CN117314347A - Project management method, system, terminal equipment and storage medium - Google Patents

Project management method, system, terminal equipment and storage medium Download PDF

Info

Publication number
CN117314347A
CN117314347A CN202311259142.5A CN202311259142A CN117314347A CN 117314347 A CN117314347 A CN 117314347A CN 202311259142 A CN202311259142 A CN 202311259142A CN 117314347 A CN117314347 A CN 117314347A
Authority
CN
China
Prior art keywords
risk
project
factors
vulnerability
model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311259142.5A
Other languages
Chinese (zh)
Inventor
马经国
吴焕忠
陈伟鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhaoqing Urban Planning And Design Institute
Original Assignee
Zhaoqing Urban Planning And Design Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhaoqing Urban Planning And Design Institute filed Critical Zhaoqing Urban Planning And Design Institute
Priority to CN202311259142.5A priority Critical patent/CN117314347A/en
Publication of CN117314347A publication Critical patent/CN117314347A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06313Resource planning in a project environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06315Needs-based resource requirements planning or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Data Mining & Analysis (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present disclosure relates to the field of information management technologies, and in particular, to a project management method, a system, a terminal device, and a storage medium. Combining each risk factor in the process of processing the accepting project by a design institute and risk associated information corresponding to the risk factor to form a corresponding risk interaction network; acquiring risk correlation information among various risk factors in a risk interaction network, and establishing a corresponding system dynamics model according to the risk correlation information; performing risk simulation prediction according to the system dynamics model, and outputting a corresponding risk simulation prediction result; carrying out vulnerability assessment on the risk simulation prediction result, obtaining corresponding risk key points, and generating vulnerability identification labels corresponding to the receiving items according to the risk key points; and matching corresponding risk coping strategies according to the vulnerability identification labels. The technical scheme has the effect of improving project risk management of the design institute.

Description

Project management method, system, terminal equipment and storage medium
Technical Field
The present disclosure relates to the field of information management technologies, and in particular, to a project management method, a system, a terminal device, and a storage medium.
Background
Design house project management refers to the process of organizing, planning, executing, controlling and evaluating projects through scientific methods and technologies to achieve project goals and requirements when the design house performs project work.
In the management of specific projects, first, the targets and requirements of the projects need to be defined, the targets of the projects include completion of design tasks, satisfaction of customer requirements, improvement of design quality and the like, and the requirements of the projects include time, cost, quality, risk and other limiting conditions. Next, a project plan is required, which includes planning the work content, workflow, resource requirements, scheduling, etc. of the project to ensure that the project can be scheduled. In the project execution stage, the design institute needs to organize team members to conduct specific design work, ensure that the design work is conducted according to the plan, and communicate and coordinate with related stakeholders to ensure smooth progress of the project. In the project control stage, the design house needs to supervise and control the project to ensure project progress is planned, and at the same time, timely discover and solve problems and risks in the project. Finally, the design institute needs to evaluate the project, and the project evaluation may include evaluation of the implementation degree of the project target, evaluation of the project quality, evaluation of the control condition of the project cost and time, and the like, so as to provide reference and improvement for future projects.
In practical application, the design institute often attaches less importance to risk management in project management, lacks systematic risk identification, assessment and treatment measures, further cannot timely treat the project when the project faces potential risks and problems, and influences the smooth progress of the project, so that the project risk management effect is poor.
Disclosure of Invention
In order to improve project risk management effects of a design institute, the application provides a project management method, a project management system, terminal equipment and a storage medium.
In a first aspect, the present application provides a method for project management, including the steps of:
acquiring a receiving item, and decomposing the receiving item into corresponding work packages according to a preset item decomposition standard;
determining corresponding project butt joint resources according to subtask requirements in the work package;
establishing a corresponding risk identification model by combining the subtask requirements and the project docking resources, and outputting a corresponding risk identification model chart;
if a plurality of risk factors exist in the risk identification model chart, risk associated information corresponding to each risk factor is obtained respectively;
combining the risk factors and risk associated information corresponding to the risk factors to form a corresponding risk interaction network;
Acquiring risk correlation information among the risk factors in the risk interaction network, and establishing a corresponding system dynamics model according to the risk correlation information;
performing risk simulation prediction according to the system dynamics model, and outputting a corresponding risk simulation prediction result;
carrying out vulnerability assessment on the risk simulation prediction result, obtaining corresponding risk key points, and generating a vulnerability identification label corresponding to the receiving item according to the risk key points;
and matching corresponding risk coping strategies according to the vulnerability identification labels.
By adopting the technical scheme, the accepted items are decomposed into the corresponding work packages according to the preset item decomposition standard, so that the design institute can manage and allocate resources to the accepted items better, then the item docking resources required by the design institute when processing the accepted items are determined according to subtask requirements in the work packages, then the corresponding risk recognition model is established and the corresponding risk recognition model chart is output by combining the determined subtask requirements and the item docking resources, related risks possibly occurring in the processing process of the accepted items can be recognized and simulated more intuitively through the risk recognition model chart, if a plurality of risk factors are recognized, the correlation among the risk factors and the corresponding risk correlation information are combined to form a corresponding risk interaction network, the correlation among the risk factors can be known more comprehensively and specifically through the risk interaction network, further the corresponding system dynamics model is established and the corresponding risk simulation prediction result is output according to the risk correlation information among the risk factors, the system analysis prediction is performed on the dynamic conditions among the risk factors, in order to effectively evaluate the vulnerability simulation prediction result, the vulnerability project can be evaluated more intuitively, namely, the critical points corresponding to the risk factors can be evaluated and the critical points are determined, and the corresponding risk management points are not influenced correspondingly, and the critical risk management labels are generated according to the critical factors. And as the risk identification, evaluation and strategy treatment of the system are carried out on the accepted projects, the project risk management effect of the design institute is improved.
Optionally, acquiring risk correlation information between the risk factors in the risk interaction network, and establishing a corresponding system dynamics model according to the risk correlation information includes the following steps:
judging whether risk correlation exists between the corresponding risk factors according to the risk correlation information;
if the risk correlation does not exist between the risk factors, acquiring a corresponding first risk factor and the risk correlation information corresponding to the first risk factor;
extracting risk characteristics corresponding to the first risk factors according to the risk correlation information;
and analyzing and processing the risk characteristics according to a preset risk modeling rule, and establishing a risk dynamic model corresponding to the first risk factor as the system dynamics model.
By adopting the technical scheme, the risk characteristics of the non-associated risk factors are analyzed and processed, and the corresponding risk dynamic model is established, so that the single risk change trend of the bearing project in the processing process can be accurately and effectively simulated and predicted through the risk dynamic model, and the management effect of the design institute on the project risk is improved.
Optionally, the method further includes the following steps after extracting risk features corresponding to the first risk factors according to the risk correlation information:
analyzing the risk characteristics according to a preset time sequence analysis rule, obtaining corresponding risk evolution data, and establishing a corresponding risk evolution sub-model according to the risk evolution data;
integrating the risk evolution sub-models, establishing a corresponding risk dynamic parallel model, and outputting independent risk influences corresponding to the receiving items.
By adopting the technical scheme, according to the risk dynamic parallel model, independent risk influence corresponding to the accepting project can be output, so that key risk factors in the project can be identified, the influence degree of the risk on the project can be quantified, important risk information is provided for a decision maker, risk management and establishment of countermeasures are guided, and the management effect of a design institute on the project risk is improved.
Optionally, after judging whether there is a risk association between the corresponding risk factors according to the risk correlation information, the method further includes the following steps:
if the risk correlation exists between the risk factors, acquiring a corresponding second risk factor and the risk correlation information between the second risk factors;
Converting the second risk factor into a corresponding state variable according to a preset mapping function;
and combining the state variable and the risk correlation information, and establishing the risk dynamic model corresponding to the second risk factor as the system dynamics model.
