Professional Documents
Culture Documents
Sources
Goutam Dutta
Indian Institute of Management
Ahmedabad 380015
India
goutam@iimahd.ernet.in
Many
interactions
C
O
M
P
L
E
X Few
I Interactions
T
Y
2
Variations Foreseeable Unknown
Events Unknowns
Many
interactions
C
O
M Planning
P (with buffers to
L accommodate
E Variations )
X Few CPM
I Interactions PERT
T
Y
3
Variations Foreseeable Unknown
Events Unknowns
Many
interactions
C
O
M Planning Project Risk
P (with buffers to Management
L accommodate Decision tree
E Variations ) Simulations
X Few CPM Risk registers
I Interactions PERT
T CCPM
Y
4
Variations Foreseeable Unknown
Events Unknowns
Outline
• What is Project Risk ?
• What were Project Risk in JVSL ?
5
Outline
• What is Project Risk ?
• Stakeholder’s Analysis
• Techniques for Analyzing Project Risk
• Qualitative Risk Management
6
What is Project Risk ?
• The term risk is used in many ways in everyday language and
in various specialist disciplines.
• Project Risk is an uncertain event or condition that if it occurs
has positive or negative effect on Project’s Objective
7
MANAGING RISK IN PROJECTS
8
Risk=f(p,c)
Risk=f(p,c,q)
9
Risk=f(p,c,q,d)
f=function
p=probability
c=consequence
q=frequency
d=ease of detection
Approaches in Project Risk
Management
• Project Management Institute (PMI)
• Association for Project Management , UK (1997) PRAM Guide
• As/NZS 4630 Risk Management Standards association of
Australia
• IEC 62198 (2001) Project Risk Management Applications
Guidelines
• Office of Government Commerce (OGC) UK (2002)
Management of Risk
• Treasury Board of Canada (2001) integrated Risk Management
Framework
10
11
Alignment of simplified (macrophase) portrayals of the SHAMPU
(Shape, Harness, And Manage Project Uncertainty) process
the basic nine phase middle level (five phase) simplest (three phase)
SHAMPU process portrayal portrayal
define the project clarify the basis of shape the project strategy
analysis
focus the process
14
Project Risk Management Objective
• Enhance the capability of the organization
• Extend the organization’s overall risk management process to
Projects and Apply them in a consistent way
• Enhance the management of the process across the organization
and obtain better project outcome in terms of schedule ,cost ,
operations performance , by reducing risks and capturing
opportunities
15
16
17
Project Risk Management
• Stake holder’s Analysis
• Project Risk Identification
• Project Risk Assessment
• Project Risk response Planning
18
What is the response to uncertainty ?
19
Risk Attitudes
20
©Understanding and managing Risk attitude by D.Hillson &Ruth Murray-Webster .
Initial Risk attitude in a situation
21
.
©Understanding and managing Risk attitude by D.Hillson &Ruth Murray-Webster
Situational risk Attitude
22
©Understanding and managing Risk attitude by D.Hillson &Ruth Murray-Webster .
• Who are the stakeholders in a Government Project Function ?
23
Stakeholders
end users
employees public interest groups
contractors
local government
regulatory agencies
financial institutions 24
project team
Stakeholders in a Procurement Project for a Government Agency
26
Stakeholders in a Procurement Project for a Private Sector Agency
28
Project References
29
Table - Criteria and measure for a small-scale project (case example)
Criteria Notes Measures
Cost The installation and testing must be completed Budget $$, plus 30 hours of internal
within allocated budgets management time
Disruption The disruption to current operations must be Lost processing time less than 40
minimized terminal hours
Functionality The new equipment should have comparable New equipment to pass standard
functionality and operator interfaces Benchmark Tests 1 (100%) and 2
(98%)
Quality The operators and the user agency require Down time less than 5 minutes per
reliable equipment month over the first six months’
operation
Timing The products must be delivered and Phase 1 equipment commissioned by 7
commissioned by the specified date to meet the April; phase 2 by 14 May; system test
purchaser’s business obligations completed by 21 May
Training All staff must be trained on the new equipment All operator conversion training
completed by 3 April
30
Tools and Techniques for
Identifying project risk
1. Brainstorming
2. Examination of local or overseas experience with similar
activities and projects and Post-completion project report and
post-completion audit
3. Checklist
4. Interviews and focus group discussion
5. Scenario analysis
6. Delphi
7. Surveys and questionnaire
8. Work breakdown structure analysis
31
Brainstorming process – list of
participants
• The project manager and the project team;
• Project sponsors and site representatives;
• Discipline engineers;
• Experts with specific knowledge in particular areas of concern, where
there may be insufficient expertise in the project team;
• Commercial specialists;
• Health, safety and environmental specialists;
• People with experience in similar previous or current projects
• Users of the project outcomes;
• Key stakeholders who need to be confident in the project and the project
management process before approvals are granted.
