• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

Project management and risk assessment

Extracts from this document...








TERMS OF REFERNCE                                                                                 2

REPORT SUMMARY                                                                                     3










Overview of the Project: This is an individual research assignment answering three set questions in regards to project management and risk assessment.

Objectives for the Project

  • Research the areas of Project management and Risk Assessment.
  • Answer three set questions in regards to the research area.

Constraints- A word count of 3500 has been imposed upon the report. Researching the topics can only be used through the University of Westminster Infolynx resource no web sites are allowed as a source of research.

Resources – Microsoft Word 2000 is the only software required for the write up of the report. Two bound copies of the report will be submitted alongside two copies of the report on Disc.


This document looks at the technique of project management alongside risk assessment and is designed to give an overview of why projects fail in regards to the project environment and the risks associated within it.

For the purpose of this study project management is defined as the process of managing a project which requires the application of planning, team-building, communicating, controlling, decision-making and closing skills, principles, tools and techniques. Risk assessment is defined as Part of risk management in which planners identify potential risks and describe them, usually in terms of their symptoms, causes, probability of occurrence and potential impact.

Identified in this document are three stages in regards to Project management and Risk assessment. These are Projects failure and Risk assessment, the project environment and risks and Risk register and documentation of project risks.

...read more.


What went wrong?

The project was an ambitious one, probably not fully deliverable within the very tight timetable originally specified. It had special features that added to its risks; notably its status as a pioneering Private Finance Project, the need to join up the systems of two purchasers with differing business objectives, and the need for the development and testing of more new software than was originally thought(2).

The Department and Post Office Counters Ltd had different objectives for the project which led to increased tension.

The Departments initial business case did not adequately assess the risk and costs of serious slippage. When the contract was signed key parts of the detailed specification had not been finalized.

Too little time was allowed for pilot schemes and the two purchasers did not properly assess the risks involved in such a complex project.

What were the lessons learned?

A number of the lessons indicate that closer attention to project management techniques could have mitigated the failures.

Divided control. The project was run by two organisations, the Department and Post Office Counters Ltd, with different objectives. Although in theory projects can be run by two or more organisations, in practice this is a recipe for dispute and delay, which is what happened in this case. A key lesson to be learned is that it is usually better to let one purchaser take the lead with proper arrangements for information flow.

Inadequate time for specifying the requirement and piloting. A key lesson is that allowing realistic timescales for early planning and detailed specification will pay dividends in time, cost and quality;

A shared, open approach to risk management across the whole programme was not achieved.

...read more.


Necessary facilities not available: Not having the necessary facilities to complete the project may effect the completion of it. This will ultimately result in delay to the work of the project. This could result in not meeting the agreed deadline and ultimately having the project scrapped.

Exeeding Budget:  A major risk to an IT project is the chance of not meeting budgetary levels. This will result in increased costs and ultimately leading the project to be scrapped by the owners.

Not meeting deadlines: A project that is completed late may no longer be of any use to the end-user or the owner. This needs to be avoided as it could cost the project developers a lot of time and money.

Lack of management support. Project owners tend to be passive rather than active when it comes to project success. This is a major risk to any project is the amount of involvement from those of whom are commissioning the project.

Project development has many risks that need to be overcome in order for it to be classified a success. An example of a Risk Register can be found in the appendix see figure 3.


The following journals, Textbooks and newspapers were used to complete this report.

Bennit, S., Mcrobb, S., Farmer. R, 2002, Object-orientated systems analysis and design, Second edition, Glasgow: McGraw-Hill Education.

Marsh, D, 2000, The project & programme support office handbook, Volume one, Great Britain: Project Manager Today.

Cleland, D., 2001, A guide to the project management body of knowledge of 2000, Chicago: Project Management Institute.

Houstin, L., 2000, Management project procurement, Washington D.C: Primis.

Schwalbe, K., 2003, Information technology project management, London: Course                     technology.

Carl, S., 2000, Step by step Microsoft project 2000, Canada: Penguin Books.

Perez, J., 2001, Benefit fraud, Computing Weekly, pg. 11.

Timmins, N., Whitehall Passports, Financial times, Dec 4 2003, pg. 4.

Morris, S., Asylum scrapped, Guardian, Feb 16 2001, pg.9.

Barnes, M., Post it benefits, The Times, Aug 14 2002, pg. 23.

Nugent, H., Benefit fiasco, The Times, Aug 16 2002, pg. 5.

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Risk Management and Assessment for IT Projects.

    But IT projects are often difficult to estimate and manage, and some projects are cancelled or reduced in scope because of overruns in cost and or time, or failure to produce expected benefits. Therefore, the essence of Risk Management is the avoidance of anything which extends the schedule, increases the

  2. Lifecycle Management Of Information Technology Project In Construction

    Rationale Current trend? in information and communication technology (ICT) are yielding the wide range of new computer-ba?ed tool? to ?upport architecture, engineering, con?truction and facilitie? management indu?trie? (collectively referred to ?imply a? "con?truction" in thi? paper). The?e tool?(Oppenheimer 2002: 44)particularly tho?e a??ociated with building information model?

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Developed to model real world elements incorporating these within the system specification. This methodology includes three main phases, Model, Network and Implementation. Agile approach derived from Jackson Structured Programming (JSP). * Entity action step * Entity structure step * Initial Model step * Function Step * Implementation step Blended (SSADM)

  2. This paper will propose a testing strategy for Internet E-Commerce applications and assess its ...

    ability of a system or components within a system to interact and work seamlessly with other systems or other components. This is normally achieved by adhering to certain application program interfaces (APIs), communication protocol standards, or to interface-converting technology such as Common Object Request Broker Architecture (CORBA)

  1. Methods and technology used in Computer Forensics

    The best example of making a file unreadable would be to use encryption, though the ability of computer forensic tools to overcome this has already been examined. Compression is a technique often ignored by users that wish to hide data, but can prove effective, as shrinking a file will make it unrecogniseable from its original form or expected parameters.

  2. The purpose of this project is to discuss the issues associated with the deployment ...

    23 Figure 6 Optional Dual WAP Stack Support (www.wapforum.com) 24 Figure 7 Architecture Diagram (Gulliver) 29 Figure 8 Rich Picture Example from (Wood-Harper) 40 Figure 9 Rich Picture Example a political cartoon from Bruce Petty (an Australian systems cartoonist) 41 Figure 10 Rapid Application Development Diagram (http://www.bgsu.edu) 45 Figure 11 Data Flow Diagram (WAP Banking Application)

  1. The development of Easy office project portfolio management system

    which is a method used for the effective resource planning of a manufacturing company. However, nowadays ERP systems basically cover all key functions of a company, regardless of the company structure, charter, or the types of businesses it runs. All businesses including governmental organisations, non-profit organizations, manufacturing, non-manufacturing organisations use ERP systems.

  2. My aim is to develop and provide a proposal to the Surgery of a ...

    After doing this we come up with a few plans and discuss the good and bas aspects of each plan. By doing this we can constructively decide in which plan to choose. After deciding on the future plan it is up to everyone to input ideas into how to expand the ideas already inputted into the selected plan.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work