By adopting the technical scheme, the risk factors with risk association are converted into corresponding state variables, and the abstract risk factors can be converted into state variables which can be quantified and simulated, so that the change trend and the evolution law among the risk factors are simulated and predicted by establishing the corresponding risk dynamic model, the association and the influence among different risk factors are comprehensively considered, the risk condition of the accepted projects can be comprehensively evaluated, and the management effect of the design institute on the project risks is improved.
Optionally, after converting the second risk factor into a corresponding state variable according to a preset mapping function, the method further includes the following steps:
constructing a corresponding risk association network according to the state variable and the related variable corresponding to the state variable;
performing centrality analysis on the risk associated network according to a preset network analysis rule to obtain corresponding critical nodes and risk associated factors corresponding to the critical nodes;
And combining the critical node and the risk association factors to determine a risk association range corresponding to the acceptance item.
By adopting the technical scheme and combining the critical nodes and the risk association factors, the risk association range of the accepting project is determined, and the main risk faced by the accepting project can be more accurately identified and evaluated by determining the risk association range, so that targeted measures and strategies are provided for risk management and decision making, and the management effect of a design institute on the project risk is improved.
Optionally, performing vulnerability assessment on the risk simulation prediction result, obtaining a corresponding risk key point, and generating a vulnerability identification label corresponding to the acceptance item according to the risk key point includes the following steps:
if the risk key points accord with the preset project risk point standard, determining a risk monitoring index corresponding to the risk key points according to the project characteristics of the bearing project;
setting corresponding risk response conditions according to the risk monitoring indexes;
and performing risk assessment on the receiving item according to the risk response condition, acquiring corresponding target classification weaknesses, and setting a weaknesses identification label corresponding to the target classification weaknesses.
By adopting the technical scheme, vulnerability assessment is carried out on the risk simulation prediction result, weak links which are easily affected by risks in the project can be revealed, potential risk points and hidden dangers can be identified, reference basis is provided for risk management and decision making, and therefore the project risk management effect of a design institute is improved.
Optionally, after performing risk assessment on the receiving item according to the risk response condition, obtaining a corresponding target classification vulnerability, and setting a vulnerability identification tag corresponding to the target classification vulnerability, the method further includes the following steps:
identifying the vulnerability identification label and acquiring corresponding vulnerability characteristics;
establishing corresponding risk early warning indexes according to the weakness characteristics;
setting a corresponding early warning threshold and triggering conditions according to the risk early warning index;
and combining the early warning threshold value and the triggering condition to establish a corresponding risk early warning mechanism.
By adopting the technical scheme, the risk early warning mechanism comprises the transmission, receiving and response processes of early warning signals, and timely response and treatment of the risk of the received project can be realized by establishing the risk early warning mechanism, so that the damage degree of the risk to the received project is reduced, and the management effect of a design institute on the project risk is improved.
In a second aspect, the present application provides an item management system comprising:
the project decomposition module is used for acquiring the receiving project and decomposing the receiving project into corresponding work packages according to a preset project decomposition standard;
the resource docking module is used for determining corresponding project docking resources according to subtask requirements in the work package;
the risk model building module is used for combining the subtask requirements and the project docking resources, building a corresponding risk identification model and outputting a corresponding risk identification model chart;
the risk correlation information acquisition module is used for respectively acquiring risk correlation information corresponding to each risk factor if a plurality of risk factors exist in the risk identification model chart;
the risk network establishment module is used for combining each risk factor and risk associated information corresponding to the risk factor to form a corresponding risk interaction network;
the dynamics model building module is used for obtaining risk correlation information among the risk factors in the risk interaction network and building a corresponding system dynamics model according to the risk correlation information;
The risk simulation prediction module is used for performing risk simulation prediction according to the system dynamics model and outputting a corresponding risk simulation prediction result;
the vulnerability identification module is used for carrying out vulnerability assessment on the risk simulation prediction result, acquiring corresponding risk key points and generating vulnerability identification labels corresponding to the accepting items according to the risk key points;
and the risk policy matching module is used for matching corresponding risk coping policies according to the vulnerability identification tag.
By adopting the technical scheme, the accepting items are decomposed into the corresponding work packages according to the project decomposition standard by the project decomposition module, so that the design institute can manage and allocate resources better for the accepted items, then project butt joint resources required by the design court for processing the accepting items are determined by the resource butt joint module according to subtask requirements in the work packages, then the determined subtask requirements and project butt joint resources are combined, a corresponding risk recognition model is established by the risk model establishment module, a corresponding risk recognition model chart is output, related risks possibly occurring in the processing process of the accepting items can be recognized and simulated more intuitively by the risk recognition model chart, if a plurality of risk factors are recognized, the risk network establishment module is combined with each risk factor and corresponding risk association information thereof to form a corresponding risk interaction network, the interrelation among the risk factors can be known more comprehensively and specifically by the risk interaction network, further according to the risk correlation information among the risk factors, a corresponding system dynamics model is established by the dynamics model establishment module, a corresponding simulation prediction result is output, the dynamic situation among the risk factors can be predicted by the system, the system prediction result is not predicted, and the risk points can be evaluated for the situation that the corresponding risk factors are not influenced by the corresponding risk factors, namely, the risk factors are not influenced by the key factors are evaluated, and the key points are not can be evaluated, and the key points are evaluated. And as the risk identification, evaluation and strategy treatment of the system are carried out on the accepted projects, the project risk management effect of the design institute is improved.
In a third aspect, the present application provides a terminal device, which adopts the following technical scheme:
a terminal device comprises a memory and a processor, wherein the memory stores computer instructions capable of running on the processor, and the processor adopts the project management method when loading and executing the computer instructions.
By adopting the technical scheme, the computer instruction is generated by the project management method and is stored in the memory to be loaded and executed by the processor, so that the terminal equipment is manufactured according to the memory and the processor, and the use is convenient.
In a fourth aspect, the present application provides a computer readable storage medium, which adopts the following technical scheme:
a computer readable storage medium having stored therein computer instructions which, when loaded and executed by a processor, employ a method of project management as described above.
By adopting the technical scheme, the computer instructions are generated by the project management method and stored in the computer readable storage medium to be loaded and executed by the processor, and the computer instructions are convenient to read and store by the computer readable storage medium.
In summary, the present application includes at least one of the following beneficial technical effects: the method comprises the steps of decomposing an accepted item into corresponding work packages according to preset item decomposition standards, so that a design institute can manage and allocate resources to the accepted item better, determining item docking resources required by the design institute when processing the accepted item according to subtask requirements in the work packages, then combining the determined subtask requirements and the item docking resources, establishing a corresponding risk identification model and outputting a corresponding risk identification model chart, identifying relevant risks possibly occurring in the processing process of the accepted item more intuitively through the risk identification model chart, combining each risk factor and corresponding risk association information thereof to form a corresponding risk interaction network if a plurality of risk factors are identified, further comprehensively and specifically knowing the interrelation among the risk factors through the risk interaction network, establishing a corresponding system dynamics model and outputting corresponding risk simulation prediction results according to the risk correlation information among the risk factors, carrying out system analysis prediction on the risk dynamics situation among the risk factors, carrying out vulnerability assessment on the risk dynamic situation in order to effectively evaluate the simulation prediction results, further determining critical points or corresponding risk points in the accepted item, namely, and generating critical points or corresponding risk management key points according to the critical factors. And as the risk identification, evaluation and strategy treatment of the system are carried out on the accepted projects, the project risk management effect of the design institute is improved.
Drawings
Fig. 1 is a schematic flow chart of steps S101 to S109 in a project management method according to the present application.
Fig. 2 is a flow chart of steps S201 to S204 in the project management method of the present application.
Fig. 3 is a schematic flow chart of steps S301 to S302 in the project management method of the present application.
Fig. 4 is a schematic flow chart of steps S401 to S403 in the project management method of the present application.
Fig. 5 is a schematic flow chart of steps S501 to S503 in the project management method of the present application.
