Identifying risk

From apppm
(Difference between revisions)
Jump to: navigation, search
 
(22 intermediate revisions by one user not shown)
Line 1: Line 1:
 
The process of identifying risk in project management can be summarised as both identifying individual risk for the project and sources of overall risk to the project. Thereafter documenting their characteristics.  
 
The process of identifying risk in project management can be summarised as both identifying individual risk for the project and sources of overall risk to the project. Thereafter documenting their characteristics.  
When the risk has been identified, this allows the project team to tackle the challenges arising with these risks. Identifying risks is a process that is performed throughout the project’s lifetime.  
+
When a risk has been identified, this allows the project team to tackle the challenges arising with these risks. Identifying risks is a process that is performed throughout the project’s lifetime.  
 
When identifying risk, the step that you go through is create input, applying tools and techniques, and finally getting output.  
 
When identifying risk, the step that you go through is create input, applying tools and techniques, and finally getting output.  
Creating input is essential for management to identifying the risk. Examples of what the input consist of: project management plan, project documents (Assumption log, cost estimates, issue log, etc), enterprise environmental factors, and much more.
+
Creating input is essential for management to identifying the risks. Examples of what the input consist of: project management plan, project documents, and more.
After creating input, certain tools can be used to identifying the risks. An in-depth look into them will come later, but some of them are: Expert judgement, data gathering, data analysis.  
+
After creating input, certain tools can be used to identify the risks. An in-depth look into a selection of these tools can be found on this site, like: Expert judgement, data gathering, and data analysis.  
 
The last part is the output. The output is 3 folded; 1. Risk register. 2. Risk report. 3. Project documents updates.  
 
The last part is the output. The output is 3 folded; 1. Risk register. 2. Risk report. 3. Project documents updates.  
  
The 3 parts of identifying risks (input, tools & output) will be descried in greater details.  
+
The 3 parts of identifying risks (input, tools & output) will be descried in greater details. <ref name="PMIGuide"/><ref name="std"/><ref name="Prince2"/>
 +
 
  
 
= Big idea =  
 
= Big idea =  
 +
 +
Identifying risk is a never-ending job for a project and should be treated as such. By not only identifying the risks at the beginning of the project, but throughout the project’s life cycle. Some risk will inevitably be overseen when first preforming the risk identification and new risk will arise. Therefore, this process needs to be repeated. <ref name="PMIGuide"/><ref name="std"/>
 +
<ref name="Prince2"/>
 +
 +
When identifying risks, we seek to identify both individual projects risks and sources of overall project risk. When concluding this process, we should end up with some documentation of the risks. To be more specific, the output we achieve is a risk register and a risk report, as well as an opportunity to update existing document to reflect new knowledge found. <ref name="PMIGuide"/>
 +
 +
To produce this output there must first be some input to work with. This is input like a project management plan, project document, and so on. The input is the first thing that must be in place. When it is, it enables us to use some given tools and techniques to identify the risks. These tools are not limited to the ones described on this page, but the ones highlighted are some good tools to use. <ref name="PMIGuide"/>
 +
 +
All stakeholders should be encouraged to bring any risk they see to light. However, for the specific process of identifying risks the persons or groups that usually participate in this process are: <ref name="Prince2"/>
 +
<ref name="PMIGuide"/>
 +
 +
- Project manager
 +
 +
- Project team
 +
 +
- Risk specialist
 +
 +
- Customers and end users
 +
 +
- External subject experts
 +
 +
- Relevant stakeholders
 +
 +
- Internal risk management expert
  
  
 
= Input =
 
= Input =
  
When talking input for risk identification we are talking about all documents and knowledge developed beforehand, that enables us to identify risk. These are output from task/process carried out prior to the risk identification, which lay the groundwork to the actual risk identification.  
+
When talking input for risk identification we are talking about all documents and knowledge developed beforehand, that enables us to identify any risks. These are output from task/processes which were carried out prior to the risk identification. Hence, laying the groundwork to the actual risk identification. <ref name="PMIGuide"/>
  
 
Some examples of input needed are:  
 
Some examples of input needed are:  
  
