• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Qualitative Risk Analysis

Extracts from this document...


Qualitative Risk Analysis

Qualitative risk analysis is the process of performing a qualitative analysis of identified risks. This process is intended to prioritize risks according to their potential effect on business objectives.  Qualitative risk analysis is one way of determining the importance of addressing specific risks and guides risk response measures. The time-criticality of risk-related actions may magnify the importance of a risk. An evaluation of the quality of the available information also helps modify the assessment of the risk. Qualitative risk Analysis requires that the probability and impact of the risks be estimated using qualitative analysis methods and tools. Using these tools helps correct biases that are often present in a business plan.  Qualitative risk analysis should be revisited during the business’s life cycle to stay current with changes in business risks.  This process can lead to further analysis in quantitative risk analysis or directly to risk response planning .

  • Inputs to Qualitative Risk Analysis
  • Risk management plan.
  • Identified risks.Risks discovered during the risk identification process are evaluated along with their potential impacts on the business.
  • Business status. The uncertainty of a risk often depends on the business’s progress through its life cycle. Early in the business many risks have not surfaced, the design for the business is immature and changes can occur, making it likely that more risks will be discovered.
  • Business type. Businesses of a common or recurrent type tend to have less risk. Businesses using state-of-the-art  or first-of-a-kind technology  or highly complex businesses tend to have more risk.
  • Data precision. Precision describes the extent to which a risk is known and understood. It measures the extent of data available as well as the reliability of data. The source of the data that was used to identify the risk must be evaluated.
  • Scales of probability and impact.  These scales are to be used in assessing the two key dimensions of risk.
  • Tools and Techniques for qualitative Risk Analysis
...read more.


Risk probability is the likelihood that a risk will occur.Risk impact is the effect on business objectives if the risk occurs.

These two dimensions of risk are applied to specific risks, not to the overall business.  Analysis of risks using probability and impact helps identify those risks that should be managed aggressively.

  • Probability / impact risk rating matrix. A matrix may be constructed that assigns risk ratings (low, moderate and high) to risks or conditions based on combining probability and impact scales. Risks with high probability and high impact are likely to require further analysis, including quantification, and aggressive risk management.  The risk rating is accomplished using a matrix and risk scales for each risk or condition.
A risk’s probability scale naturally falls between 0.0 (no probability) and 1.0 (certainty). Assessing risk probability may be difficult because expert judgment is used, often without benefit of historical data. A general scale (e.g. .1/.3/.5/.7/.9), representing probabilities from very unlikely to almost certain, could be used.

The risk’s impact scale reflects the severity of its impact on the business objective.

...read more.


  • Outputs from Qualitative Risk Analysis
  • Overall risk ranking for the business.Riskranking may indicate the overall risk position of a business relative to other businesses by comparing risk scores.  It can be used to assign personnel or other resources to businesses with different risk rankings, to make a benefit-cost analysis decision about the business, or to support a recommendation for business cancellation.
  • List of prioritized risks. Risks and conditions may be prioritized by their group category (high, moderate, and low) at a detailed level, perhaps at the lowest WBS level. Risks may also be grouped by those that require an immediate response and those that can be handled at a later date. Cost, schedule, functionality and quality risks may be assessed separately with different ratings. Significant risks should have a description of the basis for the assessed probability and impact.
  • List of risks for additional analysis and management. Risks classified as high or moderate would be prime candidates for more analysis, including quantitative risk analysis, and for risk management action.

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Reference access is limited therefore factual validity is difficult to determine. However through the use of other resources similarities were distinguished regarding the descriptions provided for methodologies included. Usefulness: This paper provides a clear overview of the Waterfall, Prototyping, Incremental, Spiral and Rapid Application Development (RAD)

  2. Geometric Brownian Motion. The aim of this project is to gain an understanding ...

    Yes 5.3 Validation test table Test Number Purpose of test Expected outcome Successful? 19 Characters or figures should not be entered into textboxes. The user should not be able to enter figures or characters into any textbox, the user form should simply not allow it.

  1. Methods and technology used in Computer Forensics

    Take this random sequence of 16-digits as a representation of a typical credit card number: 6983 3476 9603 2184. All we have to go on is this number; no other knowledge of where the relevant data might be or what format it is in.

  2. Lifecycle Management Of Information Technology Project In Construction

    are developed and explored, new i??ue? are identified and re?olved, and interaction? and interface? are hammered out. Once all concern? are ?ati?fied, prototype i? u?ed to organize production proce??. Every participant view? their role a? carrying out their ta?k? by drawing information from project model, placing their re?ult?

  1. IP network design

    A network of many thousands of hosts will have the same demand for NAT resources regardless of whether the external connection is 2Mbps or 100Mbps. NAT is often referred to as a security tool, which it is not. Elements of NAT do certainly contribute towards some level of security, by essentially rendering internal hosts unreachable from external hosts by default.

  2. Implementation of Path Finding Techniques in Homeland Security Robots

    These systems are well suited to problems such as path planning for unmanned robotic vehicles. 2.7 Summary A brief overview of the various path planning techniques has been presented in this chapter. Path planning using searching algorithms was discussed first followed by roadmap techniques.

  1. start an ecommerce business

    As a high-performance company providing rapid development and efficient maintenance of innovative software and web applications, we display professional expertise and persistence in fulfilling its mission - refining today's technologies, creating new ones for future applications, and collaborating with customers to enhance the market with the best software solutions and


    Develop the program. The program must be based on need. Training for training's sake and rewards and recognition for the wrong things lead to nothing more than confusion. Key areas to review include the following; * Employee focus: Includes employee need,level of commitment, training requirements, rewards and recognition, skills, and the employee as a customer.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work