# Decision Trees: A Common PMP Risk Analysis Tool

Home > Blogs > PMP Project Management > Decision Trees: A Common PMP Risk Analysis Tool

## Decision Trees: A Common PMP Risk Analysis Tool

0

With the release of the Project Management Body of Knowledge (5th Edition), several knowledge areas are expanding.  PMBOK (4th Edition) expanded the Risk Management Knowledge area by acknowledging the value of both insurable and business related risk.  Business related risk introduces the probability of enhanced value due to opportunistic risk outcomes.  Within the arena of business administration, practitioners regularly conduct a S.W.O.T analysis.  Strength – Weakness – Opportunity –Threat.  Strength and Weakness are internally sourced, while Opportunity and Threat occur due to external sources.  Historically, managers mis-perceive that it is easier to avoid or mitigate negative risk than it is to enhance or exploit opportunistic risk.   With a simple understanding of risk tools, it is quite simple to assess both positive and negative risk.   PMBOK (5th edition), and the growing popularity of the PMI-RMP credential, are expanding emphasis on risk management tools.

One of the most powerful tools for determining net outcomes from both positive and negative risk events is the decision tree.  For any set of outcomes, the total probability is 100% or 1.0.  If you can determine the probability for a subset of the possible outcomes, all alternate outcomes must complete 100% of the outcomes.  For instance, if you can determine that outcome A will happen 40% of the time, and outcome B will happen 20% of the time, then all other outcomes must occur 40% of the time in aggregate.

40% + 20% = 60%   and 100% – 60% = 40%.

A simple way to visualize the alternatives is a decision tree.

To determine the total impact, use the Expected Monetary Value for each branch of the decision tree.  Expected Monetary Value is probability times impact.  EMV = P * I.

Probability is just the percent likellhood that the event will occur.  Impact is the monetary loss or gain should the event occur.  Calculate the EMV for each branch, and add the results.  It quickly becomes obvious whether the aggregate outcome, without influencing the results, will be positive or negative.  Then an effective project manager can determine whether better results might be achieved by applying resources to reduce negative outcomes or increase positive outcomes.

The creation of a decision tree is not a difficult task.  My students regularly ask for tools that might be used to create simple decision tree models.

Given just a little research, I was able to find several tools and websites with free or low cost models that might help both beginning project managers and more experienced risk managers to develop their decision tree skills.

Decisions Trees by Mindtools

An article with pointers to MindTools apps

Web Based interactive Decision Tree tool

TreeAge Tools

DTReg – Decisions

SmartDraw

Methods for Statistical Analysis

If you find additional decision tree tools with a low price tag or straight forward instructions, I would love to hear about them so that we can share them with future students.

Have an opportunistic year!

Enjoy!
Steven Fullmer
Interface Technical Training Staff Instructor

## Videos You May Like

### Agile Methodology in Project Management

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

### Creating Users and Managing Passwords in Microsoft Office 365

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365

### Detailed Forensic Investigation of Malware Infections – April 21, 2015

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015