 
• Project management plan  
 
• Project management plan  
 +
 
• Project Documents  
 
• Project Documents  
 +
 
• Agreements  
 
• Agreements  
 +
 
• Procurement documentation  
 
• Procurement documentation  
 +
 
• Enterprise environmental factors  
 
• Enterprise environmental factors  
 +
 
• Organisational process assets
 
• Organisational process assets
  
  
== Project management plan ==
+
=== Project management plan ===
 
The project management plan include knowledge from underlining components. These components include:  
 
The project management plan include knowledge from underlining components. These components include:  
  
 
• Requirements management plan
 
• Requirements management plan
 +
 
• Schedule management plan  
 
• Schedule management plan  
 +
 
• Cost management plan  
 
• Cost management plan  
 +
 
• Quality Management plan  
 
• Quality Management plan  
 +
 
• Resource management plan  
 
• Resource management plan  
 +
 
• Risk management plan
 
• Risk management plan
 +
 
• Scope baseline
 
• Scope baseline
 +
 
• Schedule baseline  
 
• Schedule baseline  
 +
 
• Cost baseline
 
• Cost baseline
  
Other relevant Management plans, Baselines, or relevant documents can be included in the project management plan.  
+
Other relevant Management plans, Baselines, or relevant documents can be included in the project management plan. <ref name="PMIGuide"/>
 +
 
  
== Project Documents ==
+
=== Project Documents ===
  
Some project documents can be included as input in the risk identification. Examples of these are:  
+
Some project documents can be included as input in the risk identification. Examples of these are: <ref name="PMIGuide"/>
  
 
• Assumption log
 
• Assumption log
 +
 
• Cost estimates
 
• Cost estimates
 +
 
• Duration estimates  
 
• Duration estimates  
 +
 
• Issue log
 
• Issue log
 +
 
• Lessons learned register  
 
• Lessons learned register  
 +
 
• Requirements documentation.  
 
• Requirements documentation.  
 +
 
• Resource requirements  
 
• Resource requirements  
 +
 
• Stakeholder register
 
• Stakeholder register
  
== Agreements ==
 
There might be some agreement/contract with some external partner/stakeholder. The information in such an agreement may present both risk and opportunities for the project. Information in the agreement may include, but are not limited to, milestones dates, acceptance criteria, awards and penalties.
 
  
== Procurement documentation ==
+
=== Agreements ===
 +
There might be some agreement/contract with some external partner/stakeholders. The information in such an agreement may present both risks and opportunities for the project. Information in the agreement may include, but are not limited to, milestones dates, acceptance criteria, awards and penalties. <ref name="PMIGuide"/>
  
Procuring goods and services from external sources may increase or decrease the risks for the project, as well as introduce new risks. The most up to date procurement documentation should be reviewed for potential risks.
 
  
== Enterprise environmental factors ==
+
=== Procurement documentation ===
  
 +
Procuring goods and services from external sources may increase or decrease the risks for the project, as well as introduce new risks. The most up to date procurement documentation should therefore be reviewed for potential risks. <ref name="PMIGuide"/>
  
== Organisational process assets ==
 
  
 
= Tools =  
 
= Tools =  
  
From the input generated and gathered, the management team have a variety of tools in the toolbox, that will help them identify the risks.   
+
From the generated and gathered input, the management team have a variety of tools in the toolbox, that will help them identify the risks.  <ref name="PMIGuide"/>
  
 
Examples of such tools are:  
 
Examples of such tools are:  
 
• Expert judgment  
 
• Expert judgment  
• Data gathering  
+
 
o Brainstorming  
+
• Data gathering (Brainstorming, Checklists, Interviews)
o Checklists  
+
 
o Interviews
+
Root cause analysis  
• Data analysis
+
 
o Root cause analysis  
+
Assumption and constraint analysis  
o Assumption and constraint analysis  
+
 
o SWOT analysis  
+
SWOT analysis  
o Document analysis
+
 
 +
•      Risk breakdown structure
 +
 
 +
Document analysis
 +
 
 
• Interpersonal and team skills
 
• Interpersonal and team skills
 +
 
• Prompt lists  
 
• Prompt lists  
 +
 
• Meetings  
 
• Meetings  
  
== Expert judgement ==
 
  
The project manager should identify individuals or groups that could act as expert on projects risk and the source of these risks. The expert should both consider specific risk and overall project risks.  
+
=== Expert judgement ===
 +
 
 +
The project manager should identify individuals or groups that could act as experts when identifying projects risks and the source of these risks. The expert should both consider specific risk and overall project risks.  
 +
 
 +
The experts can be people with experience in a specific area relevant to the project. Or they could be people with some form of specialized knowledge that relate to the project. <ref name="PMIGuide"/>
  
The experts can be people with experience in a specific area relevant to the project. Or they could be people with some form of specialized knowledge that relate to the project.
 
