Professional Documents
Culture Documents
1
Outline
• Definition
• Several Risk Identification
Framework / Concept
• Example of Risk Identification
2
Risk Identification
This is the first stage of the risk management process and this is an
important phase because if a risk is not identified, it might not be
analysed and managed in the next steps
3
AS/NZS Risk Identification
4
Information for Identifying Risk
• Local or overseas experience
• Expert judgment
• Structured interviews
• SWOT Analysis
• Insurance claim reports
• Post event reports
• Result and report from audits, inspections and site
visits.
• Surveys and questionnaires
• Checklists
• Historical records, incident databases (or previous
risk register if they exist).
5
Approaches/Techniques for Identifying Risk
1. Documentation Reviews
2. Information Gathering Technique:
a. Brainstorming
b. Delphi Technique
c. Interviewing
3. Checklist Analysis
4. Diagramming Technique
6
Documentation review
According to survey, It is found that most of the respondents
used document review from many different sources for
identifying risks (Bajaj et al.,1997), .
This is usually the first action taken by the project teams to
establish a structured review of project plans.
It may involve review of previous project files and/or
published information.
It is better to identify risk from historical project information
and previous experiences.
7
Brainstorming
This is a process by which every participant in a panel generates ideas
about project risk.
It aims to elicit a specific list of risks that may have an effect on project
performance (PMI, 2000).
8
Delphi Technique
This is a method of using experts to reach a consensus on identifying project risk (PMI,
2000).
The technique uses two different groups, namely a group of experts and a group of
people who are participants in the project (Chapman, 1998).
After discussing within the experts, finally, a consensus is gained by the group of experts.
Unlike brainstorming, the participants may make less contribution to the process.
However, because of using project risk experts, it can help reduce bias on the
consensus.
9
Interviewing
This method has been successfully used for identifying potential risks (Carter
and Centre,1996)
Discussion material should be prepared in advance to ensure that the expert
focuses on the area concerned and does not stray to his pet themes.
By interviewing experienced project managers and experts, risks can be
identified (PMI, 2000).
The risks may be obtained from their experiences, from published
information or from any other sources that they consider helpful.
This technique might give some advantages over brainstorming, however, it
is costly and time-consuming.
10
Checklists Analysis
These are ways of identifying risk that can be obtained from
previous similar project files, published information and other
related resources.
They are a simple and quick method to identify the risks, but
the risks identified may not be exhaustive (PMI, 2000; Carter
and Centre, 1996).
Should be reviewed during project closure to improve it for
use on future project.
11
4. Diagramming Technique
• Cause and Effect Diagram
• System or Process Flowcharts
• Influence Diagram
12
Cause and Effect Diagram
(Fishbone Diagram)
It may help to identify causes of risks by using a fishbone diagram which
illustrates the roots of potential risks (PMI, 2000).
Several steps are required to develop a fishbone diagram (Pike and
Barnes, 1994).
First of all, a problem being investigated is placed at the head of the
fishbone.
Then, suitable generic major factors causing the problem are determined
using brainstorming and are placed at bones of the fish.
Next, each acceptable cause idea is listed under the major factors. All of
them should be carefully and clearly recorded.
Finally, a lot of information about factors causing the problem can be
placed in the bones based on their sources.
13
Cause and Effect Diagram (Cont’d)
14
Another Example of Fishbone Diagram
15
System or Process Flowchart
• Help to analyze how problem occur.
• Show activities, decision points, and the order of processing
16
Influence Diagram
Graphical representations of situations showing causal influences,
time ordering of events, and other relationships among variables
and outcomes.
17
Influence Diagram (Con’t)
18
Risk Identification Output
The output of the risk identification process is
Risk register (see example), which consist of:
a. List of identified risks → including root causes and
uncertain project assumption.
b. List of potential responses → may be identified
during risk identification process.
c. Root causes of risks → fundamental condition or
event that may give rise to the identified risk
d. Updated risk categories → amendment based on
the risk identification process.
19
Risk Register Example
20
Risk Register Example
IDENTIFIKASI RISIKO
1
1.1
1.2
….
….
2
21
Example of Risk Identification
22
Risk Identification Phase
According to CRMS
23
Flowchart of Risk Identification Phase
24
Risk Events/Consequence Scenario
25
Risk Mapping
It is a preliminary assessment of significant risks have been identified
26
Example of Risk Mapping
27
Example of Risk Mapping (Cont’d)
28
Example of Significant Risk after Risk Mapping
29
Logical Classification Scheme
30
The six classification risk
(Al-Bahar and Crandall, 1990; Mustafa and Al-Bahar, 1991)
32
Other Examples of Risk Identification
33
Hierarchy Risk Breakdown structure
(Tah and Carr,(2000)
Classification of International construction risk
(Hastak and Shaked, 2000)