• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/29

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

29 Cards in this Set

  • Front
  • Back

acceptance

A response to a risk event, generally made when the probability of the event and/or its impact is small. It is used when mitigation, transference, and avoidance are not selected.

avoidance

One response to a risk event. The risk is avoided by removing the risk from the project.

brainstorming

The most common approach to risk identification; it is performed by a project team to identify risks within the project. A multidisciplinary team, hosted by a project facilitator, can also perform ______________.

cause-and-effect diagrams

Used for root-cause analysis of what factors are creating the risks within the project. The goal is to identify and treat the root of the problem, not the symptom.

contingency reserve

A time or dollar amount allotted as a response to risk events that may occur within a project.

decision tree analysis

A type of analysis that determines which of two decisions is the best, The _______________ assists in calculating the value of a decision and determining which decision costs the least.

Delphi Technique

A method to query experts anonymously on foreseeable risks within the project, phase, or component of the project. The results of the survey are analyzed and organized, then circulated to the experts. There can be several rounds of anonymous discussion with the _______________. The goal is to gain a consensus on project risks, and the anonymous nature of the process ensures that no one expert's advice overtly influences the opinion of another participant.

enhance

To _______ a risk is to attempt to modify its probability and/or its impacts to realize the most gains from it.

exploit

The organization wants to ensure that the identified risk does happen to realize the positive impact associated with the risk event.

influence diagram

Charts out a decision problem. It identifies all of the elements, variables, decisions, and objectives - and how each factor may influence another.

mitigation

Reducing the probability or impact of a risk.

qualitative risk analysis

An examination and prioritization of the risks based on their probability of occurring and the impact on the project if they do occur. _____________________ guides the risk reaction process.

quantitative risk analysis

A numerical assessment of the probability and impact of the identified risks. _____________________ also creates an overall risk score for the project.

residual risks

Risks that are left over after mitigation, transference, and avoidance. These are generally accepted risks. Management may elect to add contingency costs and time to account for ________________ within the project.

risk

An unplanned event that can have a positive or negative influence on the project's success.

risk categories

These help organize, rank, and isolate the risks within the project.

risk management plan

A subsidiary project plan for determining how risks will be identified, how quantitative and qualitative analyses will be completed, how risk response planning will happen, how risks will be monitored, and how ongoing risk management activities will occur throughout the project life cycle.

risk owners

The individuals or groups responsible for a risk response.

risk register

Documentation of all risk events and their conditions, impact, probability, and overall risk score.

scales of probability and impact

Used in a risk matrix in both qualitative and quantitative risk analyses to score each risk's probability and impact.

secondary risks

Risks that stem from risk responses. For example, the response of transference may call for hiring a third-party to manage an identified risk. A ____________________ caused by the solution is the failure of the third party to complete its assignment as scheduled. _________________ must be identified, analyzed, and planned for, just like any other identified risk.

sensitivity analysis

Examines each project's risk on its own merit to assess the impact on the project. All other risks in the project are set at a baseline value.

share

Sharing is nice. When sharing, the risk ownership is transferred to the organization that can most capitalize on the risk opportunity.

simulation

Allows the project teams to play "what-if" games without affecting any areas of production.

system or process flowcharts

Show the relationship between components and how the overall process works. They are useful for identifying risks between system components.

transference

A response to risks in which the responsibility and ownership of the risk are transferred to another party (for example, through insurance).

triggers

Warning signs that a risk has occurred or is about to occur (for example, a vendor failing to complete their portion of the project as scheduled).

utility function

A person's willingness to accept risk. The higher the utility function, the more likely the person or organization is willing to seek risk.

workarounds

Unplanned responses to risks that were not identified or expected.