  
== Data gathering ==  
+
=== Data gathering ===  
  
 
There are multiple techniques to gather data related to risk. Here there are highlighted some, which are widely used
 
There are multiple techniques to gather data related to risk. Here there are highlighted some, which are widely used
  
=== Brainstorming ===
+
==== Brainstorming ====
  
In a brainstorm the goal is generate an overview of potential risk for the project. The brainstorm is carried out by the project team. However, have experts been gathered they should also participate in the brainstorm.  
+
In a brainstorm the goal is to generate an overview of potential risk for the project. The brainstorm is carried out by the project team. However, have experts been gathered they should also participate in the brainstorm.  
  
In a brainstorm there is a risk that the ideas generated are not described in full. This is something that the facilitator should have in mind, so that all risk is fully described and usable.  
+
In a brainstorm there is a risk that the ideas generated are not described in full. This is something that the facilitator should have in mind, so that all risk is fully described and usable. <ref name="PMIGuide"/>
  
=== Checklist ===
+
==== Checklist ====
 +
 
 +
Information and knowledge gather from similar projects, experience and other sources can be compiled into a checklist of risk. The checklist is a list of potential risk which have been seen before. This list can then be updated throughout the project. <ref name="std"/>
  
Information and knowledge gather from similar projects, experience and other sources can be compiled into a checklist of risk. The checklist is a list of potential risk which have been seen before. This list can then be updated throughout the project.
 
 
The checklist is a good way for a company to transfer knowledge and learnings from project to project.  
 
The checklist is a good way for a company to transfer knowledge and learnings from project to project.  
However, this should not be seen as a reason to not carrier out a risk identification. Other risk should also be explored.  
+
However, this should not be seen as a reason not to carrier out a risk identification throughout the project life cycle. The checklist may not identify all risks, and other risks must also be explored. <ref name="PMIGuide"/>
  
=== Interviews ===
+
==== Interviews ====
  
 
Interview is another method of identifying project risks. The interviews can be carried out with any person or group that have relevant for the project (project participants, stakeholders, experts, ect.).  
 
Interview is another method of identifying project risks. The interviews can be carried out with any person or group that have relevant for the project (project participants, stakeholders, experts, ect.).  
The danger with interviews is that the participant withhold information out fear, shame, or what have you. Therefore, It is essential for the interviews that they are carried out in trusting and open environment to insure the right information is extracted.  
+
The danger with interviews is that the participant withholds information out fear, shame, or what have you. Therefore, it is essential for the interviews that they are carried out in a trusting and open environment to ensure the right information is extracted. <ref name="PMIGuide"/>
  
== Data analysis ==
 
  
 
=== Root cause analysis ===
 
=== Root cause analysis ===
 +
 +
The root cause analysis is a method used to identify the “why” of a risk, i.e. the underlying reason for the risk. When solving the root cause of a risk, all underlining risk will also be solved.
 +
By stating a problem/benefit statement a root cause analysis can be used to detect threats or opportunities. <ref name="PMIGuide"/>
 +
  
 
=== Assumption and constraint analysis ===
 
=== Assumption and constraint analysis ===
 +
 +
This is an analysis of the projects and project management plans underlining assumption and constraint.
 +
The assumptions, which the project has made, represent some unidentified risks. Analysing these assumptions will bring risk to light and assess their threat.
 +
The constraint that the project works under could potentially bring some opportunities to light. Analysing the constraint to see if any could be removed, or relaxed. <ref name="PMIGuide"/>
 +
  
 
=== SWOT analysis ===
 
=== SWOT analysis ===
  
===Document analysis ===
+
SWOT is an analysis of the project and organizations strengths, weaknesses, opportunities and threats.  It can be used to look at internally created risks for the project. It starts with an analysis of the company’s weaknesses and strengths. From this any threats or opportunities should be analyzed, as well as how the company’s weaknesses and strengths affects the given threats and opportunities.  <ref name="PMIGuide"/> <ref name="std"/>
 +
 
