• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Qualitative Risk Analysis

Extracts from this document...


Qualitative Risk Analysis

Qualitative risk analysis is the process of performing a qualitative analysis of identified risks. This process is intended to prioritize risks according to their potential effect on business objectives.  Qualitative risk analysis is one way of determining the importance of addressing specific risks and guides risk response measures. The time-criticality of risk-related actions may magnify the importance of a risk. An evaluation of the quality of the available information also helps modify the assessment of the risk. Qualitative risk Analysis requires that the probability and impact of the risks be estimated using qualitative analysis methods and tools. Using these tools helps correct biases that are often present in a business plan.  Qualitative risk analysis should be revisited during the business’s life cycle to stay current with changes in business risks.  This process can lead to further analysis in quantitative risk analysis or directly to risk response planning .

  • Inputs to Qualitative Risk Analysis
  • Risk management plan.
  • Identified risks.Risks discovered during the risk identification process are evaluated along with their potential impacts on the business.
  • Business status. The uncertainty of a risk often depends on the business’s progress through its life cycle. Early in the business many risks have not surfaced, the design for the business is immature and changes can occur, making it likely that more risks will be discovered.
  • Business type. Businesses of a common or recurrent type tend to have less risk. Businesses using state-of-the-art  or first-of-a-kind technology  or highly complex businesses tend to have more risk.
  • Data precision. Precision describes the extent to which a risk is known and understood. It measures the extent of data available as well as the reliability of data. The source of the data that was used to identify the risk must be evaluated.
  • Scales of probability and impact.  These scales are to be used in assessing the two key dimensions of risk.
  • Tools and Techniques for qualitative Risk Analysis
...read more.


Risk probability is the likelihood that a risk will occur.Risk impact is the effect on business objectives if the risk occurs.

These two dimensions of risk are applied to specific risks, not to the overall business.  Analysis of risks using probability and impact helps identify those risks that should be managed aggressively.

  • Probability / impact risk rating matrix. A matrix may be constructed that assigns risk ratings (low, moderate and high) to risks or conditions based on combining probability and impact scales. Risks with high probability and high impact are likely to require further analysis, including quantification, and aggressive risk management.  The risk rating is accomplished using a matrix and risk scales for each risk or condition.
A risk’s probability scale naturally falls between 0.0 (no probability) and 1.0 (certainty). Assessing risk probability may be difficult because expert judgment is used, often without benefit of historical data. A general scale (e.g. .1/.3/.5/.7/.9), representing probabilities from very unlikely to almost certain, could be used.

The risk’s impact scale reflects the severity of its impact on the business objective.

...read more.


  • Outputs from Qualitative Risk Analysis
  • Overall risk ranking for the business.Riskranking may indicate the overall risk position of a business relative to other businesses by comparing risk scores.  It can be used to assign personnel or other resources to businesses with different risk rankings, to make a benefit-cost analysis decision about the business, or to support a recommendation for business cancellation.
  • List of prioritized risks. Risks and conditions may be prioritized by their group category (high, moderate, and low) at a detailed level, perhaps at the lowest WBS level. Risks may also be grouped by those that require an immediate response and those that can be handled at a later date. Cost, schedule, functionality and quality risks may be assessed separately with different ratings. Significant risks should have a description of the basis for the assessed probability and impact.
  • List of risks for additional analysis and management. Risks classified as high or moderate would be prime candidates for more analysis, including quantitative risk analysis, and for risk management action.

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Project management and risk assessment

    Wider influences are neglected - Organizational culture may be ignored. This may result in a system project that is too difficult to use, since the project managers have taken insufficient account of the environment to which workers work. Analysis is carried out incorrectly - Team is poorly skilled, or inappropriately resourced.

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Topic: A further exploration into information development: the evolution of Multiview2 Reference: Avison, D.E., Wood-Harper, A.T., Vidgen, R.T. & Wood, J.R.G. (1998). A further exploration into information development: the evolution of Multiview2. Information Technology and people. 11(2) pp. 124-139.

  1. Geometric Brownian Motion. The aim of this project is to gain an understanding ...

    yes 9 To check to see that user form 3 called 'SelectFigures' have option buttons already selected. User form 3 (SelectFigures) will consist of three sets of option buttons that the user will have to select from; an option button should already be selected once the user form opens.

  2. Methods and technology used in Computer Forensics

    As will be seen in Section B of this document, it is possible to locate and recover deleted data based on this premise. Recovering image files can be complex, but is an important part of computer forensics, particularly with the advent of broadband and a rise in the distribution of such contrabands as illicit pornographic material.

  1. Lifecycle Management Of Information Technology Project In Construction

    (incomplete, partial per?pective? of whole project), (Ebert 2001:62)and integration, degree to which di?tinct view? are explicitly perceived to inter-relate with one another. View? and integration in project management approache? One of fundamental mechani?m? that con?truction indu?try ha? developed for dealing with complexity i?

  2. IP network design

    Private IP address ranges: http://www.ietf.org/rfc/rfc1918.txt The IANA: http://www.iana.org/ RIPE NCC: http://www.ripe.net 2.2.2. Public and Private Addressing Schemes At first sight, using private address space for internal connectivity may seem ideal, as it removes the constraints on planning imposed by public address allocation.

  1. Implementation of Path Finding Techniques in Homeland Security Robots

    The main difference between IDA* and standard iterative deepening is that the cut-off used is the f-cost (g+h) rather than the depth. This section briefly examines two more resent memory bounded algorithms Recursive best-first search(RBFS) is a simple recursive algorithm uses the standard best first strategy using only linear space.

  2. start an ecommerce business

    As a high-performance company providing rapid development and efficient maintenance of innovative software and web applications, we display professional expertise and persistence in fulfilling its mission - refining today's technologies, creating new ones for future applications, and collaborating with customers to enhance the market with the best software solutions and

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work