Скачать книгу

to the nearest tenth. Then transfer to the corresponding spoke in the Threat And Risk Assessment Scorecard on the second next page of the Self-Assessment.

      Your completed Threat And Risk Assessment Scorecard will give you a clear presentation of which Threat And Risk Assessment areas need attention.

      Threat And Risk Assessment

      Scorecard Example

      Example of how the finalized Scorecard can look like:

      Threat And Risk Assessment

      Scorecard

      Your Scores:

      BEGINNING OF THE

      SELF-ASSESSMENT:

      Table of Contents

      About The Art of Service8

      Included Resources - how to access8

      Purpose of this Self-Assessment10

      How to use the Self-Assessment11

      Threat And Risk Assessment

      Scorecard Example13

      Threat And Risk Assessment

      Scorecard14

      BEGINNING OF THE

      SELF-ASSESSMENT:15

      CRITERION #1: RECOGNIZE16

      CRITERION #2: DEFINE:28

      CRITERION #3: MEASURE:44

      CRITERION #4: ANALYZE:59

      CRITERION #5: IMPROVE:76

      CRITERION #6: CONTROL:92

      CRITERION #7: SUSTAIN:104

      Threat And Risk Assessment and Managing Projects, Criteria for Project Managers:129

      1.0 Initiating Process Group: Threat And Risk Assessment130

      1.1 Project Charter: Threat And Risk Assessment132

      1.2 Stakeholder Register: Threat And Risk Assessment134

      1.3 Stakeholder Analysis Matrix: Threat And Risk Assessment135

      2.0 Planning Process Group: Threat And Risk Assessment137

      2.1 Project Management Plan: Threat And Risk Assessment139

      2.2 Scope Management Plan: Threat And Risk Assessment141

      2.3 Requirements Management Plan: Threat And Risk Assessment143

      2.4 Requirements Documentation: Threat And Risk Assessment145

      2.5 Requirements Traceability Matrix: Threat And Risk Assessment147

      2.6 Project Scope Statement: Threat And Risk Assessment149

      2.7 Assumption and Constraint Log: Threat And Risk Assessment151

      2.8 Work Breakdown Structure: Threat And Risk Assessment153

      2.9 WBS Dictionary: Threat And Risk Assessment155

      2.10 Schedule Management Plan: Threat And Risk Assessment158

      2.11 Activity List: Threat And Risk Assessment160

      2.12 Activity Attributes: Threat And Risk Assessment162

      2.13 Milestone List: Threat And Risk Assessment164

      2.14 Network Diagram: Threat And Risk Assessment166

      2.15 Activity Resource Requirements: Threat And Risk Assessment168

      2.16 Resource Breakdown Structure: Threat And Risk Assessment170

      2.17 Activity Duration Estimates: Threat And Risk Assessment172

      2.18 Duration Estimating Worksheet: Threat And Risk Assessment174

      2.19 Project Schedule: Threat And Risk Assessment176

      2.20 Cost Management Plan: Threat And Risk Assessment178

      2.21 Activity Cost Estimates: Threat And Risk Assessment180

      2.22 Cost Estimating Worksheet: Threat And Risk Assessment182

      2.23 Cost Baseline: Threat And Risk Assessment184

      2.24 Quality Management Plan: Threat And Risk Assessment186

      2.25 Quality Metrics: Threat And Risk Assessment188

      2.26 Process Improvement Plan: Threat And Risk Assessment190

      2.27 Responsibility Assignment Matrix: Threat And Risk Assessment192

      2.28 Roles and Responsibilities: Threat And Risk Assessment194

      2.29 Human Resource Management Plan: Threat And Risk Assessment196

      2.30 Communications Management Plan: Threat And Risk Assessment198

      2.31 Risk Management Plan: Threat And Risk Assessment200

      2.32 Risk Register: Threat And Risk Assessment202

      2.33 Probability and Impact Assessment: Threat And Risk Assessment204

      2.34 Probability and Impact Matrix: Threat And Risk Assessment206

      2.35 Risk Data Sheet: Threat And Risk Assessment208

      2.36 Procurement Management Plan: Threat And Risk Assessment210

      2.37 Source Selection Criteria: Threat And Risk Assessment212

      2.38 Stakeholder Management Plan: Threat And Risk Assessment214

      2.39 Change Management Plan: Threat And Risk Assessment216

      3.0 Executing Process Group: Threat And Risk Assessment218

      3.1 Team Member Status Report: Threat And Risk Assessment220

      3.2 Change Request: Threat And Risk Assessment222

      3.3 Change Log: Threat And Risk Assessment224

      3.4 Decision Log: Threat And Risk Assessment226

      3.5 Quality Audit: Threat And Risk Assessment228

      3.6 Team Directory: Threat And Risk Assessment231

      3.7 Team Operating Agreement: Threat And Risk Assessment233

      3.8 Team Performance Assessment: Threat And Risk Assessment235

      3.9 Team Member Performance Assessment: Threat And Risk Assessment238

      3.10 Issue Log: Threat And Risk Assessment240

      4.0 Monitoring and Controlling Process Group: Threat And Risk Assessment241

      4.1 Project Performance Report: Threat And Risk Assessment243

      4.2 Variance Analysis: Threat And Risk Assessment245

      4.3 Earned Value Status: Threat And Risk Assessment247

      4.4 Risk Audit: Threat And Risk Assessment249

      4.5 Contractor Status Report: Threat And Risk Assessment251

      4.6 Formal Acceptance: Threat And Risk Assessment253

      5.0 Closing Process Group: Threat And Risk Assessment255

      5.1 Procurement Audit: Threat And Risk Assessment257

      5.2 Contract Close-Out: Threat And Risk Assessment260

      5.3 Project or Phase Close-Out: Threat And Risk Assessment262

      5.4 Lessons Learned: Threat And Risk Assessment264

      Index266

      CRITERION #1: RECOGNIZE

      INTENT: Be aware of the need for change. Recognize that there is an unfavorable variation, problem or symptom.

      In

Скачать книгу