 +
 
 +
=== Risk breakdown structure ===  
 +
 
 +
A risk breakdown structure is a hierarchical representation of risks. Meaning that it starts it that highest level and then moves down into more detailed levels. The RBS is not unlike the Work Breakdown Structure, and it will help the manager create an overview of the risk categories.  <ref name="Prince2"/><ref name="RBS"/>
  
  
 
= Output =
 
= Output =
 +
 +
The output from identifying risk is three folded: the risk register, the risk report, and updates of project documents.
 +
 +
 +
=== Risk register ===
 +
 +
The risk register is, as the name may suggest, where all individual risks are registered. This includes a list of all risk found in the identification process. All risks are registered with unique names and/or numbers, as well as a description of the risk so that the information doesn’t get lost. <ref name="Prince2"/>
 +
 +
If there have been identified an owner of the risk, this person should also be registered. The same goes for potential risk responses. Have any responses been identified during the process of identifying the risk they should also be registered. <ref name="std"/>
 +
 +
 +
Any additional information that is relevant for the risk, and the handling of set risk, should also be registered. This could include information such as risk triggers, deadline for action, current risk status, and so on.
 +
 +
As risk identification and risk management is an ongoing process throughout the project, the register should be kept up to date. Any results from other risk processes should also be recorded in the register. <ref name="PMIGuide"/>
 +
 +
 +
=== Risk report ===
 +
 +
The risk report includes the sources of overall project risk, as well as a summary of individual project risks. <ref name="PMIGuide"/>
 +
 +
 +
=== Project documents updates ===
 +
 +
It is important that in the end of the process of identifying risk, all relevant existing documents are updated. This could include documents such as: Assumption log, Issue log, and lessons learned register. <ref name="PMIGuide"/>
 +
  
 
= Limitations =
 
= Limitations =
 +
 +
All risk to a project will not be identified at ones. Even if all risk could be identified, changes are some will be missed/undetected. This only enhances the importance of conducting a risk identification process throughout the project’s life cycle.  <ref name="std"/>
 +
 +
One should also be aware of expert bias. It is quite common and can be a threat to the quality of the risk identification, as well as the response. <ref name="PMIGuide"/>
 +
  
 
= Annotated bibliography =
 
= Annotated bibliography =
Key references:
+
 
• Project Management: A guide to the Project Management Body of Knowledge (PMBOK guide), 6th Edition (2017)
+
• Project Management: A guide to the Project Management Body of Knowledge (PMBOK guide), 6th Edition (2017).
 +
 
 +
For risk identification, chapter 11 is a very good walkthrough of how to conduct a risk identification process.
 +
 
 +
 
 +
• Standard for Risk Management in Portfolios, Programs, and Projects
 +
 
 +
A very good reference for all things risks in projects, portfolios, and programs.
 +
 
 +
 
 +
• Managing Successful Projects with PRINCE2 2017 Edition
 +
 
 +
Chapter 10 looks into risk, and PRINCE2 standards for handling risk, as well as what risk are.
 +
 
 +
 
 +
= References =
 +
<references>
 +
<ref name="PMIGuide">Guide to the Project Management Body of Knowledge (PMBOK® Guide) (6th Edition), Project Management Institute (PMI), Inc.(2017)</ref>
 +
<ref name="Prince2">Managing Successful Projects with PRINCE2 2017 Edition, AXELOS (2017)</ref>
 +
<ref name="std">Standard for Risk Management in Portfolios, Programs, and Projects, Project Management Institute, Inc. (PMI)
 +
(2019)</ref>
 +
<ref name="RBS">Understanding the Risk Breakdown Structure (RBS), Internet article, 12/10/2018,( https://project-management.com/understanding-the-risk-breakdown-structure-rbs/),</ref>

Latest revision as of 23:01, 28 February 2021

The process of identifying risk in project management can be summarised as both identifying individual risk for the project and sources of overall risk to the project. Thereafter documenting their characteristics. When a risk has been identified, this allows the project team to tackle the challenges arising with these risks. Identifying risks is a process that is performed throughout the project’s lifetime. When identifying risk, the step that you go through is create input, applying tools and techniques, and finally getting output. Creating input is essential for management to identifying the risks. Examples of what the input consist of: project management plan, project documents, and more. After creating input, certain tools can be used to identify the risks. An in-depth look into a selection of these tools can be found on this site, like: Expert judgement, data gathering, and data analysis. The last part is the output. The output is 3 folded; 1. Risk register. 2. Risk report. 3. Project documents updates.

