Font Size: a A A

XK Mining Group Informationization Project Risk Management Research

Posted on:2017-03-31Degree:MasterType:Thesis
Country:ChinaCandidate:B DongFull Text:PDF
GTID:2309330488952038Subject:Business administration
Abstract/Summary:PDF Full Text Request
As one of the important ways to improve the efficiency of the enterprise, information construction has been paid more and more attention. Information construction can greatly improve coal enterpriseā€™s production safety management level and all aspects of management efficiency and effectiveness. It can also help countries strengthen the comprehensive monitoring and administration of coal enterprise so as to promote the sustainable development of enterprises. However, most enterprises do not have a deep understanding of the connotation of information technology, and have little knowledge of management and control methodsto master information technology. Enterprises also ignore the possible risks in the process of identification, assessment, control, and summarize, causing great losses to themselves. Therefore, carrying on a rational planning and control of risk management is particularly important.Based on the study of XK miningenterprise, the risk management process will be divided into three phase:risk identification, risk assessment, risk control. First of all, through surfing enterpriseā€™s official website, field visits, expert investigation and survey method, questionnairesand other methods to understand the enterpriseā€™s actual situation and characteristics ofinformation construction. So various types of risk factors affecting the enterprise will be gottenand classifiedaccording to its nature. There are technical risk, management risk, financial risk, business processes risk and external environment risk, and each is analyzed in detail. Then, analytic hierarchy process (AHP) is used to analyze risks. In the process of research, general objective, sub-targetobjectiveand standard layer are established and judgment matrixbetween different levelsis set up.Considering the evaluation and AHP, system matching integration risk, reengineering, little attention of leaders, budget and staff abnormal loss risk should give more attention. Next, advices are control methods are presented. Finally, summarizingis done.
Keywords/Search Tags:information technology project, risk identification, risk assessment risk control
PDF Full Text Request
Related items