32
Brainstorming
1. Facilitator
2. Team Members
3. Process of brainstorming
33
Brainstorming Process
• The risk element is identified by someone familiar with it, so that
everyone understands what is being considered.
• The team spends a few moments thinking about the possible risks
and noting them on rough paper.
• The member most familiar with the element writes the initial risk list
on the whiteboard, without comments from the other participants.
• The other participants then make their contributions to the list.
Typically, the list may double in size in this step. No judgements
should be made up to this point.
• The team reviews the list, classifying and grouping similar risks
where appropriate, and adding new ones as ideas are generated.
The list can then be simplified if necessary. The aim is usually to
generate a list of about ten risks for each item, although this will
vary widely depending on the element being considered.
• At the end of this process, the idea is to get about 10 risk sources. 34
Experience with similar
projects
• Whenever available, the risk assessment from previous
projects may be an ideal guide. However, information from
previous projects have their own limitations.
• Care must be taken that undue emphasis is not placed on
unusual events that have a high profile for participants
because of their personal involvement.
35
Checklists
• Lists of factors that can affect the risk in a project
• Specify levels of risk thought to be associated with risk source
(Risk Checklists)
36
Risk Checklist 1
38
Risk Check List 3
1) 0-1 None
2)2-10 Low
3)11-30 Medium
4) over 30 High
39
Work Breakdown Structure
1. Risk can be identified through analysis of the work
breakdown structure.
2. Every work package is scrutinized for technical hurdles
and potential problems with management, customers,
suppliers, and equipment and resource availability.
3. Within each work package, processes or end-items are
assessed for internal risks in terms of, e.g., complexity,
maturity, quality, and concurrency or dependency.
4. Each work package is also assessed for external risks,
such as the risk associated with relying on a
subcontractor to perform and manage a work package.
40
Delphi Technique
• The Delphi method (pronounced DEL-fy) is a structured communication
technique, originally developed as a systematic, interactive
forecasting method which relies on a panel of experts.[1]
• In the standard version, the experts answer questionnaires in two or
more rounds. After each round, a facilitator provides an anonymous
summary of the experts’ forecasts from the previous round as well as the
reasons they provided for their judgments. Thus, experts are encouraged
to revise their earlier answers in light of the replies of other members of
their panel. It is believed that during this process the range of the
answers will decrease and the group will converge towards the "correct"
answer. Finally, the process is stopped after a pre-defined stop criterion
(e.g. number of rounds, achievement of consensus, stability of results)
and the mean or median scores of the final rounds determine the
results.[2]
• http://en.wikipedia.org/wiki/Delphi_methodRef :
41
Scenario Analysis
• It is based on the decision theory where you
identify a decision node and event node and draw a
decision tree
42
Alternatives
Project A
Project B
43
Event Nodes
Circles to represent uncertainty
44
Cause and effect Diagram
Also known as Ishikawa diagram
it is an useful tool in quality analysis
45
Ref : sysanal.pbworks.com/f/Cause-and-Effect+Diagram.ppt (next five slides)
46
How do I do it? (continued)
• 3. Draw fishbone diagram
• Place the effect at the head of the “fish”
• Include the 6 recommended categories shown below
People Method Machine
Problem
or Issue
Although they are often designed for statistical analysis of the responses, this is not
always the case. The questionnaire was invented by Sir Francis Galton.[
Questionnaires have advantages over some other types of surveys in that they are
cheap, do not require as much effort from the questioner as verbal or telephone
surveys, and often have standardized answers that make it simple to compile data.
