved in was during my research project when I was working on the internet in order collect data from various sources including literature. While using the internet, I surfed through various sources and website links in order to find relevant pieces of information. However, at one time, an advertisement popped up on the screen showing large discounts from a well known online shopping site. Attracted by such an offer, I instantly clicked on the link that redirected me to an unknown website. Unable to reach the website of the shopping site, I immediately pressed the back button and tried to return to my research work. However, within a few seconds, a large message popped up on the screen that said it had encrypted some of the files in the system using a technique that cannot be decrypted without a single key. It also said that unless I pay a certain amount of money in the form of bitcoins, the key will be automatically destroyed and I will never be able to retrieve the files encrypted. Furthermore, the charge will also go up if I try to manipulate the software or shut down the computer. I understood that I became a victim of ransomware – a major source of risk in the IT industry. According to Rabbi et al. (2016), ransomware is a software that is specifically designed to capture various files from a particular system and lock them with such strong encryption that cannot be decrypted using any means. Attempt to tamper the software by any means triggers an operation that deletes all the files captured from the system immediately. As per Glendon, Clarke and McKenna (2016), this is a very serious type of risk that cannot be solved by any method once it enters the system. Hence, the only way is to protect the system with suitable measures that will not allow any such type of software to enter into the system at all.
As I encountered the problem during the research project, I lost many of my files from the system and that I was a significant setback in my research project work. I realized that I needed to evaluate the risks in the project earlier and take suitable actions for mitigating the risks. Furthermore, I needed to be more aware regarding the use of the internet as there are millions of malicious links lurking in most of the websites that can inject malwares into the system at just one single click. While there are some malwares that do minimal damage to the system, some are extreme like the one I faced resulting in a loss of a huge amount of files and facing significant setback in my project work.
As a result of the significant setback, I took certain initiatives so that these risk events do not occur again in the near the future. I first reported to the project supervisor regarding the incident so that sufficient funding is available for taking actions against the encountered risk event. I appointed a network specialist to work on installation of system firewall that will be able to block the entry of any kind of malware or malicious files into the system. Furthermore, in case of attempted entry, the firewall will immediately notify the user so that he can take immediate mitigation action. Additionally, I installed antivirus software in order to delete any kind of malicious files that have already entered the system through some unauthorized sources.
The risk management actions were only taken after the risk event occurred and already significant amount of work have been lost. Hence, this can be considered as bad risk management because the risk event could not be avoided. What needed to be done was taking the precautions early so that the risk event could be avoided. Before starting the project, sufficient risk analysis was not undertaken and as a result, we were not prepare to counter any risk that could come our way during the course of the project.
References
Beare, Hedley, Brian J. Caldwell, and Ross H. Millikan. Creating an excellent school: Some new management techniques. Routledge, 2018.
Brittain, Stephanie, Madeleine Ngo Bata, Paul De Ornellas, E. J. Milner-Gulland, and Marcus Rowcliffe. “Combining local knowledge and occupancy analysis for a rapid assessment of the forest elephant Loxodonta cyclotis in Cameroon’s timber production forests.” Oryx (2018): 1-11.
Bromiley, Philip, Michael McShane, Anil Nair, and Elzotbek Rustambekov. “Enterprise risk management: Review, critique, and research directions.” Long range planning 48, no. 4 (2015): 265-276.
Cagliano, Anna Corinna, Sabrina Grimaldi, and Carlo Rafele. “Choosing project risk management techniques. A theoretical framework.” Journal of Risk Research 18, no. 2 (2015): 232-248.
Chance, Don M., and Roberts Brooks. Introduction to derivatives and risk management. Cengage Learning, 2015.
Cleden, David. Managing project uncertainty. Routledge, 2017.
Elzamly, Abdelrafe, and Burairah Hussin. “Classification and identification of risk management techniques for mitigating risks with factor analysis technique in software risk management.” Rev. Comput. Eng. Res 2, no. 1 (2015): 22-38.
Elzamly, Abdelrafe, Burairah Hussin, and Norhaziah Md Salleh. “Top Fifty Software Risk Factors and the Best Thirty Risk Management Techniques in Software Development Lifecycle for Successful Software Projects.” International Journal of Hybrid Information Technology 9, no. 6 (2016): 11-32.
Giannakis, Mihalis, and Thanos Papadopoulos. “Supply chain sustainability: A risk management approach.” International Journal of Production Economics 171 (2016): 455-470.
Glendon, A. Ian, Sharon Clarke, and Eugene McKenna. Human safety and risk management. Crc Press, 2016.
Haimes, Yacov Y. Risk modeling, assessment, and management. John Wiley & Sons, 2015.
Hopkin, Paul. Fundamentals of risk management: understanding, evaluating and implementing effective risk management. Kogan Page Publishers, 2017.
Hopkinson, Martin. The project risk maturity model: Measuring and improving risk management capability. Routledge, 2017.
Kaiser, Michael G., Fedi El Arbi, and Frederik Ahlemann. “Successful project portfolio management beyond project selection techniques: Understanding the role of structural alignment.” International Journal of Project Management 33, no. 1 (2015): 126-139.
Kisner, Carolyn, Lynn Allen Colby, and John Borstad. Therapeutic exercise: foundations and techniques. Fa Davis, 2017.
Lam, James. Enterprise risk management: from incentives to controls. John Wiley & Sons, 2014.
Marcelino-Sádaba, Sara, Amaya Pérez-Ezcurdia, Angel M. Echeverría Lazcano, and Pedro Villanueva. “Project risk management methodology for small firms.” International journal of project management 32, no. 2 (2014): 327-340.
McNeil, Alexander J., Rüdiger Frey, and Paul Embrechts. Quantitative Risk Management: Concepts, Techniques and Tools-revised edition. Princeton university press, 2015.
Modarres, Mohammad. Risk analysis in engineering: techniques, tools, and trends. CRC press, 2016.
Mukul, Sharif Ahmed, AZM Manzoor Rashid, Mohammad Belal Uddin, and Niaz Ahmed Khan. “Role of non-timber forest products in sustaining forest-based livelihoods and rural households’ resilience capacity in and around protected area: a Bangladesh study.” Journal of Environmental Planning and Management 59, no. 4 (2016): 628-642.
Neves, Sandra Miranda, Carlos Eduardo Sanches da Silva, Valério Antonio Pamplona Salomon, Aneirson Francisco da Silva, and Bárbara Elizabeth Pereira Sotomonte. “Risk management in software projects through knowledge management techniques: cases in Brazilian incubated technology-based firms.” International Journal of Project Management 32, no. 1 (2014): 125-138.
Pritchard, Carl L., and PMI-RMP PMP. Risk management: concepts and guidance. Auerbach Publications, 2014.
Rabbi, Md Forhad, Khan Olid Bin Mannan, Mitesh D. Parmar, R. J. Parmar, V. R. Solanki, R. J. Pathak, V. M. Pathak et al. “A Short Review for Selecting the Best Tools and Techniques to Perform Software Risk Management.” European Journal of Advances in Engineering and Technology 3, no. 6 (2016): 1-7.
Wilfred, Paulo, and Andrew MacColl. “The pattern of poaching signs in Ugalla Game Reserve, western Tanzania.” African journal of ecology 52, no. 4 (2014): 543-551.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download