Fig. 6 is a flowchart illustrating steps S601 to S603 in the project management method of the present application.
Fig. 7 is a flowchart illustrating steps S701 to S704 in a project management method according to the present application.
FIG. 8 is a block diagram of an item management system of the present application.
Reference numerals illustrate:
1. a project decomposition module; 2. a resource docking module; 3. a risk model building module; 4. a risk associated information acquisition module; 5. a risk network building module; 6. a dynamics model building module; 7. a risk simulation prediction module; 8. a vulnerability identification module; 9. and a risk policy matching module.
Detailed Description
The present application is described in further detail below in conjunction with figures 1-8.
The embodiment of the application discloses a project management method, as shown in fig. 1, comprising the following steps:
s101, acquiring a receiving item, and decomposing the receiving item into corresponding work packages according to a preset item decomposition standard;
s102, determining corresponding project butt-joint resources according to subtask requirements in a work package;
s103, combining subtask demands and project docking resources, establishing a corresponding risk identification model, and outputting a corresponding risk identification model chart;
s104, if a plurality of risk factors exist in the risk identification model chart, risk associated information corresponding to each risk factor is obtained respectively;
s105, combining each risk factor and risk associated information corresponding to the risk factors to form a corresponding risk interaction network;
s106, acquiring risk correlation information among all risk factors in a risk interaction network, and establishing a corresponding system dynamics model according to the risk correlation information;
s107, performing risk simulation prediction according to a system dynamics model, and outputting a corresponding risk simulation prediction result;
s108, carrying out vulnerability assessment on the risk simulation prediction result, acquiring corresponding risk key points, and generating a vulnerability identification label corresponding to the acceptance item according to the risk key points;
S109, matching corresponding risk coping strategies according to the vulnerability identification labels.
In step S101, the receiving item refers to a process that the design institute accepts or undertakes a project, task, or business. Typically, receiving items requires the design house to have the corresponding capabilities and resources to fulfill the requirements and goals of the item. For example, the receiving item may be a variety of different types of projects, tasks, or businesses, such as construction projects, software development, market research, advisory services, and the like.
The preset project decomposition standard refers to a standard and a standard for decomposing a receiving project into a plurality of work packages or subtasks according to a certain rule and a certain method. By presetting project breakdown criteria, the entire project can be broken down explicitly into smaller, manageable work packages for better organization and execution of the project.
Secondly, the work package is the minimum unit of project decomposition, is a task unit which can be independently managed and executed, and has definite targets and deliverables. Each work package contains a series of related activities and tasks to achieve a particular goal.
For example, the receiving item is a building item, and the building item is decomposed into a corresponding foundation engineering work package, a structure construction work package, an interior decoration work package, an electric installation work package and a heating and ventilation engineering work package according to a preset item decomposition standard.
In step S102, the subtask requirements in the work packages refer to specific requirement descriptions for subtasks included in each work package during the project decomposition process, including the targets, requirements, resource requirements, and the like of the tasks. The corresponding project interfacing resources are determined by allocating appropriate resources to each subtask according to the subtask requirements in the work package, so as to ensure that the project can be completed on time and in quality.
For example, subtask requirements include a task goal, which may be to perform a particular job, solve a particular problem, perform a particular function, etc., such as a foundation engineering work package corresponding to a task goal of ensuring that the foundation of a building or structure meets stable, safe, and sustainable requirements, in particular, such as ensuring that the foundation can bear the load of the building or structure and maintain stability, preventing the foundation from settling or tilting, thereby ensuring the safety of the building or structure.
The concept of project docking resources refers to a process of effectively docking and integrating various necessary resources with a project in order to achieve the goal and task requirements of the project in the project execution process. The purpose of the project interfacing resources is to ensure that the project is able to obtain the required resources to support the smooth progress and completion of the project.
For example, project interfacing resources include: human resources, i.e. interfacing persons meeting project requirements with projects, including project managers, team members, professional consultants, etc.; funding resources, i.e., ensuring that a project is able to obtain adequate funding support, including project budget, investment or financing sources, etc.; the material resource, namely, the material, equipment, tools and the like required by the project are in butt joint with the project, so that the project can be ensured to obtain the required material support in time; technical resources, namely technologies, technical tools, software and the like required by the project are docked with the project, so that the project can obtain required technical support; management resources, i.e. the management resources needed by the project are in butt joint with the project, including project management methods, tools, processes and the like.
In step S103, the risk identification model identifies and understands the potential risk in the project by performing system analysis and evaluation on risk factors that may exist in the accepted project according to the subtask requirements and project interfacing resources described above. The risk identification model chart is a visual tool for displaying and recording risk identification results, and is usually a table containing different risk factors and corresponding information such as risk level, probability, influence degree and the like.
Specifically, the establishment of the risk identification model is roughly divided into the following steps: firstly, definitely receiving subtask requirements corresponding to all work packages in a project; then, according to the specific condition of the accepted project, determining project docking resources related to the demands of each subtask; and secondly, evaluating the association degree of the subtask demands and the project docking resources, namely evaluating the association degree of each subtask demand and each project docking resource for realizing the subtask demands, and giving out high, medium, low and other level association degree evaluation according to actual conditions.
Further, a risk identification table is built, namely, a table is built according to the association degree evaluation result of the subtask requirements and the project docking resources, and the subtask requirements and the project docking resources are specifically listed as columns and rows of the table. Each cell may be populated with high, medium, low, etc. levels of evaluation results. And establishing a risk identification model, identifying risks and evaluating risk grades, namely identifying and evaluating the possible risks of each subtask requirement and project docking resources according to the risk identification table, giving the risk grades, such as high, medium and low grades, according to the evaluation result, and outputting a corresponding risk identification model chart.
For example, the risk identification model chart lists risk factors that may be present for an accepted project, such as technical risk, demand change, and insufficient funds. For each risk factor, there is a corresponding assessment of risk level, probability and degree of impact. For another example, the risk recognition model graph evaluates that the risk level is high, the probability is moderate, and the degree of influence is high.
The risk factor in step S104 means that the risk event meets the risk level standard specified by the design institute, and has a large influence on the presence of the design institute or the receiving item. For example, the risk event is a technical risk. The corresponding risk level is high, and the influence degree is also high, and the risk level can be marked as a risk factor.
If there are multiple risk factors in the risk identification model chart, it is indicated that there may be more serious potential safety hazards in the process of processing the received item by the design institute. In order to perform the depth analysis on the risk, risk associated information corresponding to each risk factor is obtained. The risk association information refers to correlations among risk factors, including dependency relationships, interaction relationships, and the like of risks.
For example, the risk factors are insufficient funds and technical risks, and the risk associated information corresponding to the insufficient funds includes: insufficient funds cause problems in technical implementation, such as the inability to purchase the necessary equipment or software tools, thereby increasing technical risk. Thus, there is a certain correlation between insufficient funds and technical risk, which may increase the probability and extent of impact of technical risk.
And if the single risk factor exists in the risk identification model chart, carrying out risk prediction and evaluation on the single risk factor directly through the risk identification model, and outputting a corresponding risk prediction result.
In step S105, the risk interaction network refers to a pictorial representation of interactions and impact relationships between individual risk factors. In this risk interaction network, the individual risk factors are represented as nodes, and the associated information between them is represented by connecting lines. By analyzing the association between the risk factors, the influence relationship between the risk factors can be more comprehensively known, so that risk management and decision making can be better performed.
For example, the insufficient funds node is connected with the technical risk node, and an indication arrow exists on a connecting line between the insufficient funds node and the technical risk node, and the indication arrow points to the technical risk node from the insufficient funds node, so that the occurrence probability and the influence degree of the technical risk can be increased due to insufficient funds.
It should be noted that, through the formation of the risk interaction network, the relevance between the risk factors and the possible linkage reaction between the risk factors can be more intuitively understood. The risk management system is beneficial to project team to more comprehensively identify and evaluate risks and to make corresponding risk management plans.
In step S106, the risk correlation information refers to data such as a correlation coefficient or a correlation matrix obtained by analyzing and evaluating the association relationship between the risk factors, and is used for describing the relationship strength between different risk factors. The system dynamics model is a model method for describing and analyzing the behavior of a dynamic system, and can simulate and predict interactions and changes between various elements in the system.
Wherein the system dynamics model describes the relationship and the change process between each element in the system by establishing a differential equation or a differential equation set. In this model, each risk factor is represented as a state variable, and the association between them is represented by a parameter.
For example, a simplified system dynamics model is built, which includes three state variables including technical risk, personnel loss and demand change, and the relationship between them, namely risk correlation information, is represented by correlation coefficients. The model may be formulated as a differential equation as follows: technical risk (t+1) =technical risk (t) +correlation coefficient 1 x personnel loss (t) personnel loss (t+1) =personnel loss (t) +correlation coefficient 2 x technical risk (t) +correlation coefficient 3 x demand change (t) demand change (t+1) =demand change (t) +correlation coefficient 4 x market competition (t), wherein t represents a time step, and correlation coefficients 1, 2, 3, 4 represent correlation coefficients between technical risk and personnel loss, personnel loss and technical risk, personnel loss and demand change, demand change and market competition, respectively.
It should be noted that, by establishing a system dynamics model, interactions and changes between risk factors can be simulated and analyzed, so as to predict and evaluate the influence of risks on the project. Thereby helping project team to make corresponding risk management strategy and decision, and improving success probability of projects.
In step S107, risk simulation prediction refers to predicting and estimating risk that may occur in the future through simulation calculation and deduction based on a specific system dynamics model. By simulating the change and interaction of risk factors, the probability distribution of possible risk development trend and potential risk event is obtained.
Specifically, performing risk simulation prediction according to a system dynamics model, and outputting a corresponding risk simulation prediction result is roughly divided into the following steps: selecting an appropriate model to describe and model the change and interaction of the risk factors, such as a system dynamics model; setting parameter values in the model according to the requirements of the model, wherein the parameters can be from historical data, experimental study or expert judgment; and performing simulation calculation according to the model and parameter setting, and obtaining risk simulation prediction results of probability distribution of future possible risk development trend and potential risk event through iterative calculation and simulation deduction. The simulation prediction result comprises trend analysis, key stage, interaction and the like of each risk factor.
In step S108, the vulnerability assessment is an assessment of risk simulation predictions to determine possible risk key points and vulnerabilities in step S109. Risk keypoints are factors or conditions in risk simulation that may lead to significant effects or incidents. For example, risk key points are weak links existing in the process of processing the accepted items by the design house, shortage of key resources, uncertainty of external environment and the like.
And secondly, generating a vulnerability identification label for the accepted item according to the risk key points. Vulnerability identification tags are descriptions of vulnerabilities or vulnerabilities that may exist in a subject item. For example, in project management, vulnerability identification tags include insufficient organizational capacity, high technical risk, unstable human resources, and the like
It should be noted that the purpose of vulnerability assessment is to identify and understand the weaknesses of potential risk keypoints and projects in risk simulation predictions. Through the assessment of the key points and the weaknesses of the risks, a decision maker can be helped to better know and understand the risk condition of the project, and further, corresponding measures are taken to lighten the risks and strengthen the toughness of the project. The generation of vulnerability identification tags is a transformation of risk keypoints into an easily understood and identifiable description for better handling and coping with risks in the project management and decision making process. These tags can be used as references for decision makers and team members to identify and focus on important vulnerabilities in projects and take corresponding action in project planning and implementation to address these vulnerabilities.
Further, according to the generated vulnerability identification label, matching corresponding risk coping strategies. Risk coping strategies refer to coping schemes or strategies that deal with the risk exhibited by vulnerability identification tags. Wherein the risk coping strategies can be matched in project management. In the process of project management, risk management can be performed, including identifying project risks, assessing probability and influence degree of risks, and formulating corresponding risk coping strategies.
For example, matching of risk coping strategies is performed in a mode of risk identification and evaluation matrix, namely, according to vulnerability identification labels of projects, risks represented by the vulnerability identification labels are classified and evaluated according to probability and influence degree, priority and importance are determined, and then adaptive risk coping strategies are matched in a preset risk coping strategy library in sequence according to the priority and importance of the risks. The preset risk response policy library is a risk response management database pre-established by a design institute according to historical risk management experience in long-term project management.
The project management method provided by the embodiment decomposes the accepted project into corresponding work packages according to the preset project decomposition standard, so that the design institute can better manage and allocate resources for the accepted project, then determines project docking resources required by the design court for processing the accepted project according to subtask demands in the work packages, then combines the determined subtask demands and project docking resources, establishes a corresponding risk recognition model and outputs a corresponding risk recognition model chart, can more intuitively recognize and simulate related risks possibly occurring in the processing process of the accepted project through the risk recognition model chart, combines each risk factor and corresponding risk association information if a plurality of risk factors are recognized, forming a corresponding risk interaction network, more comprehensively and specifically knowing the interrelation among the risk factors through the risk interaction network, further establishing a corresponding system dynamics model according to the risk correlation information among the risk factors, outputting a corresponding risk simulation prediction result, carrying out system analysis prediction on the risk dynamic situation among the risk factors, carrying out vulnerability assessment on the risk simulation prediction result in order to effectively evaluate the risk simulation prediction result, further determining the risk key points in the receiving project, namely, the risk factors or factors with the greatest influence on the receiving project, and generating corresponding vulnerability identification labels according to the risk key points of different types so as to facilitate subsequent risk coping and management. And as the risk identification, evaluation and strategy treatment of the system are carried out on the accepted projects, the project risk management effect of the design institute is improved.
In one implementation manner of the present embodiment, as shown in fig. 2, step S106 includes the steps of obtaining risk correlation information between risk factors in a risk interaction network, and establishing a corresponding system dynamics model according to the risk correlation information:
s201, judging whether risk correlation exists between corresponding risk factors according to risk correlation information;
s202, if no risk correlation exists between the risk factors, acquiring a corresponding first risk factor and risk correlation information corresponding to the first risk factor;
s203, extracting risk characteristics corresponding to the first risk factors according to the risk correlation information;
s204, analyzing and processing the risk characteristics according to a preset risk modeling rule, and establishing a risk dynamic model corresponding to the first risk factor as a system dynamics model.
In steps S201 to S202, the association between risk factors may be analyzed according to the collected risk correlation information. Visual analysis may be performed by comparing the magnitude of the correlation information, or by plotting the correlation information as a matrix or graph.
And secondly, judging whether risk correlation exists between the risk factors based on the analysis result. If the correlation information shows a high correlation between two or more risk factors, it is indicated that they may have a risk correlation. Conversely, if the correlation is low or close to zero, it is stated that there may be no obvious risk correlation between them.
Further, if there is no risk association between the risk factors, the risk factors between which there is no risk association are marked as first risk factors, and the corresponding risk correlation information thereof is associated. By marking the risk factors with no risk correlation as first risk factors, the rapid identification and positioning of the independent risks of the accepted items are facilitated.
In step S203 to step S204, in the risk management, risk features related to the first risk factor are extracted according to the risk correlation information. These risk characteristics may be factors directly related to the first risk factor or factors that have a correlation with other risk factors. For example, risk features related to supplier reliability may include delays in delivery of suppliers, quality issues for suppliers, and the like. Wherein, the risk characteristic refers to a specific attribute or index related to a specific risk factor. They are used to describe and quantify different aspects of risk factors in order to better understand and assess the potential impact of risk.
The preset risk modeling rule refers to a rule or assumption set in advance when the risk model is established, and is used for describing and quantifying the relationship between the risk features. For example, delivery delays and quality problems occur simultaneously, which can have a greater impact on project progress, cost, product quality, and customer satisfaction. This rule may be used to take into account the additive effects of multiple risk features.
It should be noted that, the purpose of the preset risk modeling rule is to quantify the relationship between the risk features and the system performance by establishing a mathematical equation, a simulation method or other suitable methods, so as to predict and evaluate the system performance under different risk scenarios. These rules may help the decision maker better understand the potential impact of risk and make corresponding risk management policies and decisions.
Secondly, the risk dynamic model refers to a method for modeling and simulating the change and evolution of risks. It is able to predict future risk conditions based on different factors and variables and provide decision support and risk management strategies. For example, a risk dynamic model may be used to model and analyze changes and evolution of vendor reliability. Such a model may consider a number of factors, such as historical data of the provider, market changes, technological advances, etc., to predict future trends in the reliability of the provider.
It should be noted that, the establishment of the risk dynamic model is generally based on methods such as statistical analysis, mathematical model or computer simulation. It can identify key drivers of their corresponding risks by collecting and analyzing a large amount of risk characteristic data, and explore the relationships and trends between them. So that the decision maker can better understand the potential impact of risk and make corresponding risk management strategies and decisions.
According to the project management method provided by the embodiment, the risk characteristics of the non-associated risk factors are analyzed and processed, the corresponding risk dynamic model is established, and the single risk change trend of the bearing project in the processing process can be accurately and effectively simulated and predicted through the risk dynamic model, so that the project risk management effect of a design institute is improved.
In one implementation manner of this embodiment, as shown in fig. 3, in step S203, after extracting risk features corresponding to the first risk factor according to the risk correlation information, the method further includes the following steps:
s301, analyzing risk characteristics according to a preset time sequence analysis rule, acquiring corresponding risk evolution data, and establishing a corresponding risk evolution sub-model according to the risk evolution data;
s302, integrating the risk evolution sub-models, establishing a corresponding risk dynamic parallel model, and outputting independent risk influences corresponding to the bearing projects.
In steps S301 to S302, the preset time series analysis rule refers to a method of analyzing and processing data according to a specific rule and characteristics of time series in the risk analysis and prediction process. It can help determine trends, periodicity, and other patterns in the data and extract useful information about risk evolution therefrom. Risk evolution data refers to data that records and counts the change in a particular risk feature over a period of time. It may include various risk-related indicators, parameters or observations that describe and quantify the evolution process of the risk.
For example, a design house receives a building design project with a 12 month period. According to a preset time sequence analysis rule, the design institute can analyze risk characteristics in project management by adopting the following method, and acquire related risk evolution data: recording the starting time and the ending time of each stage according to project planning and actual progress, and analyzing time data to know the duration time, progress change and possible delay condition of each stage of the project; recording the cost budget and the actual expenditure conditions of each stage of the project, and knowing the cost control condition and the evolution trend of the project by calculating the cost deviation and the cost efficiency index of each stage;
further, quality problems and corrective measures in the project are recorded, the quality risk evolution condition of the project can be known by analyzing the frequency, the severity and the effect of the corrective measures of the quality problems, and quality management of the project is improved according to analysis results; the risk event, the risk assessment result and the risk countermeasure in the project are recorded, the risk evolution condition of the project can be known by analyzing the occurrence frequency of the risk event, the change of the risk assessment and the effectiveness of the risk countermeasure, and corresponding risk management measures can be timely adopted.
And secondly, according to the risk evolution data, a corresponding risk evolution sub-model can be established. This sub-model may be a mathematical equation, statistical model, or other suitable model. It can be used to describe the change of risk features over time and predict future risk evolution.
Furthermore, the risk evolution sub-model is integrated, so that a corresponding risk dynamic parallel model can be established. The risk dynamic parallel model is a model for describing and analyzing the respective risk evolution of risk factors without risk correlation. The model regards risk as a dynamic and multidimensional process based on a preset time sequence analysis rule, and decomposes the risk into different factors and stages, and the model can comprehensively consider interaction and influence among different risk characteristics and evolution trends of the risk characteristics along with time. By means of simulation and emulation, independent risk influences corresponding to the bearing projects under different risk scenes can be predicted. Wherein, independent risk impact refers to the concept of analyzing and evaluating different risk factors as being independent of each other in risk management.
In particular, the independent risk impact of the output may be an assessment regarding project progress, cost, product quality, customer satisfaction, etc. For example, the extent to which a provider delivery delay affects project progress, or the extent to which a quality problem rate affects product quality and customer satisfaction, may be predicted. The quantified results of these risk impacts may help a decision maker to better understand the importance of different risk factors and to make corresponding risk management strategies and decisions.
According to the project management method provided by the embodiment, according to the risk dynamic parallel model, independent risk influence corresponding to the accepted project can be output, so that key risk factors in the project can be identified, the influence degree of the risk on the project can be quantified, important risk information is provided for a decision maker, risk management and establishment of countermeasures are guided, and the management effect of a design institute on the project risk is improved.
In one implementation manner of the present embodiment, as shown in fig. 4, after step S201, that is, after judging whether there is a risk association between corresponding risk factors according to the risk correlation information, the method further includes the following steps:
s401, acquiring a corresponding second risk factor and risk correlation information between the second risk factors if risk correlation exists between the risk factors;
s402, converting the second risk factor into a corresponding state variable according to a preset mapping function;
s403, combining the state variables and the risk correlation information, and establishing a risk dynamic model corresponding to the second risk factor as a system dynamics model.
In steps S401 to S402, if there is a risk association between risk factors, it is stated that the occurrence and influence between risk factors are not independent, meaning that the occurrence and influence of one risk factor may have a direct or indirect influence on other risk factors. The risk factors are then marked as second risk factors.
The preset mapping function is a function for converting the second risk factor into a corresponding state variable. The state variable may be a certain value or indicator that is used to represent the state or degree of the risk factor. The selection of the preset mapping function should be based on related domain knowledge, data analysis and actual requirements.
Specifically, the second risk factor may be mapped from the original risk factor space to the state variable space by presetting a mapping function. The purpose of this is to facilitate quantification and analysis of risk. The specific form of the mapping function may be selected according to practical situations, such as linear mapping, exponential mapping, logarithmic mapping, etc. By converting the second risk factor into a state variable, the extent of influence of the different risk factors can be more intuitively understood and compared. The state variables may provide a standardized metric that allows for a comparability analysis between different risk factors. This helps to more fully understand the overall condition of the risk and provides a more accurate basis for risk management decisions.
In step S403, a risk dynamic model is built by describing the change and influence of the risk factor by combining the state variable of the second risk factor and the risk correlation information. Such models typically employ methods of system dynamics for analyzing and predicting the dynamic behavior of risk factors.
Specifically, the establishment of the risk dynamic model can be roughly divided into the following steps: firstly, converting a second risk factor into a corresponding state variable according to a preset mapping function; then, determining the association degree between the second risk factors and other related risk factors according to the risk correlation information between the second risk factors, wherein the correlation information can be a correlation coefficient obtained through statistical analysis and is used for quantifying the relationship between the risk factors; secondly, based on the state variables and the risk correlation information, a risk dynamic model of the second risk factors is established, wherein the risk dynamic model is a method for describing and simulating the dynamic system behaviors and can be used for analyzing the interaction, the change trend and the propagation effect among the second risk factors.
According to the project management method provided by the embodiment, risk factors with risk association are converted into corresponding state variables, abstract risk factors can be converted into state variables which can be quantified and simulated, so that the change trend and the evolution law among the risk factors are simulated and predicted by establishing a corresponding risk dynamic model, the association and the influence among different risk factors are comprehensively considered, the risk condition of the accepted projects can be comprehensively evaluated, and the management effect of a design institute on the project risks is improved.
In one implementation manner of this embodiment, as shown in fig. 5, after step S402, that is, converting the second risk factor into the corresponding state variable according to the preset mapping function, the method further includes the following steps:
s501, constructing a corresponding risk association network according to the state variable and the related variable corresponding to the state variable;
s502, carrying out centrality analysis on a risk associated network according to a preset network analysis rule, and obtaining corresponding critical nodes and risk associated factors corresponding to the critical nodes;
s503, combining the critical nodes and the risk association factors, and determining a risk association range of the corresponding accepting item.
