Wednesday, February 16, 2011

Risk Assessment


1.0 Executive Summary

The report herein discusses the risks of RFID Implementation for the F&N warehouse. The risk analysis identifies the project risks, assesses their probability of occurrence, and evaluates their potential impacts to the project. Various courses of actions are pre-planned to mitigate the risks and assist the management decision making process. The activities with higher risks are listed below and shall be discussed in details in the following sections:

· Hardware Specification & Supplier Selection
· Acceptance Testing
· Selection of ERP Consultant and Middleware
· User Communication and Training
· Process Mapping

In particular, the cost and delivery impact on the risks associated with the acceptance testing and hardware specification & supplier selection will be analyzed in details here.

2.0 Risk Analysis


ActivityRisk DescriptionProbability
(1-5)
Impact
(1-5)
Risk CategoryRank
(1-10)
1.0 Planning & Rationalizing
1.1 Project ScopingNot well-aligned, leading to failure at execution23LP, HI6
1.2 BudgetingOver budgeting34HP, HI6
1.3 SchedulingImplementation delays33HP, HI7
1.4 Risk AnalysisOverlook Potential Risk33HP, HI6
1.5 Steering CommitteeIncapable Leadership32LP, LI6
2.0 Process Reengineering
2.1 Process MappingOverlook important process / procedure55HP, HI5
2.2 Process SimulationArguable simulation results, results does not reflect actual situations34HP, HI6
3.0 Software Integration
3.1 Selection of ERP Consultant and MiddlewarePoor intergration55HP, HI3
3.2 Redesign of ERP software CodeBugs in the system35HP, HI6
3.3 Data Migration & DocumentationMigration failure and data corruption44HP, HI6
3.4 User Communication & TrainingInadequate Training45HP, HI4
4.0 Hardware Configuration
4.1 Hardware Specification & Supplier SelectionCompatibility of various hardware with the existing process and software55HP, HI1
4.2 Warehouse Layout ModificationImproper modification of warehouse layout23LP,HI6
4.3 Hardware Installation & DocumentationIncorrect installation of the hardware34HP, HI6
4.4 User Communication & TrainingInadequate Training at ground level45HP, HI4
5.0 Pilot Testing
5.1 Acceptance TestingDesign of testing might mislead the Go or No Go decision45HP, HI2
5.2 Defect Classification and CorrectionLong lead time to troubleshoot34HP, HI6
6.0 Full Scale Deployment
6.1 Performance Monitoring (KPI)Improper KPI23LP, HI9
6.2 System Maintenance PlanConstant hardware.software failure34HP, HI9
6.3 Continuous Improvement PlanProcess flows are not review properly.23LP, HI10






3.0 Top 5 Issues


No
Activity
Risk Description
Root Cause
Mitigation Strategy
2.1
Process Mapping
Overlook important process / procedure
Many hidden complex process involved
Obtain input from senior/experience members/consultant.
3.1
Selection of ERP Consultant and Middleware
Poor intergration
Loose selection criteria for RFID middleware and consultancy service
Set a stringent vendor selection criteria and only use the vendors/consultants with experience in FCG industry.
3.4
User Communication & Training
Inadequate Training at ground level
Poorly defined training requirements to address individual/functional needs.

  1. Adopt customized training.
  2. Set up a hotline/ suggestion box
4.1
Hardware Specification & Supplier Selection
Compatibility of various hardware with the existing process and software
Missing critical hardware features to run the RFID at warehouse.
Consult RFID expert, Establish a comprehensive list of specifications, and source from vendors with proven experience.
4.4
User Communication & Training
Inadequate Training at ground level
Poorly defined training requirements to address individual/functional needs.


  1. Adopt customized training.
  2. Set up a hotline/ suggestion box
5.1
Acceptance Testing
Design of testing might mislead the Go or No Go decision
Test checklist is incomprehensive and incomplete
Create a detail test plan, and get expert or consultant to review the testing process and procedure.






4.0 Impact on costs and schedule for top two risks

i.) Risks associated with Hardware specification & Supplier Selection
To ensure the proper selection of the hardware and its specification, a 3rd party RFID expert is recommended on the contract basis to assist the selection process. It is estimated that the selection should be finalized in 30 days with the help of the RFID expert. A number of well-known RFID consultants like Zebra should be able to provide such ad-hoc service locally. Hence, an additional $5000 should be sufficient. Besides, 10 more days are added to this activity to ensure the correct party is chosen here. The overall schedule will not be affected as we have total 20 days float in this project.

ii.) Risks associated with Acceptance Testing
To ensure the acceptance test is complete, an experienced professional engineer is recommended to help develop the test checklist. It is estimated that the test checklist can be established within 10 days. Institute of Engineers, Singapore usually has a technical committee to provide such consultancy service for Singapore-based companies at a competitive price. Hence, an additional $6000 is deemed sufficient to tap the consultancy service of a professional engineer. The overall schedule will not be affected as we have total 20 days float in this project. The project schedule and budget should be monitored more closely after considering such changes.
5.0 Conclusion

RFID implementation requires thorough evaluation on every aspect, including risk analysis and cost budgeting. The potential risks have been analyzed and each mitigation plan has been proposed in this tutorial. The impacts of the two potential risks have been discussed and the action plans are developed to mitigate these risks.

2 comments:

  1. Great post. It was a good read and lots to know about risk assessment awareness. Having the Information Security Services in your enterprise or organization to identify and classify the security issues in IT systems. IARM is a single platform which can handle all your Cyber Security services and Conducting information security audits as well as vulnerability assessments that helps your businesses to analyze the status of the organization's security.
    Top Cyber Security Company In India
    Penetration Testing Company In Chennai
    Soc Services In India
    Cyber Attack Recovery Services In India
    Vapt Service Provider India

    ReplyDelete
  2. I use only high quality materials - you can see them at: General Contractors in Canada

    ReplyDelete