Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
This assignment contributes 30 % marks (including the final presentation) towards your final
grade in the course. This coursework is a group work (only 3-4 students per group)
In this assignment task you are required to answer a number of questions in order to evaluate
the risk Management process you completed in relation to the case study given.
You are required to set up the Risk Management Report and record all the documents you
have created for the risk assessment and risk control phase.
For the completion of few tasks you may are allowed to make few assumptions but should
mention the assumed scenarios.
Q1. Why is it important for the department to carry out risk management?
Q2. Identify the potential opportunities (positive risks) and threats (negative risks) that the
department may face during the project development phase
.
Q3. State in your opinion would be the potential owners for the identified risks.
Q4. Explain, by means of specific examples, how the management of (any) 2 negative risk
events could help to optimize achievement of project objectives.
Q5. Explain why it is important for a risk management process to cover both threat and
opportunity. Make sure that you justify your reasons
Q6. Prepare a draft risk management plan, completing all sections with information obtained
from the case study.
The report should include following as major portions (in relation to the risk management for the
attached case study):
IMPORTANT There are no marks to be gained by simply copying material from the internet. Marks are only
awarded for the candidates demonstrating understanding what should be in Risk Management Plan for this
specific case study.
Marks will be awarded on the following criteria
A. Inclusion of • Inclusion of • EXCEPTIONAL: if all
Required Content
elements and required elements and topics
required topics in are covered with a fully
the assignment complete, correct, and well-
description. worded presentation.
• Quality and • INADEQUATE: if the
correctness of majority of content is missing
description and and description is not
presentation of complete or correct.
topics. • MINIMALLY ADEQUATE to
• Innovative ideas to VERY GOOD: for lack of
address risks that inclusion of content and/or
are specific to the quality/correctness
project and the deficiencies between the
client. “Exceptional” and
“Inadequate” categories
described above.
• Sentence
construction and
lack of grammar
and syntax
problems.
• Concise and to the
point without
redundancy.
• Length
appropriate to the
stated
requirements
without
significantly
exceeding stated
word count
The UBITIS will increase efficiency with single entry of data into one database, greater consistency
of practice across the department, newly automated processes, better data management and
reporting, and improvements to the student experience. Previously there had been limited
functionality and the IS will allow UBIT to be much more flexible and thorough in its work.
The UBIT Information systems board will oversees the implementation of the IS project. The board
is a committee of the Information Systems Board and is chaired by the Department’s Chairman.
The University no doubt requires to develop state-of-the-art infrastructure to meet the academic
and administrative needs such as computer networks to connect all offices and laboratories
together, computer servers, PCs, high-speed internet connection, and software tools.
But currently the department has several key challenges which might generate potential risks
during the implementation and the deployment phase. Few of the challenges include;
1) University of Karachi is a government organization. The key issue is that, given pre-
existing functionality, the university need to make significant strategic and tactical
decisions about whether to change the current processes to fit the system or whether to
change the system to fit in the university processes.
2) The IS projects are mostly at risk of time, budge and cost.
3) The project is planned to be implemented using the traditional waterfall model.
4) The lack of proper infrastructure i.e. poor equipment and not enough resources for training
of the university staff to the new equipment and software system.
5) There is communication gap between the university’s various departments
6) The key decisions need approval from University’s vice chancellor and board of directors,
which frequently delayed
7) Vulnerability of information system security, software deficiency, data security, network
security, operating system security. Also, there is no formal policy on information
technology security.
8) There is an overall resistance on automated system implementation and the old staff is
against this change
Keeping in mind the need of the time the higher management has decided to hire your team as
consultants to facilitate them in performing the risk management’s processes.