In step S501, the risk correlation network is a graphical representation method for exposing the relationships and interactions between different risk factors. Specifically, first, the state variables to be considered are determined, which represent different risk factors or indicators. For example, suppose that A, B and C three state variables are considered, representing three different risk factors, respectively.
Then, a risk correlation network is constructed according to the state variables and the related variables. Wherein a related variable refers to other variables that have a relationship or correlation with a certain state variable. In risk management, related variables are used to describe the relationships and interactions between different risk factors, and related variables may be other state variables, external factors, or variables in other systems.
Where each state variable is represented as a node and the relationship between related variables is represented as edges connecting the nodes, the type of edge may be determined based on the nature of the correlation, such as positive correlation, negative correlation, or no correlation. The structure and topology of the risk-associated network depends on the relationship between the state variables and the related variables, and the connectivity between nodes and the weights of edges can be determined by correlation coefficients or other statistical methods to reflect the degree and strength of association between different factors.
It should be noted that by analyzing the risk correlation network, important risk factors, critical paths, and propagation effects can be identified. The interaction between different factors is facilitated to be understood, overall risks are assessed, and corresponding risk management strategies are formulated. The risk correlation network can also be used for predicting the change trend of the risk factors, performing sensitivity analysis and supporting decision.
In steps S502 to S503, the preset network analysis rule refers to a series of rules and methods set at the time of network analysis. These rules and methods are used to measure, analyze, and interpret characteristics, relationships, and attributes of nodes and edges in a network. The purpose of the preset network analysis rules is to better understand and study the network structure, function and dynamics.
According to a preset network analysis rule, the risk association network can be subjected to centrality analysis to obtain the key nodes and the corresponding risk association factors. Centrality analysis is a method of measuring the importance and centrality of nodes in a network.
In particular, nodes having criticality in the risk-associated network may be determined through centrality analysis. These nodes play an important role in the network, and their state changes or impact have an important impact on the stability and risk propagation of the overall network. The criticality nodes may be measured by different centrality indices (e.g., centrality, near centrality, median centrality, etc.).
Second, risk-related factors corresponding to critical nodes refer to other risk factors directly related to or affecting those nodes. By analyzing relevant variables of the critical node, these risk association factors, i.e., other nodes or variables associated with the critical node, can be determined.
Further, in combination with the critical nodes and risk association factors, a risk association range of the corresponding socket item can be determined. The risk association range represents the range and extent of influence of risk factors or variables associated with the critical node. This helps identify and understand key risk factors that may be present in the project and their potential propagation and impact paths.
According to the project management method provided by the embodiment, the risk association range of the accepted project is determined by combining the key nodes and the risk association factors, and the main risk faced by the accepted project can be more accurately identified and evaluated by determining the risk association range, so that targeted measures and strategies are provided for risk management and decision making, and the project risk management effect of a design institute is improved.
In one implementation manner of the present embodiment, as shown in fig. 6, step S108 of performing vulnerability assessment on the risk simulation prediction result, obtaining a corresponding risk key point, and generating a vulnerability identification label corresponding to the receiving item according to the risk key point includes the following steps:
s601, if the risk key points meet the preset project risk point standard, determining risk monitoring indexes corresponding to the risk key points according to project characteristics of the received projects;
s602, setting corresponding risk response conditions according to risk monitoring indexes;
s603, performing risk assessment on the receiving item according to the risk response condition, acquiring corresponding target classification weaknesses, and setting a weaknesses identification label corresponding to the target classification weaknesses.
In step S601, the preset project risk point criteria refer to a set of predetermined guidelines for evaluating the project risk potential criteria according to the project type of the accepted project, the design institute industry specification, and other factors. The purpose is to help a project team quickly and accurately identify and evaluate various risks that may occur in a project, thereby taking corresponding measures to reduce the impact of risks on project goals.
Wherein, if the determined risk key points meet the preset project risk point standard, the risks related to the key points are consistent with the preset project risk point standard. This means that the project team has judged and classified according to preset criteria and has included the key points therein in the risk management category when identifying and evaluating the risk. In order to further effectively identify and manage the risk key points with larger influence, risk monitoring indexes corresponding to the risk key points are determined according to the item characteristics of the accepted items.
The project characteristics refer to characteristics of the project accepted by the design institution, and include factors such as the scale, complexity, industry background, technical requirements and the like of the project, and the uniqueness and special requirements of the project are determined. Item characteristics can affect the type, extent, and probability of occurrence of the risk. The risk monitoring index is used for measuring and monitoring the state and change of the risk of the accepting project, and according to the key points of the risk and the characteristics of the project, the corresponding risk monitoring index can be determined, and the state, the change and the influence degree of the risk can be quantified and measured by the risk monitoring index, so that a project team can recognize, evaluate and respond to the risk problem in time.
In steps S602 to S603, the risk response condition refers to a set of conditions or indexes that trigger the risk response according to the risk monitoring index of the receiving item. For example, when these conditions or metrics meet or exceed a set threshold, the project team will initiate a corresponding risk countermeasure.
And secondly, carrying out risk assessment on the receiving item according to the set risk response conditions. This includes identifying and analyzing the various risks that may occur in the project, assessing its potential impact level and likelihood on the project's objectives. According to the risk assessment result, corresponding target classification weaknesses can be determined, wherein the target classification weaknesses refer to weak links or aspects possibly existing in the situation that the received item faces the risk impact, and can lead to key points that the received item target cannot be achieved or is seriously affected.
Further, a vulnerability identification tag corresponding to the target classification vulnerability is set. Vulnerability identification tags are used to facilitate identifying and tracking vulnerabilities in items, and may be a concise and clear mark or symbol. These tags can be set according to the specific requirements and conventions of the project to ensure the project team's identification and attention to vulnerabilities.
According to the project management method provided by the embodiment, vulnerability assessment is carried out on the risk simulation prediction result, weak links which are easily affected by risks in the project can be revealed, potential risk points and hidden dangers can be identified, reference basis is provided for risk management and decision making, and therefore project risk management effect of a design institute is improved.
In one implementation manner of the present embodiment, as shown in fig. 7, in step S603, performing risk assessment on the receiving item according to the risk response condition, obtaining the corresponding target classification vulnerability, and setting the vulnerability identification label corresponding to the target classification vulnerability, the method further includes the following steps:
s701, identifying a vulnerability identification label and acquiring corresponding vulnerability characteristics;
s702, establishing corresponding risk early warning indexes according to the vulnerability characteristics;
s703, setting a corresponding early warning threshold value and a triggering condition according to the risk early warning index;
s704, combining the early warning threshold value and the triggering condition, and establishing a corresponding risk early warning mechanism.
In steps S701 to S702, the vulnerability identification tag is identified, and the corresponding vulnerability feature is obtained by performing in-depth analysis and identification on the object classification vulnerability during the project risk assessment process, finding out the specific feature or cause of the vulnerability, and associating the specific feature or cause with the vulnerability identification tag.
Wherein, the vulnerability characteristics refer to relevant characteristics or reasons discovered when analyzing and identifying object classification vulnerabilities in project risk assessment. They are the root cause or characteristic of the vulnerability that can help the project team better understand and address the risks posed by the vulnerability.
And secondly, establishing corresponding risk early warning indexes by formulating a set of marked indexes or conditions according to the characteristics of the weaknesses, and using the indexes or conditions for monitoring and early warning risks related to the weaknesses. It should be noted that, establishing corresponding risk early warning indexes, the risk indexes related to the weaknesses can be monitored in real time, and early warning signals can be sent out in time, so that project teams can react and take corresponding measures before the risk occurs. Therefore, the perception capability of a project team on potential risks can be improved, uncertainty caused by the risks is reduced, and the success rate and performance of the project are improved.
In step S703 to step S704, setting the corresponding early warning threshold and the triggering condition according to the established risk early warning indicator refers to determining the specific condition for triggering early warning and the threshold for reaching early warning according to the specific risk indicator and the project requirement when the risk early warning mechanism is set. These conditions and thresholds may be values, indicators, events, etc. for determining critical points of risk and triggering corresponding pre-warning signals.
Secondly, establishing a corresponding risk early warning mechanism refers to establishing a complete risk early warning system and a complete risk early warning process according to the set early warning threshold and the set triggering conditions. When the risk index reaches or exceeds the early warning threshold value and meets the triggering condition, the early warning mechanism automatically sends out an early warning signal to inform relevant personnel or team to carry out corresponding countermeasures.
It should be noted that, the early warning threshold value and the triggering condition are set to find and identify the critical point which may cause risk occurrence in time, so that the project team can take measures to avoid or mitigate the influence of risk in time, and by setting the reasonable early warning threshold value and the triggering condition, the accuracy and timeliness of risk early warning can be improved, and the project team is helped to master the risk situation better; the risk early warning mechanism is established to combine the early warning threshold value and the triggering condition with the actual early warning process and responsible personnel to form a complete risk early warning system, the system can comprise a transmission mode of early warning signals, content of early warning information, countermeasures after early warning triggering and the like, and by establishing the risk early warning mechanism, a project team can timely obtain the risk early warning information and rapidly take corresponding measures to deal with risks so as to ensure smooth progress of projects.
According to the project management method provided by the embodiment, the risk early warning mechanism comprises the transmission, receiving and response processes of early warning signals, timely response and processing of the risk of the received project can be achieved by establishing the risk early warning mechanism, the damage degree of the risk to the received project is reduced, and therefore the project risk management effect of a design institute is improved.
The embodiment of the application discloses a project management system, as shown in fig. 8, including:
the project decomposition module 1 is used for acquiring the bearing project and decomposing the bearing project into corresponding work packages according to a preset project decomposition standard;
the resource docking module 2 is used for determining corresponding project docking resources according to subtask requirements in the work package;
the risk model building module 3 is used for building a corresponding risk identification model by combining subtask demands and project docking resources and outputting a corresponding risk identification model chart;
the risk associated information acquisition module 4 is used for respectively acquiring risk associated information corresponding to each risk factor if a plurality of risk factors exist in the risk identification model chart;
the risk network establishing module 5 is used for combining each risk factor and risk associated information corresponding to the risk factors to form a corresponding risk interaction network;
The dynamics model building module 6 is used for acquiring risk correlation information among all risk factors in the risk interaction network and building a corresponding system dynamics model according to the risk correlation information;
the risk simulation prediction module 7 is used for performing risk simulation prediction according to the system dynamics model and outputting a corresponding risk simulation prediction result;
the vulnerability identification module 8 is used for carrying out vulnerability assessment on the risk simulation prediction result, acquiring corresponding risk key points, and generating vulnerability identification labels corresponding to the accepting items according to the risk key points;
and the risk policy matching module 9 is used for matching corresponding risk coping policies according to the vulnerability identification labels.
By adopting the technical scheme, the accepting items are decomposed into the corresponding work packages according to the preset item decomposition standard by the item decomposition module 1, so that the design institute can manage and allocate resources better, then, the project butt joint resources required by the design court for processing the accepting items are determined by the resource butt joint module 2 according to subtask requirements in the work packages, then, the determined subtask requirements and project butt joint resources are combined, a corresponding risk identification model is established by the risk model establishment module 3 and a corresponding risk identification model chart is output, related risks which possibly appear in the accepting items in the processing process can be identified and simulated more intuitively by the risk identification model chart, if a plurality of risk factors are identified, the risk network establishment module 5 is combined with each risk factor and corresponding risk association information thereof to form a corresponding risk interaction network, the interrelation among the risk factors can be known more comprehensively and specifically by the risk interaction network, further, according to the risk correlation information among the risk factors, a corresponding system dynamics model is established by the dynamics model establishment module 6 and a corresponding risk simulation prediction result is output, the dynamic situation among the risk factors can be identified and the corresponding risk factors can be evaluated, namely, the risk points can be estimated and the important factors can be evaluated according to the risk factors, and the key points are not be estimated, and the key factors are predicted, and the key factors can be estimated. And as the risk identification, evaluation and strategy treatment of the system are carried out on the accepted projects, the project risk management effect of the design institute is improved.
It should be noted that, the project management system provided in the embodiment of the present application further includes each module and/or the corresponding sub-module corresponding to the logic function or the logic step of any one of the above project management methods, so that the same effects as each logic function or logic step are achieved, and detailed descriptions thereof are omitted herein.
The embodiment of the application also discloses a terminal device, which comprises a memory, a processor and computer instructions stored in the memory and capable of running on the processor, wherein when the processor executes the computer instructions, any item management method in the embodiment is adopted.
The terminal device may be a computer device such as a desktop computer, a notebook computer, or a cloud server, and the terminal device includes, but is not limited to, a processor and a memory, for example, the terminal device may further include an input/output device, a network access device, a bus, and the like.
The processor may be a Central Processing Unit (CPU), or of course, according to actual use, other general purpose processors, digital Signal Processors (DSP), application Specific Integrated Circuits (ASIC), ready-made programmable gate arrays (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc., and the general purpose processor may be a microprocessor or any conventional processor, etc., which is not limited in this application.
The memory may be an internal storage unit of the terminal device, for example, a hard disk or a memory of the terminal device, or may be an external storage device of the terminal device, for example, a plug-in hard disk, a Smart Memory Card (SMC), a secure digital card (SD), or a flash memory card (FC) provided on the terminal device, or the like, and may be a combination of the internal storage unit of the terminal device and the external storage device, where the memory is used to store computer instructions and other instructions and data required by the terminal device, and the memory may be used to temporarily store data that has been output or is to be output, which is not limited in this application.
Any one of the project management methods in the embodiments is stored in the memory of the terminal device through the terminal device, and is loaded and executed on the processor of the terminal device, so that the use is convenient.
The embodiment of the application also discloses a computer readable storage medium, and the computer readable storage medium stores computer instructions, wherein when the computer instructions are executed by a processor, any one of the project management methods in the above embodiments is adopted.
The computer instructions may be stored in a computer readable medium, where the computer instructions include computer instruction codes, where the computer instruction codes may be in a source code form, an object code form, an executable file form, or some middleware form, etc., and the computer readable medium includes any entity or device capable of carrying the computer instruction codes, a recording medium, a usb disk, a mobile hard disk, a magnetic disk, an optical disk, a computer memory, a read-only memory (ROM), a Random Access Memory (RAM), an electrical carrier signal, a telecommunication signal, a software distribution medium, etc., where the computer readable medium includes but is not limited to the above components.
Wherein, any one of the project management methods in the above embodiments is stored in the computer readable storage medium through the present computer readable storage medium, and is loaded and executed on a processor, so as to facilitate the storage and application of the above methods.
The foregoing are all preferred embodiments of the present application, and are not intended to limit the scope of the present application in any way, therefore: all equivalent changes in structure, shape and principle of this application should be covered in the protection scope of this application.

Claims (10)

1. A method of project management comprising the steps of:
acquiring a receiving item, and decomposing the receiving item into corresponding work packages according to a preset item decomposition standard;
determining corresponding project butt joint resources according to subtask requirements in the work package;
establishing a corresponding risk identification model by combining the subtask requirements and the project docking resources, and outputting a corresponding risk identification model chart;
if a plurality of risk factors exist in the risk identification model chart, risk associated information corresponding to each risk factor is obtained respectively;
combining the risk factors and risk associated information corresponding to the risk factors to form a corresponding risk interaction network;
Acquiring risk correlation information among the risk factors in the risk interaction network, and establishing a corresponding system dynamics model according to the risk correlation information;
performing risk simulation prediction according to the system dynamics model, and outputting a corresponding risk simulation prediction result;
carrying out vulnerability assessment on the risk simulation prediction result, obtaining corresponding risk key points, and generating a vulnerability identification label corresponding to the receiving item according to the risk key points;
and matching corresponding risk coping strategies according to the vulnerability identification labels.