However, such standardized answers may frustrate users.
Questionnaires are also sharply limited by the fact that respondents must be able to
read the questions and respond to them. Thus, for some demographic groups
conducting a survey by questionnaire may not be practical.
As a type of survey, questionnaires also have many of the same problems relating to
50
question construction and wording that exist in other types of opinion polls.
Ref: http://en.wikipedia.org/
Risk Identification
• Risk of failure
• Risk of opportunity
51
Risk Identification
• Acceptable risk depends on the risk tolerance of project
stakeholders & managers
• Risk of failure implies that a project might fall short of
schedule , budget or technical goals by large margin
• Risk of opportunity which are events that could lead to reward
, saving or benefit.
52
Can you identify risks that could lead
to project failure ANYTIME?
53
Identify the risk and Opportunity!!!
54
High risk in projects typically stem
from
• Using an unusual approach
• Attempting to further technology
• Training for new tasks or applying new skills
• Developing & testing of new equipment, system or procedures
56
Sources Of Risk
• Internal Risk
• External risk
57
Internal risk
a) Market Risk
b) Technical Risk
59
Technical Risk
• Risk of not meeting time, cost, or performance requirements
due to technical problems with the end item or project
activities.
• One approach to expressing technical risk is to rate the risk of
project end item or primary process as being high, medium or
low according to following features:
60
Perform Qualitative Risk Analysis
Is the process of prioritizing risks for further analysis or action
by assessing and combining their probability of occurrence
and impact.
• Risk register
• Risk management plan
Outputs
• Risk register updates
Inputs
62
More detailed priority-setting matrix
(5x5)
Consequences
Likelihood Insignifican Minor Moderat Major Catastrophic
t e
Almost Medium Medium High High High
certain
Likely Low Medium Medium High High
Possible Low Medium Medium Medium High
Unlikely Low Low Medium Medium High
Rare Low Low Low Medium Medium
63
Consequence scale for a repetitive procurement
Rating Consequence description
A Catastrophic Extreme event, potential for large financial costs or
delays, or damage to the organization’s reputation
B Major Critical event, potential for major costs or delays, or
inappropriate products
C Moderate Large impact, but can be managed with effort using
standard procedures
D Minor Impact minor with routine management procedures
E Insignificant Impact may be safely ignored
64
Ratings Likelihood description
The potential for problems to occur and lead to the assessed consequences
Category Frequency Probability Explanation
A Almost Very high, may occur at least several Over 0.8 A similar outcome has arisen
certain times per year several times per year in the
same location, operation or
activity
B Likely High, may arise about once per year 0.5-0.8 A similar outcome has arisen
several times per year in this
organization
C Possible Possible, may arise at least once in a 0.1-0.5 A similar outcome has arisen at
1-10-year period some time previously in this
organization
D Unlikely Not impossible, likely to occur during 0.02-0.1 A similar outcome has arisen at
the next 10 to 40 years some time previously in a
similar organization
E Rare Very low, very unlikely during the Less than 0.02 A similar outcome has arisen in
next 40 years the world-wide industry, but65
not in this organization
Extended Likelihood Ratings
Lev Descripto Description Frequency Probability
el r
A Almost Very high, may occur at least once 1 per year 0.8-1
certain per year
B Likely Likely to arise at least once in a 1- 1 per 5 years 0.2-0.8
5 year period
C Possible Possible, may arise at least once 1 per 10 0.1-0.2
in a 1-10-year period years
D Unlikely Not impossible, could occur at 1 per 25 0.04-0.1
some time during the life of the years
facility
E Very May occur only in exceptional 1 per 100 0.01-0.04
Unlikely circumstances years
F Rare 1 per 1000 0.001-0.01
66
years
G Very rare 1 per 10,000 0.0001-
years 0.001
Analysis of Opportunity and Risk
67
68
69
Combined Opportunity and Risk Analysis matrix
Insignificant
Insignificant
Outstanding
Moderate
Moderate
Minor
Minor
Major
Major
-A -B -C -D -E Likelihood +E +D +C +B +A
-E -E -H -H -M A M H H E E
Almost certain
-E -H -H -M -M B M M H H E
Likely
-E -H -H -M -L C L M H H E
Possible
-H -M -M -L -L D L L M M H
Unlikely
-H -M -M -L -L E L L M M H
Rare
70
Table Approximate alignment of SHAMPU and the PMBOK (Project
Management Book Of Knowledge) Guide
nine phases PMBOK Guide phases (major
processes)
define the project Risk Management Planning
focus the process
Risk identification
identify the issues Qualitative Risk Analysis
structure the issues Quantitative Risk Analysis
clarify ownership
estimate variability