The 3 parts of identifying risks (input, tools & output) will be descried in greater details. [1][2][3]


Contents

[edit] Big idea

Identifying risk is a never-ending job for a project and should be treated as such. By not only identifying the risks at the beginning of the project, but throughout the project’s life cycle. Some risk will inevitably be overseen when first preforming the risk identification and new risk will arise. Therefore, this process needs to be repeated. [1][2] [3]

When identifying risks, we seek to identify both individual projects risks and sources of overall project risk. When concluding this process, we should end up with some documentation of the risks. To be more specific, the output we achieve is a risk register and a risk report, as well as an opportunity to update existing document to reflect new knowledge found. [1]

To produce this output there must first be some input to work with. This is input like a project management plan, project document, and so on. The input is the first thing that must be in place. When it is, it enables us to use some given tools and techniques to identify the risks. These tools are not limited to the ones described on this page, but the ones highlighted are some good tools to use. [1]

All stakeholders should be encouraged to bring any risk they see to light. However, for the specific process of identifying risks the persons or groups that usually participate in this process are: [3] [1]

- Project manager

- Project team

- Risk specialist

- Customers and end users

- External subject experts

- Relevant stakeholders

- Internal risk management expert


[edit] Input

When talking input for risk identification we are talking about all documents and knowledge developed beforehand, that enables us to identify any risks. These are output from task/processes which were carried out prior to the risk identification. Hence, laying the groundwork to the actual risk identification. [1]

Some examples of input needed are:

• Project management plan

• Project Documents

• Agreements

• Procurement documentation

• Enterprise environmental factors

• Organisational process assets


[edit] Project management plan

The project management plan include knowledge from underlining components. These components include:

• Requirements management plan

• Schedule management plan

• Cost management plan

• Quality Management plan

• Resource management plan

• Risk management plan

• Scope baseline

• Schedule baseline

• Cost baseline

Other relevant Management plans, Baselines, or relevant documents can be included in the project management plan. [1]


[edit] Project Documents

Some project documents can be included as input in the risk identification. Examples of these are: [1]

• Assumption log

• Cost estimates

• Duration estimates

• Issue log

• Lessons learned register

• Requirements documentation.

• Resource requirements

• Stakeholder register


[edit] Agreements

There might be some agreement/contract with some external partner/stakeholders. The information in such an agreement may present both risks and opportunities for the project. Information in the agreement may include, but are not limited to, milestones dates, acceptance criteria, awards and penalties. [1]


[edit] Procurement documentation

Procuring goods and services from external sources may increase or decrease the risks for the project, as well as introduce new risks. The most up to date procurement documentation should therefore be reviewed for potential risks. [1]


[edit] Tools

From the generated and gathered input, the management team have a variety of tools in the toolbox, that will help them identify the risks. [1]

Examples of such tools are: • Expert judgment

• Data gathering (Brainstorming, Checklists, Interviews)

• Root cause analysis

• Assumption and constraint analysis

• SWOT analysis

• Risk breakdown structure

• Document analysis

• Interpersonal and team skills

• Prompt lists

• Meetings


[edit] Expert judgement

The project manager should identify individuals or groups that could act as experts when identifying projects risks and the source of these risks. The expert should both consider specific risk and overall project risks.

The experts can be people with experience in a specific area relevant to the project. Or they could be people with some form of specialized knowledge that relate to the project. [1]


[edit] Data gathering

There are multiple techniques to gather data related to risk. Here there are highlighted some, which are widely used

[edit] Brainstorming

In a brainstorm the goal is to generate an overview of potential risk for the project. The brainstorm is carried out by the project team. However, have experts been gathered they should also participate in the brainstorm.

