In this article we'll address the people swirling around your project: stakeholders. You'll find some tips and other resources for optimising stakeholder involvement in your project.

  • Who cares?
  • What do they care about?
  • What am I going to do about it?

Those are the three simple questions a project team can ask to understand their stakeholders and develop a strategy for keeping them happy.

As we developed a workshop on stakeholder management built on those three questions one of our project management experts, put all the pieces together when he said, "That's just risk management for people."

We think he's right. Review this classic risk management process. Can you see the parallel?

  1. Identify risks.
  2. Analyse and quantify the risk.
  3. Develop a risk response.

So on your next (or current) project consider treating your stakeholders as opportunities or threats.

Step One: Identify Risks (Who cares?)

Just as with risk management, we can only manage stakeholders that we are aware of, so be creative and energetic in identifying stakeholders. Cast your net wide and consider all those stakeholders that won't make a peep unless you step on their toes. Regulators, end-users, your customer's customers, and internal support staff such as accounting or procurement. Too many project managers don't include these secondary stakeholders in their normal communication plans yet get indignant when they obstruct the project. In risk management we identify threats and opportunities. Stakeholders can be project adversaries just as easily as advocates.

While you are trying to uncover the hidden stakeholders, don't forget about the obvious ones: your team, your sponsor, and the people who will be approving the funding.

Tip: Make sure your stakeholders have a name and email id. Stakeholders are people, not organisations. "Facilities" isn't going to sign off on your change request, but Cindy, who runs the department, might.

Step Two: Analyse and Quantify the Risk (What do they care about?)

Risk management calls for prioritising the risks according to probability and impact. We can prioritise stakeholders similarly - by authority and interest. Interest means "how much do they care?" and authority equates to their ability to affect the project.

Now analyse the high priority stakeholders. You won't be able to quantify your stakeholders as much as your project risks, but you can organise some key information: What do they care about? How will the project affect them? How does this project fit into their priorities? What do you need from them for the project to run smoothly?

Step Three: Develop a Risk Response (What are you going to do about it?)

What we do to leverage our supporters and minimise the effect of our opponents will depend upon the answers to the questions above. The more we know about our stakeholders, the better we can plan to work with them. One thing is certain: ignoring them will sap their support and inflame their opposition, so plan for communication.

Rapid changes in information technology continue to bring us new ways to flood our stakeholders with data, but that doesn't necessarily make us effective communicators. Who needs information? What information? How often? In what format? These questions form the basis of your communication plan. As you develop your communication plan remember these two tips:

  1. Positive personal relationships are the foundation of effective communication. Personal relationships magnify the value of the technology we use to deliver information.
  2. Use two or more mediums of communication for every stakeholder. For example, meetings should be accompanied by documentation.

The Secret to Success

What's the secret to risk management? Do it. Proactive, systematic risk management means finding the problems before they find you. Risk management doesn't have to be complex, but it does have to be disciplined. The same holds true for our stakeholders. Understanding who they are and what they want often isn't that difficult. The key is to be proactive, to reach out, and influence them before they influence you.

Stakeholder Risk Management的更多相关文章

  1. 10 Golden Rules of Project Risk Management

    The benefits of risk management in projects are huge. You can gain a lot of money if you deal with u ...

  2. 【EMV L2】终端风险管理(Terminal Risk Management)

    终端风险管理使大额交易联机授权,并确保芯片交易能够周期性地进行联机以防止在脱机环境中也许无法察觉的风险. 虽然发卡行被强制要求在应用交互特征(AIP)中将终端风险管理位设置成1以触发终端风险管理,但终 ...

  3. Security and Risk Management(5)

    Ethics: ISC Code of Ethics You agree to this before the exam, and the code of ethics is very testabl ...

  4. The Simplified Project Management Process

    One of the challenges of explaining project management to people who are unfamiliar with the approac ...

  5. Introduction to Project Management(II)

    Introduction The purpose of this paper is to gain an understanding of project management and to give ...

  6. A Framework for Programme Management

    In business today organisations manage multiple projects concurrently with shared or overlapping res ...

  7. Software Engineering: 2. Project management

    resources:"Software Engineering" Ian Sommerville For most projects, important goals are: D ...

  8. Threat Risk Modeling Learning

    相关学习资料 http://msdn.microsoft.com/en-us/library/aa302419(d=printer).aspx http://msdn.microsoft.com/li ...

  9. Magic Quadrant for Security Information and Event Management

    https://www.gartner.com/doc/reprints?id=1-4LC8PAW&ct=171130&st=sb Summary Security and risk ...

随机推荐

  1. POJ 1064 (二分)

    题目链接: http://poj.org/problem?id=1064 题目大意:一堆棍子可以截取,问要求最后给出K根等长棍子,求每根棍子的最大长度.保留2位小数.如果小于0.01,则输出0.00 ...

  2. wp ApplicationBar

    WP7中的菜单栏 一个应用程序的菜单栏的内容是有限的,最多不超过4个,排列顺序是以菜单栏中间为中心,然后从左往右排列. WP7提供了两种类型的菜单栏,一种是全局的菜单栏,也就是说在所有的页面中都会出现 ...

  3. TYVJ P1090 母舰 Label:模拟,题目看清就好

    背景 广东汕头聿怀初中 Train#3 Problem 1 描述 在小A的星际大战游戏中,一艘强力的母舰往往决定了一场战争的胜负.一艘母舰的攻击力是普通的MA(Mobile Armor)无法比较的.对 ...

  4. ubuntu中的Wine详解

    什么是wine?(转自百度百科,具体看百科) wine,是一款优秀的Linux系统平台下的模拟器软件,用来将Windows系统下的软件在Linux系统下稳定运行,该软件更新频繁,日臻完善,可以运行许多 ...

  5. 深入理解JVM—性能监控工具

    (转自:http://yhjhappy234.blog.163.com/blog/static/31632832201222691738865/) 我们知道,在JVM编译期和加载器,甚至运行期已经做了 ...

  6. python 面向对象的三大特征之 继承

    #继承 #object 基类,是python定义的所有类的父类 #经典类:不继承object的类称作经典类 #新式类:继承object的类称作新式类 #python 3.x统一为新式类 #经典类是类对 ...

  7. windows 通过ssh连接到Linux主机

    1. 确定Linux主机已经开启了ssh功能. 1.1--确认sshserver是否启动 ps -e |grep ssh 如果只有ssh-agent那ssh-server还没有启动,需要/etc/in ...

  8. 让VIEWSTATE从页面中完全消失(小技巧)

      VIEWSTATE是个好东西,是asp.net的一大创举,给web开发带来了极大的便利,然后这种便利是一种双刃剑,尤其是在前台页面,大多数前台页面都是用来展示列表数据,和用户交互的地方现在大都采用 ...

  9. Ubuntu/linux 安装 kernel-devel

    这个问题,需要安装与系统内核配套的开发包. 查看内核: uname -r 内核头文件C header files下载地址: http://rpmfind.net/linux/rpm2html/sear ...

  10. Redis 笔记与总结6 Redis 高级应用之 事务处理、持久化操作、pub_sub、虚拟内存

    3.事务处理 redis 对事务的支持目前还比较简单. redis 只能保证一个 client 发起的事务中的命令可以连续的执行,而中间不会插入其他 client 的命令. 由于 redis 是单线 ...