evaluate implications Risk Response Planning
0.9 Almost Other more substantial New CSCI within the software
74
Certain maturity risk environments
Table : Complexity factors
Measure Hardware Maturity Software maturity
0.1 Rare Simple or existing design Simple or existing
design
0.3 Unlikely Minor increase in Minor increase in
complexity complexity
0.5 Possible Moderate increase in Moderate increase in
Complexity Complexity
0.7 Likely Significant increase in Significant increase in
complexity complexity
0.8 Highly likely Extremely complex new Highly complex new
design design, very large
database, complex
database executive
0.9 Almost Other more substantial Other more
Certain Complexity risk substantial 75
Complexity risk
Table : Integration and Interfacing factors
Measure Integration and Interfacing Dependency
0.1 Rare None required Independent of existing system,
facility and associate contractor
0.3 Unlikely Minor Integration and Interfacing Schedule dependent on existing
required system schedule, facility and
associate contractor
0.5 Possible Major Integration and Interfacing Performance dependent on
required, but done before EXISTING system schedule, facility
and associate contractor
0.7 Likely Major Integration and Interfacing Schedule dependent on NEW
required, but never done before system schedule, facility and
associate contractor
0.8 Highly likely Major Integration and Interfacing Performance dependent on NEW
required, R&D effort is required system schedule, facility and
associate contractor
0.9 Almost Other more substantial integration and Other more substantial
Certain integration and Interfacing Risk dependency risk
76
Table : Commercial Risk and Management Process Factors
Measure Commercial Risk Management Process
0.1 Rare No subcontracting Existing Management Process
adequate
0.3 Unlikely Minor subcontracting of non Minor modifications needed
critical items to existing management
systems and procedures
0.5 Possible Minor subcontracting of Major modifications needed
critical items to existing management
systems and procedures
0.7 Likely Significant subcontracting Sophisticated management
accredited to subcontractor, system required
not single source
0.8 Highly Single source accredited New or complex management
likely supplier of critical elements system required to be
77
developed
0.9 Almost Other more substantial Other more substantial
Certain commercial risk Process l risk
Table : Cost Increase, Schedule Delay and Performance Degradation
Measure Cost factor Schedule factor Performance factor
0.1 Insignificant Budget estimates not Negligible impact, slight Minimal or
exceeded, some transfer schedule change unimportant
of money compensated by performance impact
available schedule slack
0.3 Low Project Cost estimates Minor slip in schedule Small reduction in
exceed budget by 1-5% less than 1 month performance
0.5 Moderate Project Cost estimates Small slip in schedule Some reduction in
exceed budget by 5-10% less than 1-3 month performance
0.7 Very high Project Cost estimates Project schedule slip Significant reduction
exceed budget by 10-20% from 3 to 6 months. in performance
0.9 Catastrophic Project Cost estimates Large Project schedule Key performance
exceed budget by more slip, key milestones not criteria not achieved
than 20% achieved
78
79
Simplifying the Risk Management
Process
• A simple risk Management Process may classify all the risk as
• Type 1 (Low to Medium) ,
• Type 2 (medium to high ) or
• Type 3 (high)
• High risk requires that a risk co ordinator may be appointed
80
Project Risk Characteristics
Type 1 Type 2 Type 3
Perceived Low to Medium Medium to High High
Level of Risk
Contract Value < 150000 $ < 5 million Over 5 million
Time Frame 3 months <12 months Over 12 months
Scope Simple to moderate Moderate to Complex
Complex
Potential Impact on Little or no Quality or Potential for some Potential for
Project Quality and Production Impact quality or production significant quality or
Production impact production impact
Potential Health, Little or No HSE Potential for Some Potential for
safety and impact HSE Impact significant HSE
Environmental impact
(HSE)Impact
Potential Commercial Little or no Potential for some Potential for
Impact Commercial impact Commercial Impact significant
Commercial impact
Number of Parties Few Several Many
Commercial Structure Standard Terms of Standard Terms but Unique Contract 81
engagement amended by special Conditions
conditions
Case Example : Single point
Mooring
• This case example concerns the tender evaluation in which a very
simple consideration of risks was a primary determinant of preferred
tender for the overhaul of single point mooring (SPM) . In particular, it
demonstrates that quick risk review can provide an useful information
without a large effort and this can add significant value to business
decision
• The single point mooring is device in loading crude oil onto tankers.
There are many SPM designs varying in size and complexity according to
oil volume requirements for tanker loading, the depth of water and
weather. A single point mooring system consists of
• A floating steel structure , moored to the sea bed
• Under-buoy hose connections to on shore oil tanks
• Connections to floating flexible hoses for tanker loading
• Pumps, valves, measuring devices and control system on and insider the
SPM structure
83
Ref : http://www.mitchamindustries.com
Summary of Tenders
Three quotations were submitted, but one was rejected a pre qualification
84
stage
*Tender B was marginally cheaper (0.5%) than tender A
Benefits of selecting Tender A
Benefit Implications
Duration of the With the stand buy buoy and its restricted flow rates, loading is
work shorter by expected to take 29 hours. Demurrage is payable if loading extends
10 days beyond 30 hours. Delays are unlikely with careful management of
loading operations
However, if there is a delay it will be costly for the owner. The extended
use of a stand-by buoy increases this risk.
Faster This provides more flexibility and better planning with less risk to
mobilization loading schedule
More More experienced personnel will do a better job. This is particularly
Experienced important when refurbishing some of the control equipment in the SPM,
personnel which requires careful handing
Dry Rock instead Tender A will use a dry rock for overhaul, while Tender B will use a crane.
of cranes Dry rock will impose less structural stress on the buoy, providing better 85
life extension
Ref : (Dale Coopers et al, 2005)
Risk Matrix
Pls give the no. of residual risks in the appropriate boxes
Probability
A -Most Likely
1.00>P>0.75
B -Likely
0.75>P>0.50
C -Occasional
0.50>P>0.25
D -Unlikely
0.25>P>0.10
E -Remote
0.10>P>0.00
Critical
Severity: As a % age of Project Value
High
86
Medium
Low
Example risk summary sheet for a simplified risk assessment process
Key elements and issues No. Risks Controls C L Initial Agreed Actions and
priority priority responsibility
Regulatory regime
Business objectives
Commercial
Political and community
Contractual and legal
Safety
Industrial relations and
human resources
Capital requirements
Resources
Timing and schedule
Technical and performance
Customers
Suppliers
Infrastructure
Assets
Monitoring and
management systems
Finance and administration 87
Others
...
Pipeline failure scenarios
Scenario Description
1. Natural disaster A landslip or earthquake that breaks the pipeline across its full
diameter. The water would generate a mudslide that impacts on the
village, kills many people, destroys many homes and received national
and possibly international press coverage.
2. Accidental digging into the A large leak due to mechanical impact. The water would generate a
pipeline mudslide that impacts on the village, kills many people, destroys
many homes and receives national and possibly international press
coverage.
3. Purposeful attempt to tap into The effect would be a hole in the pipeline (estimated as a 25-50 mm
the pipeline to obtain water hole near the top of the pipe) and the likely death of the person
tapping into the pipe. The lead would have to continue for an hour or
more to cause any flooding damage, but it would be very obvious (a
fountain). There would be no other fatalities.
4. Pipeline failure due to poor A failure when the pipeline is fully pressurized with water, with a
installation and testing break in the worst case up to the full diameter of the pipe. This would
cause a flood and mudslide into the village with the potential for
multiple fatalities.
88
Contributing factors to pipeline failure
Scenario Contributing factors
1. Natural Earthquakes have occurred in the region, but none have involved faulting and shear
disaster forces capable of breaking a pipeline.
A major earthquake of this magnitude would cause a great deal of damage of which the
pipeline rupture would be a relatively minor part.
The frequency of this was estimated as less than once per 1,000 years, a very rare event.
2. Accidental The only excavators in the village belong to contractors, most of whom have a working
damage relationship with the company and are therefore highly likely to know of the line.
There will be a maintenance access road beside the line. It will be used for regular
inspections.
There will be signage along the route indicating the pipeline location.
The villagers do and will know of the existence of the line.
The local authority has a strict permitting system for the kind of work that might dig
into the line. The process would involve consideration of the pipeline.
A second pipeline may be installed in the future, and this would most likely run in the
same easement. It is conceivable that the installation contractor for the new line could
accidentally dig into the operating water line.
3. Wilful It is most unlikely that an attempt would be made to tap the pipeline in the open above
damage the village. It is more likely to occur in a concealed location, such as in the valley and
therefore with a lower risk of a significant impact on the village. 89
4. Poor Poor pipeline installation and testing procedures without precautions would contribute
installation to this.
Pipeline scenario risk assessment
Scenario Consequences Likelihoo Level of
d risk
1. Natural Catastrophic (multiple Rare Medium
disaster fatalities and large scale
damage)
2. Accidental Catastrophic (multiple Unlikely High
damage fatalities and large scale
damage)
3. Wilful damage Major (single fatality and Possible High
significant damage)
4. Poor Catastrophic (multiple Unlikely High
installation fatalities and large scale
damage)
90
Consequence scale for the water pipeline
Rating Potential impact on the criteria
91
E Insignificant Very small impact, rectified by normal processes,
includes very minor injuries
Likelihood rating for the water pipeline
Rating Interpretation
A Almost Very high probability of occurrence, could occur
certain several times during a year
96
Expected Cost Computation
99
Risk Priority
• Projects are subject to numerous risks yet only a few are
important enough to merit attention.
• Once the risk consequences for a project have been
computed, they are rank- ordered & those with moderate to
high consequence are given a second look
100
Drawback with specifying risk priority
using expected value of risk consequence
(likelihood* impact)
Low likelihood risks are sometimes ignored even when they may have
potentially severe, even catastrophic impact
For eg. The nuclear meltdown at Chernobyl was a result of six errors
in human action, the likelihood of which was very small, but they
did happen.
101
Contd:
Result
• Several dozen deaths
• Several hundred hospitalizations
• 135,000 evacuations
• Long term Impact, an estimated 5,000 to 24,000 additional
cancer deaths in the former Soviet Union and more
throughout Europe and Asia.
102
Lesson
Any risk with severe impact should be carefully considered, no matter
how small the likelihood
103
Risk Response Planning
• Transfer the risk
• Avoid risk
• Reduce risk
• Contingency planning
• Accept risk
104
Transfer The Risk
Risk can be transferred partly or fully from the customer to
contractor or vice versa, using contractual, incentives,
warranties or penalties attached to project performance, cost
schedule measures
105
Transfer the Risk
• Impossible to entirely transfer risk
• Transfer of risk is usually a transfer of authority
• Transfer of one kind of risk usually means inheriting another
kind of risk
106
Avoid Risk
109
How can you minimize system complexity?
110
Contingency Planning
In contingency planning you
• Identify the risks, anticipate whatever might happen
• Prepare a detailed plan of action to cope with it
• Multiple contingency plans can be developed based upon
“What if” analyses of possible outcomes for multiple risk
111
Contingency Action
• Post-hoc remedial action to compensate for the risk impact
• Action taken in parallel to the original plan
• Preventive risk symptoms to mitigate the risk impact
112
Accept [Do Nothing]
This response would not be chosen for risks where the impacts
or consequences are potentially severe
113
RISK MANAGEMENT
PRINCIPLES
114
Risk management plan
115
Risk Profile
The risk profile for each risk include
• Likelihood
• Cost & schedule impact
• Contingencies to be invoked
• Specify the earliest visible symptoms that indicate the risk
materializing
• High-risk areas should be visible & have lots of eyes watching
closely
• Contingency plans should be kept up –to-date & reflect project
progress & emerging risks
116
Risk officer
117
Risk reserve
119
Communication channels
• Establish communication channels within the project team to
ensure that bad news quickly gets to project manager.
120
Project Documentation
Specify procedures to ensure accurate
comprehensive project documentation
• Documentation includes proposals , detailed
project plans, change requests, summary reports,
& post completion summaries.
• In general, the better the documentation of past
projects, the more information available for
planning future , similar projects ,estimating
necessary time & resources & identifying possible
risks & associated outcomes.
121
Expect the Unexpected
• Risk management might lead to believe that everything that
could possibly go wrong has been anticipated and covered.
• Although its true that most risks can be covered in risk
planning, it is rare that all of them can.
• Thus it better to expect the unexpected for coping with risk
than preparing extensive plans and believing that the
unexpected has been eliminated.
122
Risk management Caveats
123
Risk Management Caveats
• Risk management itself can create risks
• Misunderstanding or misapplication of concepts
associated with risk management can stymie a
project and actually leave the project personnel
worse prepared to deal with emerging problems
• Project managers and supporters might be
emboldened to take risks they might not take
otherwise
124
Contd:
Contd:
125
Appropriate risk management approach
particularly for development projects is not to try
to avoid or eliminate risk altogether but to
accommodate and mitigate risk by reducing the
cost of failure.
126
Risk Analysis Methods
• Expected values
• Decision tree
• Uncertainty & payoff table
• Simulation
127
A project has eight work packages,and for each
baseline cost estimate(BCE),risk likelihood,and
corrective cost have been estimated.What is the
expected project completion cost(EC)?
128
PROJECT NETWORK ACCOUNTING FOR
RISK TIME
6.2 ASSEMBLY
& TEST 4.3 PURCHASE
& DELIVERY
4.3 V 1.3
PURCHASE USER
Y 1.3
DELIVERY TEST
SYSTEM
m
M
TEST X
J W
6.2
SYSTEM
DESIGN
L
Q
2.3
SOFTWARE 8.1
SPECIFICATION PURCHASE
&DELIVERY
131
EC=BCE+[CORRECTIVE COST+LIKELIHOOD]
WBS LIKELI
ELEMENT BCE CC HOOD EC
J $10,000 $2,000 0.2 10400
M 8000 1000 0.3 8300
V 16,000 4000 0.1 16400
Y 10,000 6000 0.2 1200
L 8000 2000 0.3 8600
Q 9000 2000 0.1 9200
W 5000 1000 0.3 5300
X 5000 1500 0.3 5750
Total 71000 75150
132
Assignment Questions
The network for the Large Hydro
Project is shown
5
3 7
T U
S
9 Dummy
8
L
3 6
V J Dummy
C
4
R
133
The following table gives BCE & BTE ,estimates of
the cost & time to correct for failure , & likelihood of
failure for each work package in Hydro Project.
J 6 1 0.2 6.2
M 4 1 0.3 4.3
V 6 2 0.1 6.2
Y 8 3 0.2 8.6
L 2 1 0.3 2.3
Q 8 1 0.1 8.1
W 1 1 0.3 1.3 134
X 1 1 0.3 1.3
For the same eight work –package project,assume the
base line time(BTE),risk likelihood & corrective time
have been estimated for each work package. What is
expected project completion time(ET)
135
Computation of Risk in Time and Cost
136
Project Risk Management
Eliminate Risks
List Critical
Risks
Reduce
Add Additional Update
Plan for Identify Probability / Impact
Risks Project Plan
Risks Risks of the Risks
to the Watch-List
Keep
Non-Critical Identify Develop
Risks Accept Risks Residual Contingency
in the Watch-List Risks Plans
137
““
138