• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

Project management and risk assessment

Extracts from this document...








TERMS OF REFERNCE                                                                                 2

REPORT SUMMARY                                                                                     3










Overview of the Project: This is an individual research assignment answering three set questions in regards to project management and risk assessment.

Objectives for the Project

  • Research the areas of Project management and Risk Assessment.
  • Answer three set questions in regards to the research area.

Constraints- A word count of 3500 has been imposed upon the report. Researching the topics can only be used through the University of Westminster Infolynx resource no web sites are allowed as a source of research.

Resources – Microsoft Word 2000 is the only software required for the write up of the report. Two bound copies of the report will be submitted alongside two copies of the report on Disc.


This document looks at the technique of project management alongside risk assessment and is designed to give an overview of why projects fail in regards to the project environment and the risks associated within it.

For the purpose of this study project management is defined as the process of managing a project which requires the application of planning, team-building, communicating, controlling, decision-making and closing skills, principles, tools and techniques. Risk assessment is defined as Part of risk management in which planners identify potential risks and describe them, usually in terms of their symptoms, causes, probability of occurrence and potential impact.

Identified in this document are three stages in regards to Project management and Risk assessment. These are Projects failure and Risk assessment, the project environment and risks and Risk register and documentation of project risks.

...read more.


What went wrong?

The project was an ambitious one, probably not fully deliverable within the very tight timetable originally specified. It had special features that added to its risks; notably its status as a pioneering Private Finance Project, the need to join up the systems of two purchasers with differing business objectives, and the need for the development and testing of more new software than was originally thought(2).

The Department and Post Office Counters Ltd had different objectives for the project which led to increased tension.

The Departments initial business case did not adequately assess the risk and costs of serious slippage. When the contract was signed key parts of the detailed specification had not been finalized.

Too little time was allowed for pilot schemes and the two purchasers did not properly assess the risks involved in such a complex project.

What were the lessons learned?

A number of the lessons indicate that closer attention to project management techniques could have mitigated the failures.

Divided control. The project was run by two organisations, the Department and Post Office Counters Ltd, with different objectives. Although in theory projects can be run by two or more organisations, in practice this is a recipe for dispute and delay, which is what happened in this case. A key lesson to be learned is that it is usually better to let one purchaser take the lead with proper arrangements for information flow.

Inadequate time for specifying the requirement and piloting. A key lesson is that allowing realistic timescales for early planning and detailed specification will pay dividends in time, cost and quality;

A shared, open approach to risk management across the whole programme was not achieved.

...read more.


Necessary facilities not available: Not having the necessary facilities to complete the project may effect the completion of it. This will ultimately result in delay to the work of the project. This could result in not meeting the agreed deadline and ultimately having the project scrapped.

Exeeding Budget:  A major risk to an IT project is the chance of not meeting budgetary levels. This will result in increased costs and ultimately leading the project to be scrapped by the owners.

Not meeting deadlines: A project that is completed late may no longer be of any use to the end-user or the owner. This needs to be avoided as it could cost the project developers a lot of time and money.

Lack of management support. Project owners tend to be passive rather than active when it comes to project success. This is a major risk to any project is the amount of involvement from those of whom are commissioning the project.

Project development has many risks that need to be overcome in order for it to be classified a success. An example of a Risk Register can be found in the appendix see figure 3.


The following journals, Textbooks and newspapers were used to complete this report.

Bennit, S., Mcrobb, S., Farmer. R, 2002, Object-orientated systems analysis and design, Second edition, Glasgow: McGraw-Hill Education.

Marsh, D, 2000, The project & programme support office handbook, Volume one, Great Britain: Project Manager Today.

Cleland, D., 2001, A guide to the project management body of knowledge of 2000, Chicago: Project Management Institute.

Houstin, L., 2000, Management project procurement, Washington D.C: Primis.

Schwalbe, K., 2003, Information technology project management, London: Course                     technology.

Carl, S., 2000, Step by step Microsoft project 2000, Canada: Penguin Books.

Perez, J., 2001, Benefit fraud, Computing Weekly, pg. 11.

Timmins, N., Whitehall Passports, Financial times, Dec 4 2003, pg. 4.

Morris, S., Asylum scrapped, Guardian, Feb 16 2001, pg.9.

Barnes, M., Post it benefits, The Times, Aug 14 2002, pg. 23.

Nugent, H., Benefit fiasco, The Times, Aug 16 2002, pg. 5.

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Risk Management and Assessment for IT Projects.

    But IT projects are often difficult to estimate and manage, and some projects are cancelled or reduced in scope because of overruns in cost and or time, or failure to produce expected benefits. Therefore, the essence of Risk Management is the avoidance of anything which extends the schedule, increases the

  2. This paper will propose a testing strategy for Internet E-Commerce applications and assess its ...

    * Ensure that stakeholders agree to a capacity plan for the system with measurable capacity requirements. 2. Define a test strategy * Formulate and document a test strategy; relate it to the test quality plan. * Identify high-risk zones early on; mark these for early testing and keep them away from the project's critical path.

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    This methodology is used within the software industry. At the time of this development Unified Modelling Language (UML) was most dominant within the industry; however UML only provided a standardised modelling language. A methodology was required to identify the specification of what was required to be modelled, hence the Unified Process.

  2. Methods and technology used in Computer Forensics

    Having created the file, I deleted it, and then deleted it from the recycle bin, "permanently" removing it as far as the user is concerned. The first thing that Pandora Recovery will do is check to see if data is in the recycle bin, which will not be the case here; the file has been completely deleted.

  1. Lifecycle Management Of Information Technology Project In Construction

    Rationale Current trend? in information and communication technology (ICT) are yielding the wide range of new computer-ba?ed tool? to ?upport architecture, engineering, con?truction and facilitie? management indu?trie? (collectively referred to ?imply a? "con?truction" in thi? paper). The?e tool?(Oppenheimer 2002: 44)particularly tho?e a??ociated with building information model?

  2. Database projects in MS Access.

    This might include, for example holding details about customers, products and orders or calculating the value of invoices. The specific objectives outlined below will act as performance criteria for your project. 3.2 Specific objectives - quantitative Prepare a numbered list of your quantitative objectives.

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    2.3 YUV Color Space The YUV color space is use by the analog PAL, NTSC and SECAM color video/TV standards. The Y component determines the brightness of the color while U and V component determines the color itself. As human eye is more responsive to brightness than color of the image, its encoding provides low bandwidth to the chrominance component.

  2. This research project is being conducted to formulate an answer or theory to the ...

    She does emphasise though that efforts should still be made to find a sample as representative of the population as possible. Within this research project, the theoretical population is therefore those who use complementary therapies. However, the sample is drawn from the accessible population, which as mentioned previously is to be a student, friend, or a family member.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work