2. The method according to claim 1, wherein obtaining risk correlation information between each risk factor in the risk interaction network, and establishing a corresponding system dynamics model according to the risk correlation information, comprises the steps of:
judging whether risk correlation exists between the corresponding risk factors according to the risk correlation information;
if the risk correlation does not exist between the risk factors, acquiring a corresponding first risk factor and the risk correlation information corresponding to the first risk factor;
Extracting risk characteristics corresponding to the first risk factors according to the risk correlation information;
and analyzing and processing the risk characteristics according to a preset risk modeling rule, and establishing a risk dynamic model corresponding to the first risk factor as the system dynamics model.
3. The method according to claim 2, further comprising the steps of, after extracting risk features corresponding to the first risk factors from the risk correlation information:
analyzing the risk characteristics according to a preset time sequence analysis rule, obtaining corresponding risk evolution data, and establishing a corresponding risk evolution sub-model according to the risk evolution data;
integrating the risk evolution sub-models, establishing a corresponding risk dynamic parallel model, and outputting independent risk influences corresponding to the receiving items.
4. The method according to claim 2, further comprising the step of, after determining whether there is a risk association between the corresponding risk factors based on the risk correlation information:
if the risk correlation exists between the risk factors, acquiring a corresponding second risk factor and the risk correlation information between the second risk factors;
Converting the second risk factor into a corresponding state variable according to a preset mapping function;
and combining the state variable and the risk correlation information, and establishing the risk dynamic model corresponding to the second risk factor as the system dynamics model.
5. The method according to claim 4, further comprising the steps of, after converting the second risk factor into a corresponding state variable according to a predetermined mapping function:
constructing a corresponding risk association network according to the state variable and the related variable corresponding to the state variable;
performing centrality analysis on the risk associated network according to a preset network analysis rule to obtain corresponding critical nodes and risk associated factors corresponding to the critical nodes;
and combining the critical node and the risk association factors to determine a risk association range corresponding to the acceptance item.
6. The method of claim 1, wherein performing vulnerability assessment on the risk simulation prediction result, obtaining a corresponding risk key point, and generating a vulnerability identification label corresponding to the accepted item according to the risk key point comprises the following steps:
If the risk key points accord with the preset project risk point standard, determining a risk monitoring index corresponding to the risk key points according to the project characteristics of the bearing project;
setting corresponding risk response conditions according to the risk monitoring indexes;
and performing risk assessment on the receiving item according to the risk response condition, acquiring corresponding target classification weaknesses, and setting a weaknesses identification label corresponding to the target classification weaknesses.
7. The method according to claim 6, further comprising, after performing risk assessment on the received item according to the risk response condition, obtaining a corresponding target classification vulnerability, and setting a vulnerability identification tag corresponding to the target classification vulnerability, the steps of:
identifying the vulnerability identification label and acquiring corresponding vulnerability characteristics;
establishing corresponding risk early warning indexes according to the weakness characteristics;
setting a corresponding early warning threshold and triggering conditions according to the risk early warning index;
and combining the early warning threshold value and the triggering condition to establish a corresponding risk early warning mechanism.
8. A project management system, comprising:
The project decomposition module (1) is used for acquiring a receiving project and decomposing the receiving project into corresponding work packages according to a preset project decomposition standard;
the resource docking module (2) is used for determining corresponding project docking resources according to the subtask demands in the work package;
the risk model building module (3) is used for building a corresponding risk identification model by combining the subtask requirements and the project docking resources and outputting a corresponding risk identification model chart;
the risk associated information acquisition module (4) is used for respectively acquiring risk associated information corresponding to each risk factor if a plurality of risk factors exist in the risk identification model chart;
the risk network establishment module (5) is used for combining each risk factor and risk associated information corresponding to the risk factor to form a corresponding risk interaction network;
the dynamics model building module (6) is used for obtaining risk correlation information among the risk factors in the risk interaction network and building a corresponding system dynamics model according to the risk correlation information;
the risk simulation prediction module (7) is used for performing risk simulation prediction according to the system dynamics model and outputting a corresponding risk simulation prediction result;
The vulnerability identification module (8) is used for carrying out vulnerability assessment on the risk simulation prediction result, acquiring corresponding risk key points and generating vulnerability identification labels corresponding to the receiving items according to the risk key points;
and the risk policy matching module (9) is used for matching corresponding risk coping policies according to the vulnerability identification tag.
9. A terminal device comprising a memory and a processor, wherein the memory has stored therein computer instructions executable on the processor, and wherein the processor, when loaded and executing the computer instructions, employs a project management method according to any of claims 1 to 7.
10. A computer readable storage medium having stored therein computer instructions which, when loaded and executed by a processor, employ a method of project management according to any of claims 1 to 7.
CN202311259142.5A 2023-09-26 2023-09-26 Project management method, system, terminal equipment and storage medium Pending CN117314347A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311259142.5A CN117314347A (en) 2023-09-26 2023-09-26 Project management method, system, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311259142.5A CN117314347A (en) 2023-09-26 2023-09-26 Project management method, system, terminal equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117314347A true CN117314347A (en) 2023-12-29

Family

ID=89286088

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311259142.5A Pending CN117314347A (en) 2023-09-26 2023-09-26 Project management method, system, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117314347A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117634855A (en) * 2024-01-26 2024-03-01 山东大学 Project risk decision method, system, equipment and medium based on self-adaptive simulation

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117634855A (en) * 2024-01-26 2024-03-01 山东大学 Project risk decision method, system, equipment and medium based on self-adaptive simulation
CN117634855B (en) * 2024-01-26 2024-05-07 山东大学 Project risk decision method, system, equipment and medium based on self-adaptive simulation

Similar Documents

Publication Publication Date Title
CN110782129B (en) Business progress monitoring method, device and system and computer readable storage medium
Govan et al. The resource-based view on project risk management
US20140149175A1 (en) Financial Risk Analytics for Service Contracts
CN112508723B (en) Financial risk prediction method and device based on automatic preferential modeling and electronic equipment
CN110688536A (en) Label prediction method, device, equipment and storage medium
CN117314347A (en) Project management method, system, terminal equipment and storage medium
Acebes et al. On the project risk baseline: Integrating aleatory uncertainty into project scheduling
US20220327452A1 (en) Method for automatically updating unit cost of inspection by using comparison between inspection time and work time of crowdsourcing-based project for generating artificial intelligence training data
CN117786131A (en) Industrial chain safety monitoring analysis method, medium and equipment
Borgonovo Sensitivity analysis
Nadi et al. Cost-effective optimization strategies and sampling plan for Weibull quantiles under type-II censoring
Erdoğan et al. More effective sprint retrospective with statistical analysis
CN112860672A (en) Method and device for determining label weight
KR20040104853A (en) Risk analysis system for information assets
KR102294948B1 (en) Integrated Risk Management Method and System
US20230385936A1 (en) Information processing device, information processing method, and program
US20100100410A1 (en) Systems and Methods for Ecological Evaluation and Analysis of an Enterprise
Jayatilleke et al. A method of assessing rework for implementing software requirements changes
JP2022032115A (en) Project sign detection apparatus and project sign detection method
Borissova et al. Selection of ERP via cost-benefit analysis under uncertainty conditions
Derakhshandeh et al. New framework for comparing information security risk assessment methodologies
Kuzminykh et al. Information Security Risk Assessment. Encyclopedia 2021, 1, 602–617
Wang et al. Due-date quotation model for manufacturing system scheduling under uncertainty
Victor International Journal of Artificial Intelligence and Machine Learning
KR100992157B1 (en) The method and apparatus for determining security solution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination