Stakeholder Risk Management
In this article we'll address the people swirling around your project: stakeholders. You'll find some tips and other resources for optimising stakeholder involvement in your project.
- Who cares?
- What do they care about?
- What am I going to do about it?
Those are the three simple questions a project team can ask to understand their stakeholders and develop a strategy for keeping them happy.
As we developed a workshop on stakeholder management built on those three questions one of our project management experts, put all the pieces together when he said, "That's just risk management for people."
We think he's right. Review this classic risk management process. Can you see the parallel?
- Identify risks.
- Analyse and quantify the risk.
- Develop a risk response.
So on your next (or current) project consider treating your stakeholders as opportunities or threats.
Step One: Identify Risks (Who cares?)
Just as with risk management, we can only manage stakeholders that we are aware of, so be creative and energetic in identifying stakeholders. Cast your net wide and consider all those stakeholders that won't make a peep unless you step on their toes. Regulators, end-users, your customer's customers, and internal support staff such as accounting or procurement. Too many project managers don't include these secondary stakeholders in their normal communication plans yet get indignant when they obstruct the project. In risk management we identify threats and opportunities. Stakeholders can be project adversaries just as easily as advocates.
While you are trying to uncover the hidden stakeholders, don't forget about the obvious ones: your team, your sponsor, and the people who will be approving the funding.
Tip: Make sure your stakeholders have a name and email id. Stakeholders are people, not organisations. "Facilities" isn't going to sign off on your change request, but Cindy, who runs the department, might.
Step Two: Analyse and Quantify the Risk (What do they care about?)
Risk management calls for prioritising the risks according to probability and impact. We can prioritise stakeholders similarly - by authority and interest. Interest means "how much do they care?" and authority equates to their ability to affect the project.
Now analyse the high priority stakeholders. You won't be able to quantify your stakeholders as much as your project risks, but you can organise some key information: What do they care about? How will the project affect them? How does this project fit into their priorities? What do you need from them for the project to run smoothly?
Step Three: Develop a Risk Response (What are you going to do about it?)
What we do to leverage our supporters and minimise the effect of our opponents will depend upon the answers to the questions above. The more we know about our stakeholders, the better we can plan to work with them. One thing is certain: ignoring them will sap their support and inflame their opposition, so plan for communication.
Rapid changes in information technology continue to bring us new ways to flood our stakeholders with data, but that doesn't necessarily make us effective communicators. Who needs information? What information? How often? In what format? These questions form the basis of your communication plan. As you develop your communication plan remember these two tips:
- Positive personal relationships are the foundation of effective communication. Personal relationships magnify the value of the technology we use to deliver information.
- Use two or more mediums of communication for every stakeholder. For example, meetings should be accompanied by documentation.
The Secret to Success
What's the secret to risk management? Do it. Proactive, systematic risk management means finding the problems before they find you. Risk management doesn't have to be complex, but it does have to be disciplined. The same holds true for our stakeholders. Understanding who they are and what they want often isn't that difficult. The key is to be proactive, to reach out, and influence them before they influence you.
Stakeholder Risk Management的更多相关文章
- 10 Golden Rules of Project Risk Management
The benefits of risk management in projects are huge. You can gain a lot of money if you deal with u ...
- 【EMV L2】终端风险管理(Terminal Risk Management)
终端风险管理使大额交易联机授权,并确保芯片交易能够周期性地进行联机以防止在脱机环境中也许无法察觉的风险. 虽然发卡行被强制要求在应用交互特征(AIP)中将终端风险管理位设置成1以触发终端风险管理,但终 ...
- Security and Risk Management(5)
Ethics: ISC Code of Ethics You agree to this before the exam, and the code of ethics is very testabl ...
- The Simplified Project Management Process
One of the challenges of explaining project management to people who are unfamiliar with the approac ...
- Introduction to Project Management(II)
Introduction The purpose of this paper is to gain an understanding of project management and to give ...
- A Framework for Programme Management
In business today organisations manage multiple projects concurrently with shared or overlapping res ...
- Software Engineering: 2. Project management
resources:"Software Engineering" Ian Sommerville For most projects, important goals are: D ...
- Threat Risk Modeling Learning
相关学习资料 http://msdn.microsoft.com/en-us/library/aa302419(d=printer).aspx http://msdn.microsoft.com/li ...
- Magic Quadrant for Security Information and Event Management
https://www.gartner.com/doc/reprints?id=1-4LC8PAW&ct=171130&st=sb Summary Security and risk ...
随机推荐
- BZOJ 2282 & 树的直径
SDOI2011的Dayx第2题 题意: 在树中找到一条权值和不超过S的链(为什么是链呢,因为题目中提到“使得路径的两端都是城市”,如果不是链那不就不止两端了吗——怎么这么机智的感觉...),使得不在 ...
- Codeforces Round #208 (Div. 2) A.Dima and Continuous Line
#include <iostream> #include <algorithm> #include <vector> using namespace std; in ...
- Codeforces Round #208 (Div. 2) B Dima and Text Messages
#include <iostream> #include <algorithm> #include <string> using namespace std; in ...
- Servlet的生命周期,并说出Servlet和CGI的区别,Servlet与JSP的区别
一.Servlet 生命周期 1.加载 2.实例化 3.初始化 4.处理请求 5.销毁 二.Servlet与cgi的区别: Servlet处于服务器进程中,它通过多线程方式运行其service方法,一 ...
- Asp反向代理程序,调用远程站点全站数据,一款脚本级反向代理程序.
前些天临时写的一脚本级反向代理程序,用法很简单,设置好目标站地址,然后放到你网站根目录:index.asp,再将404页面自定义为:index.asp,即可. 由于暂时没有 url 替换需要,所以没有 ...
- hudson安装
Hudson 只是一个持续集成服务器(持续集成工具),要想搭建一套完整的持续集成管理平台, SVN.Maven.Sonar 等工具按需求整合则可. 1. 安装 JDK 并配置环境变量(略) J ...
- C++ 中的模板类声明头文件和实现文件分离后,如何能实现正常编译?
C++ 中的模板类声明头文件和实现文件分离后,如何能实现正常编译? 这个feature叫做Export Template,即外名模板,它的作用在于使得模板代码可依照C/C++语言习惯,将模板声明和实现 ...
- 基于s5pv210的uboot总结
1.启动过程特征总结 (1)第一阶段为汇编阶段.第二阶段为C阶段 (2)第一阶段在SRAM中.第二阶段在DRAM中 (3)第一阶段注重SoC内部.第二阶段注重SoC外部Board内部 2.uboot的 ...
- xenserver+starwind架构布署
主机 CPU 和主板均需支持 INTER-VT/ AMD-VT ,主板默认可能没开 进BISO开启 下载最新的 xenserver ,授权注册一下 轻松得到授权文件 (鄙视一下VMWARE,看人家 ...
- Arrays类的十大用法
还有很多地方需要细细斟酌 0. 声明数组 String[] aArray = new String[5]; String[] bArray = {"a","b" ...