Description
Efnisyfirlit
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- List of Figures
- List of Tables
- Preface
- Author
- Introduction
- Part I Risk Processes and Practices: Why Risk Management?
- Chapter 1 Risk Management Practices
- A Systematic Process
- Summary
- Chapter 2 Risk Concepts
- Risk Attitudes and Appetites
- Classifying Risk
- Risk Breakdown Structure
- Risk Taxonomy
- Risk Facets
- Other Risk Categories
- Taxonomically Developed Risks
- Other Relevant Considerations
- Risk Management Perspectives
- Realities of Project Management
- Summary
- Chapter 3 The Risk Management Structure
- Risk Management Planning
- Description and Project Summary
- Risk Environment
- Approach to Risk Management
- Application Issues and Problems
- Other Relevant Plans
- Risk Governance
- Approach Summary
- Bibliography
- Approvals
- Identify Risks
- Documentation Reviews
- Information-Gathering Techniques
- Checklists
- Assumptions Analysis
- Diagramming Techniques
- Perform Qualitative Analysis
- Baselining Risk
- Rating Schemes and Definitions
- Assumptions Testing
- Risk Modeling
- Using Analogies
- Conducting Data Quality Assessments
- Risk Categorization
- Risk Urgency Assessment
- Perform Quantitative Analysis
- Expert Interviews
- Expected Monetary Value (EMV)
- Decision Tree Analysis
- Program Evaluation and Review Technique
- Sensitivity Analysis
- Simulations
- Plan Risk Responses
- Risk Avoidance
- Risk Transference
- Risk Mitigation
- Risk Acceptance
- Opportunity Exploitation
- Opportunity Sharing
- Opportunity Enhancement
- Opportunity Acceptance
- Monitor and Control Risks
- Summary
- Part II Risk Management Techniques
- Chapter 4 Expert Interviews
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 5 Planning Meetings: The Risk Management Plan
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 6 Risk Practice Methodology
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 7 Documentation Reviews
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 8 Analogy Comparisons
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 9 Plan Evaluation
- Technique Description
- Using the WBS for Risk Identification
- Using Specifications for Risk Identification
- Using Statements of Work (SOWs) for Risk Identification
- Developing a Technical Risk Dictionary or Risk Register
- Using Other Plans for Risk Identification
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 10 Delphi Technique
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 11 Brainstorming
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 12 Crawford Slip Method (CSM)
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 13 Swot Analysis
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 14 Checklists
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 15 Risk Breakdown Structure
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 16 Root Cause Identification and Analysis
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 17 Risk Registers/Tables
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 18 Project Templates
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 19 Assumptions Analysis
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 20 Decision Analysis: Expected Monetary Value
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 21 Estimating Relationships
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 22 Network Analysis (Excluding PERT)
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 23 PERT
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 24 Other Diagramming Techniques
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying These Techniques
- Flowcharts
- Ishikawa (Fishbone) Diagrams
- Force Field Diagrams
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 25 Rating Schemes
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Scheme Development
- Scheme Application
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 26 Urgency Assessment
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 27 Futures Thinking
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 28 Risk Modeling
- Technique Description
- When Applicable
- Inputs and Outputs
- Model Development
- Model Application
- Major Steps in Applying the Technique
- Model Development
- Model Application
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 29 Sensitivity Analysis
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 30 Monte Carlo Simulations
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 31 Risk Factors
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 32 Risk Response Matrix/Pugh Matrix
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 33 Performance Tracking and Technical Performance Measurement
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Supplemental Information
- Technical Performance
- Schedule Performance
- Cost Performance
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 34 Risk Reviews and Audits
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Resource Requirements
- Applications
- Outputs
- Summary
- Chapter 35 Other Common Techniques
- Cost Performance Reports Analysis
- Independent Technical Assessment
- Technique Description
- When Applicable
- Inputs and Outputs
- Major Steps in Applying the Technique
- Use of Results
- Resource Requirements
- Reliability
- Selection Criteria
- Independent Cost Estimates
- Glossary
- Appendix A: Contractor Risk Management
- Appendix B: An Abbreviated List of Risk Sources
- Appendix C: Basic Probability Concepts
- Appendix D: Quantifying Expert Judgment
- Appendix E: Special Notes on Software Risk
- Index
Reviews
There are no reviews yet.