In a brainstorm there is a risk that the ideas generated are not described in full. This is something that the facilitator should have in mind, so that all risk is fully described and usable. [1]

[edit] Checklist

Information and knowledge gather from similar projects, experience and other sources can be compiled into a checklist of risk. The checklist is a list of potential risk which have been seen before. This list can then be updated throughout the project. [2]

The checklist is a good way for a company to transfer knowledge and learnings from project to project. However, this should not be seen as a reason not to carrier out a risk identification throughout the project life cycle. The checklist may not identify all risks, and other risks must also be explored. [1]

[edit] Interviews

Interview is another method of identifying project risks. The interviews can be carried out with any person or group that have relevant for the project (project participants, stakeholders, experts, ect.). The danger with interviews is that the participant withholds information out fear, shame, or what have you. Therefore, it is essential for the interviews that they are carried out in a trusting and open environment to ensure the right information is extracted. [1]


[edit] Root cause analysis

The root cause analysis is a method used to identify the “why” of a risk, i.e. the underlying reason for the risk. When solving the root cause of a risk, all underlining risk will also be solved. By stating a problem/benefit statement a root cause analysis can be used to detect threats or opportunities. [1]


[edit] Assumption and constraint analysis

This is an analysis of the projects and project management plans underlining assumption and constraint. The assumptions, which the project has made, represent some unidentified risks. Analysing these assumptions will bring risk to light and assess their threat. The constraint that the project works under could potentially bring some opportunities to light. Analysing the constraint to see if any could be removed, or relaxed. [1]


[edit] SWOT analysis

SWOT is an analysis of the project and organizations strengths, weaknesses, opportunities and threats. It can be used to look at internally created risks for the project. It starts with an analysis of the company’s weaknesses and strengths. From this any threats or opportunities should be analyzed, as well as how the company’s weaknesses and strengths affects the given threats and opportunities. [1] [2]


[edit] Risk breakdown structure

A risk breakdown structure is a hierarchical representation of risks. Meaning that it starts it that highest level and then moves down into more detailed levels. The RBS is not unlike the Work Breakdown Structure, and it will help the manager create an overview of the risk categories. [3][4]


[edit] Output

The output from identifying risk is three folded: the risk register, the risk report, and updates of project documents.


[edit] Risk register

The risk register is, as the name may suggest, where all individual risks are registered. This includes a list of all risk found in the identification process. All risks are registered with unique names and/or numbers, as well as a description of the risk so that the information doesn’t get lost. [3]

If there have been identified an owner of the risk, this person should also be registered. The same goes for potential risk responses. Have any responses been identified during the process of identifying the risk they should also be registered. [2]


Any additional information that is relevant for the risk, and the handling of set risk, should also be registered. This could include information such as risk triggers, deadline for action, current risk status, and so on.

As risk identification and risk management is an ongoing process throughout the project, the register should be kept up to date. Any results from other risk processes should also be recorded in the register. [1]


[edit] Risk report

The risk report includes the sources of overall project risk, as well as a summary of individual project risks. [1]


[edit] Project documents updates

It is important that in the end of the process of identifying risk, all relevant existing documents are updated. This could include documents such as: Assumption log, Issue log, and lessons learned register. [1]


[edit] Limitations

All risk to a project will not be identified at ones. Even if all risk could be identified, changes are some will be missed/undetected. This only enhances the importance of conducting a risk identification process throughout the project’s life cycle. [2]

One should also be aware of expert bias. It is quite common and can be a threat to the quality of the risk identification, as well as the response. [1]


[edit] Annotated bibliography

• Project Management: A guide to the Project Management Body of Knowledge (PMBOK guide), 6th Edition (2017).

For risk identification, chapter 11 is a very good walkthrough of how to conduct a risk identification process.


• Standard for Risk Management in Portfolios, Programs, and Projects

A very good reference for all things risks in projects, portfolios, and programs.


• Managing Successful Projects with PRINCE2 2017 Edition

Chapter 10 looks into risk, and PRINCE2 standards for handling risk, as well as what risk are.


[edit] References

  1. 1.00 1.01 1.02 1.03 1.04 1.05 1.06 1.07 1.08 1.09 1.10 1.11 1.12 1.13 1.14 1.15 1.16 1.17 1.18 1.19 1.20 1.21 Guide to the Project Management Body of Knowledge (PMBOK® Guide) (6th Edition), Project Management Institute (PMI), Inc.(2017)
  2. 2.0 2.1 2.2 2.3 2.4 2.5 Standard for Risk Management in Portfolios, Programs, and Projects, Project Management Institute, Inc. (PMI) (2019)
  3. 3.0 3.1 3.2 3.3 3.4 Managing Successful Projects with PRINCE2 2017 Edition, AXELOS (2017)
  4. Understanding the Risk Breakdown Structure (RBS), Internet article, 12/10/2018,( https://project-management.com/understanding-the-risk-breakdown-structure-rbs/),
Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox