You are on page 1of 16



Chapter VI
Building IT Risk Management
Approaches:
An Action Research Method

Jakob Holden Iversen


University of Wisconsin Oshkosh, USA

Lars Mathiassen
Georgia State University, USA

Peter Axel Nielsen


Aalborg University, Denmark

absTracT InTroDucTIon

This chapter shows how action research can help Organizations that manage IT innovations have
practitioners develop IT risk management ap- long been accused of having poor project execution
proaches that are tailored to their organization and and low product quality. These problems are often
the specific issues they face. Based on literature referred to as “The Software Crisis,” in which
and practical experience, the authors present software projects frequently are delivered late,
a method for developing risk management ap- over budget, with missing features, and with poor
proaches to use in real-world innovation projects. quality. Furthermore, it has been very difficult
The chapter illustrates the method by presenting to predict which organization would do a good
the results of developing a risk management ap- job on any given project. These issues led to the
proach for software process improvement projects establishment of the software process improve-
in a software organization. ment (SPI) movement, in which poor processes
in organizations are considered a major reason
for the software crisis.

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Building IT Risk Management Approaches

Organizations routinely rely on experienced a portfolio of IT risk management approaches


developers to deliver high quality IT systems. that cover many types of activities, organizations
However, in the 1990s, organizations realized that often face situations in which they need to develop
by defining and improving the processes these a risk management approach that is tailored to
professionals used, it was possible to deliver more their particular needs or that addresses issues not
consistent results with better quality. SPI projects covered by the available portfolio of documented
were established to improve specific aspects of risk management approaches. This chapter offers
a process, and in many cases to take advantage organizations a generic method to develop new
of standards like the Capability Maturity Model and dedicated IT risk management approaches.
(CMM) (Paulk et al., 1993) and the Capability The method is based on action research into an
Maturity Model Integration (CMMI) (Chrissis et organization’s specific risk management context
al., 2003). For each process that needed improve- and needs, and builds on the available literature
ment, a focused SPI project would design and about IT risk management. It is based on our
implement specific improvements into current experiences from developing the tailored ap-
practices. proach to risk management in SPI projects at
However, not only is this hard work, it also is Danske Bank.
risky business. Much can go wrong in improve-
ment projects, and mistakes can eventually lead
to failure. The involved improvement actors might rIsk manaGemenT lITeraTure
not possess appropriate skills and experiences.
The design of a new process might not suit the A number of different approaches to IT risk
organization or effectively meet requirements. management have been proposed. In this sec-
The improvement project might be organized tion, we provide an overview and categorization
inappropriately, with unrealistic schedules or of the different approaches (risk list, risk-action
insufficient management attention. Also, the ac- list, risk-strategy model, risk-strategy analysis).
tors might pay too little attention to customers, We offer, in this way, a framework to help select
failing to consider the interests, problems, and an appropriate risk approach suited to particular
motivations of the people and groups that are organizational contexts and needs. An overview
expected to use the new process. of the framework is shown in Table 1.
To deal proactively with such issues in SPI
projects, the involved actors must manage the risk list
involved risks. The need for such risk management
was the rationale behind Danske Bank’s develop- The first and simplest form of available approaches
ment of a practical risk management approach to are risk lists. They contain generic risk items (often
reduce failures in their SPI initiative. Using this prioritized) to help managers focus on possible
approach, improvement actors periodically held sources of risk; they do not contain information
disciplined and tightly structured workshops in about appropriate resolution actions. These lists
collaboration with SPI facilitators. The workshops are easy to use in assessing risks; they are easy
gave each team a better overview and understand- to build, drawing upon published sources on risks
ing of their project and its organizational context, or experiences within a particular context; and
and helped them address risks proactively. they are easy to modify to meet conditions in a
Organizations face many different and quite particular organization or as new knowledge is
diverse activities in which there are strong reasons captured. While these approaches offer strong
to manage IT risks. While the literature provides support to help managers appreciate risks, they


Building IT Risk Management Approaches

Table 1. Four types of approaches to IT risk management

Type of Characteristics Assessment E xemplars


Approach
Risk list A list of prioritized risk items + Easy to use (Barki et al., 1993; Keil et
+ Easy to build al., 1998; Moynihan, 1996;
+ Easy to modify Ropponen & Lyytinen,
+ Risk appreciation 2000)
- Risk resolution
- Strategic oversight
Risk-action A list of prioritized risk items + Easy to use (Alter & Ginzberg, 1978;
list with related resolution actions + Easy to build Boehm, 1991; Jones, 1994;
+ Easy to modify Ould, 1999)
+ Risk appreciation
+ Risk resolution
- Strategic oversight
Risk-strategy A contingency model that + Easy to use (Donaldson & Siegel, 2001;
model relates aggregate risk items to - Easy to build Keil et al., 1998; McFarlan,
aggregate resolution actions - Easy to modify 1981)
+ Risk appreciation
+ Risk resolution
+ Strategic oversight
Risk-strategy A stepwise process that links a - Easy to use (Davis, 1982; Mathiassen et
analysis detailed understanding of risks - Easy to build al., 2000)
to an overall risk management + Easy to modify
strategy + Risk appreciation
+ Risk resolution
+ Strategic oversight

do not support identification of relevant resolu- risk-action list


tion actions and they do not provide a strategic
oversight of the risk profile and relevant strategies The second, slightly more elaborate, form of
for action. Based on previous research, Barki et approaches are risk-action lists. They contain
al. (1993) offer a detailed and precise definition, generic risk items (often prioritized), each with
a measure of software development risk, and a one or more related risk resolution actions. They
systematic assessment of the reliability and valid- also are easy to use; they are quite easy to build,
ity of the instrument. Moynihan (1996) presents but compared to risk lists, they require additional
a comprehensive list of risk items based on how knowledge of the potential effects of different
software project managers construe new projects types of actions; finally, they are easy to modify
and their contexts. Keil et al. (1998) offer a list of when needed. Risk-action lists offer the same
nearly a dozen risk factors that IT project manag- support as the risk lists to appreciate risks. In
ers in different parts of the world rated high in addition, they adopt a simple heuristic to identify
terms of their importance. Ropponen and Lyytinen possible relevant actions that might help resolve
(2000) report six aggregate risk components, for specific risks. However, by focusing on isolated
example, scheduling and timing risks, that expe- pairs of risk items and resolution actions, they do
rienced IT project managers found important in not lead to a comprehensive strategy for address-
a recent survey. ing the risk profile as a whole. Alter and Ginzberg
(1978) list eight risk items related to IT system
implementation, for example, unpredictable im-


Building IT Risk Management Approaches

pact; and they offer four to nine actions for each The best known of these approaches is
risk, for example, use prototypes. Boehm (1991) McFarlan’s (1981) portfolio model linking three
offers a top-ten list of software development risks, aggregate risk items (project size, experience
with three to seven actions per risk. Jones (1994) with technology, and project structure) to four
presents specialized risk profiles for different aggregate resolution actions (external integra-
types of IT projects, together with advice on how tion, internal integration, formal planning, and
to prevent and control each risk. Finally, Ould formal control). Keil et al. (1998) present a model
(1999) suggests maintaining a project risk register that combines the perceived importance of risks
for identified risks, assessment of the risks, and with the perceived level of control over risks. The
risk resolution actions to address them. model suggests four different scenarios (customer
mandate, scope and requirements, execution,
risk-strategy model and environment) with distinct risk profiles and
action strategies. Donaldson and Siegel (2001)
The third form of approaches are risk-strat- offer a model categorizing projects into a high,
egy models. These contingency models relate medium, or low risk profile. They suggest a
a project’s risk profile to an overall strategy for different resource distribution between project
addressing it. They combine comprehensive lists management, system development, and quality
of risk items and resolution actions with abstract assurance, depending on a project’s risk profile.
categories of risks (to arrive at a risk profile) and
abstract categories of actions (to arrive at an overall risk-strategy analysis
risk strategy). The risk profile is assessed along the
risk categories using a simple scale (e.g., high or The final form of approaches are risk-strategy
low), which makes it possible to classify a project as analyses. These approaches are similar to risk-
being in one of a few possible situations. For each strategy models in that they offer detailed as well
situation, the model then offers a dedicated risk as aggregate risk items and resolution actions,
strategy composed of several detailed resolution but they apply different heuristics. There is no
actions. Compared to the other types, risk-strategy model linking aggregate risk items to aggregate
models provide detailed as well as aggregate risk resolution actions. Instead, these approaches
items, and resolution actions. The heuristic for offer a stepwise analysis process through which
linking risk items to resolution actions is a con- the involved actors link risks to actions to de-
tingency table at the aggregate level. Risk-strategy velop an overall risk strategy. Compared to the
models are easy to use because of the simplifying risk-strategy models, there is a looser coupling
contingency model, but they are difficult to build between the aggregate risk items and aggregate
because the model must summarize multiple and resolution actions. In comparison, we find these
complex relationships between risks and actions. approaches more difficult to use because they
They also are difficult to modify except for minor require process facilitation skills. They are as
revisions of specific risk items or resolution ac- difficult to build as the risk-strategy models, but
tions that do not challenge the aggregate concepts they are easier to modify because of the loosely
and the model. Models like these help appreciate defined relationship between aggregate risk items
risks and identify relevant actions, and managers and resolution actions. Davis (1982) provides
can build an overall understanding of the risk such a stepwise approach to address information
profile they face (at the aggregate level) directly requirements risks where the overall level of risk
related to a strategy for addressing it (in terms of is assessed and then associated with four different
aggregate actions). strategies to cope with requirements uncertainty.


Building IT Risk Management Approaches

Mathiassen et al. (2000) offer a similar approach faced were about SPI and how SPI teams can
to develop a risk-based strategy for object-oriented manage risks. The practical setting in which we
analysis and design. addressed risk management was the SPI teams in
The comparative strengths and weaknesses the IT Department of Danske Bank (the largest
of these four risk approaches are summarized Danish bank). The purpose here was to improve
in Table 1. Comparing the list approaches and the SPI Teams’ handling of SPI-related risks.
the strategy approaches suggests that the former Within this area we applied and combined theories
are easier to use, build, and modify, whereas the and concepts about SPI and IT risk management.
latter provide stronger support for risk manage- The result of this cyclic process was double: an
ment. Comparing risk-strategy models and the approach to manage SPI risks in Danske Bank
risk-strategy analysis approaches suggests that and a generic method for developing risk manage-
the former are easier to use, but they require that ment approaches. The approach to manage SPI
a contingency model be developed. The latter are risks is presented in the section Managing SPI
easier to modify because they rely on a looser Risks, while the generic method for developing
coupling between aggregate risk items and resolu- tailored risk approaches is presented in the rest
tion actions. Organizations can use the insights of this section, based on the cyclic process of
in Table 1 to choose appropriate forms of IT risk action research.
management that are well suited to the particular Our method to developing risk management
challenges they want to address. approaches is illustrated in Table 2. It addresses a
particular area of concern and is supported by risk
management knowledge. The method provides
acTIon research an iterative approach to develop a tailored risk

Action research allows practitioners and research-


ers to interact with a real-world situation gaining
deep insights into how an organization functions
and how different interventions affect the organi- Table 2. Developing risk management ap-
zation. At the same time, it allows practitioners proaches
to reflect on their practice and gives them strong Initiating
tools to improve their current situation (Check- 1. A ppreciate problem situation
land, 1991; McKay & Marshall, 2001). Along
2. S tudy literature
similar lines, Schön (1983) refers to the reflective
practitioner that is informed by research, allow- 3. S elect risk approach
ing researchers sometimes to act as practitioners Iterating
and practitioners sometimes to act as researchers. 4. D evelop risk framework
We propose a modified action research approach, 5. D esign risk process
called collaborative practice research (CPR) that
6. A pply approach
is appropriate for developing risk management
methods by reflective practitioners or by collab- 7. E valuate experience
orative groups of practitioners and researchers Closing
(Iversen et al., 2004; Mathiassen, 2002). 8. E xit
At Danske Bank, the cyclic nature of action 9. A ssess usefulness
research combined theory and practice as follows.
10. Elicit research results
The research interest and practical problems we


Building IT Risk Management Approaches

management approach through application to a on specific risk items and resolution actions. The
real-world situation in a specific organizational risk approach is applied subsequently to specific
context, as shown in Table 2. situations or projects within the area of concern
The proposed method is based on the ten (activity 6). This leads to risks being managed
activities of a CPR process (cf. Table 2), and con- and to experiences using the new approach (ac-
sists of three phases: Initiating (activities 1 to 3), tivity 7).
Iterating (activities 4 to 7), and Closing (activities The iterating phase ends when the actors agree
8 to 10). The sequence between activities 4 and 5 that the risk management approach is developed
may not hold in practice, and only points to the sufficiently and the problems in the area of concern
logical dependencies between the activities. The are alleviated (activity 8). Whether the applications
sequence from 4 to 7 is based on the canonical of the risk management approach were useful in
problem-solving cycle (Susman & Evered, 1978). practice is assessed relative to the problem situa-
The iterating phase leads to risk management tion at hand (activity 9). A simple way to do this
within the area of concern. The closing phase is to ask the participants in the risk assessment if
produces a refined risk management approach, they found the risk management approach useful
together with an assessment of its usefulness. and to document whether risk management led to
The actors in this process enter the problem actions and improvements. The ways in which the
situation, bringing in prior experience and knowl- new risk management approach contributes to the
edge of the area of concern (activity 1). The ac- discipline in general are assessed relative to the
tors should: (1) have experience within the area; relevant body of knowledge (activity 10).
(2) perceive the situation as problematic; and (3) We suggest that this method can be used in
find out to what extent and in which way risk different contexts within information systems and
management would be beneficial. Part of this software engineering. In adopting the method,
activity is to assess whether these prerequisites actors are advised to consider specific criteria that
are met and to establish a project with goals and will help them achieve satisfactory relevance of the
plans to develop a tailored risk management outcome and sufficient rigor in the process. Actors
approach. Activity 1 leads to an appreciation of are, as described, advised to use the framework
the risk items and resolution actions perceived of IT risk management approaches in Table 1 to
to be important within the area of concern (SPI guide their design.
in our case). Activity 2 uses the relevant risk
management literature to complement activity
1 and leads to a comprehensive set of risk items case: rIsk manaGemenT
and resolution actions that are used in activity 4. aPProach In sPI
The type of risk approach is selected in activity
3 (cf. Table 1), based on the desired features of This section presents the action research project
the approach and the characteristics and needs of that forms the basis for this research. It explains
the organizational context. This choice defines the how we used the proposed method to develop a
basic structure of the risk management approach specific risk management approach and how this
to be developed. approach works.
Activity 4 aggregates the identified risk items
and resolution actions into a risk framework of case organization
the area of concern (see section Managing SPI
Risks). Then a risk process is developed in activ- This action research project was conducted at
ity 5. The process is based on the framework and Danske Bank’s IT Department, Danske Data,


Building IT Risk Management Approaches

Table 3. Action research performed by practitioners and researchers

Activities Initiating First iteration Second iteration Third iteration Fourth iteration Closing
(see Table 2) 10.97-12.97 01.98-02.98 03.98-08.98 09.98-11.98 11.98-02.99 02.99-02.00
1. Appreciate Part of on-
problem going research
situation collaboration
[p1-4; r1-4]
Brainstorm risk
items and
actions [p1-4;
r1-4]
2. Study Study SPI [p1-
literature 4; r1-4]
Study risk
management
[r1-2]
3. Select risk Synthesis [r1-3] Confirmed Appreciation of
approach selection [r1-3] actors’
competence
[r1-3]
4. Develop risk Synthesis [r1-3]
framework
Review of
framework of
risk items and
actions [r3]
Revised
framework [r1-
3]
5. Design risk List of risk Additional step Improved
process items and and items documentation
actions [r1-3] reformulated scheme [r1-3]
[r2-3]
Strategy sheets
[r1-3]
6. Apply Risk Risk Risk Risk
approaches assessment of assessment of assessment of assessment of
Quality Project Metrics Diffusion [p9-
Assurance Management Program 10; r4; r3]
[p5-7; r2-3] [p3-4; r1-2] [p2; p8; r3]
7. Evaluate Lessons learned Lessons learned Lessons learned Lessons learned
experience [p5-7; r2-3] [p3-4; r1-2] [p2; r3] [p9-10; r4; r3]
8. Exit Delay after 2nd Action part
iteration closed
9. Assess Assessment of Discussion of Assessment of
usefulness first two risk approach at Metrics and
projects [p1-4; CPR workshop Diffusion
p11; r1-4] [r1-r3] projects [p1-4;
r1-4]
10. Elicit Result and
research results lesson
elicitation [r1-
3]

00
Building IT Risk Management Approaches

which was spun into an independent company, action research Project


with Danske Bank as its primary customer. As
the IT department began as part of the bank’s The project was structured around four iterations,
accounting department, the traditional rigor of as described previously in Table 2. This section
banking procedures still pervaded the culture to describes in detail how each iteration was con-
some extent. This had diminished somewhat in ducted and what was learned. The effort involved
recent years as emerging technologies and the 10 practitioners and 4 researchers (3 of whom are
strategic role of IT to the bank’s business became the authors). Table 3 illustrates a timeline of the
increasingly important. four iterations and the involved actors and activi-
Danske Bank joined a larger CPR (Mathiassen, ties that took place in each. Most of the activities
2002) project in 1997 (Mathiassen et al., 2002), for this project took place between October 1997
aimed at implementing SPI projects in the par- and February 1999. Generally, the project was
ticipating organizations. Danske Data established carried out in an iterative fashion, where risks and
a software engineering process group (Fowler & actions were identified in a bottom-up fashion and
Rifkin, 1990) to manage and coordinate the SPI with practitioners and researchers collaborating
effort, which management clearly had articulated closely on developing and testing the approach.
was intended to improve productivity (Andersen, The project was initiated with a workshop
Krath et al., 2002). The action researchers joined that identified the risks and resolution actions
the SPI effort, along with a dedicated project that practitioners and researchers thought were
manager, a consultant from the Methodology the most important for SPI. When the workshop
Department, and two information systems man- was conducted, the SPI project had been on-going
agers. One of the first activities conducted was a for approximately one year, and both research-
maturity assessment to determine which areas to ers and practitioners had significant practical
target for improvement (Iversen et al., 1998). The experience with conducting SPI projects. Prior to
assessment identified seven improvement areas. the workshop, the practitioners worked through
Subsequently, action teams were established an existing SPI risk analysis approach (Statz et
to address each of these areas. As their work al., 1997), but found this approach too unwieldy
got underway, it became clear that there was a and not sufficiently relevant to Danske Data. At
need to manage the inherent risks in conducting the workshop, the researchers presented classi-
these organizational change projects. Danske cal approaches to IT risk management (Boehm,
Data called on the action researchers, who had 1991; Davis, 1982; McFarlan, 1981), after which
extensive experience with risk management, to the entire group conducted two brainstorms to
develop an approach to manage the risks faced determine risks and potential resolution actions
by each of the SPI action teams. To satisfy the that were relevant to SPI in Danske Data. Both
request, the action researchers embarked on the of the resulting lists were very long and detailed
project described here, which eventually led (31 risk items and 21 resolution actions), which
to development of the method described in the made them difficult to use. We obviously needed
previous section as well as the risk management more structure.
approach for SPI described briefly in the Manag- Following the workshop, the authors studied
ing SPI Risks section and more fully in Iversen the risk management literature and identified
et al. (2002, 2004). four types of approaches (Table 1). We chose to
adopt a risk-strategy analysis approach, inspired
by Davis (1982), for several reasons: We chose a
strategy approach over a list approach because the

0
Building IT Risk Management Approaches

practitioners explicitly stated that they wanted an was based on detailed lists of risk items and reso-
approach that could help them obtain an overall, lution actions for each of the four categories in
strategic understanding of each SPI project. We the framework, and designed similarly to Davis’
chose the risk-strategy analysis approach over (1982) risk management approach (Iversen et al.,
the risk-strategy model approach for two reasons. 2004). Finally, we designed strategy sheets and
First, the stepwise analysis approach would help simple scoring mechanisms to encourage a group
each SPI team obtain a shared, detailed under- of actors to engage in detailed risk and action as-
standing of risks and possible actions. Second, sessments as a means to arrive at an informed,
we were not confident that we would be able to strategic understanding of how to address risks.
develop a contingency model that would sum- To test the approach, we arranged a work-
marize the many different sources of risks and shop with the three practitioners responsible for
ways to address them in SPI. The action research improving quality assurance. We presented the
subsequently went through four full iterations risk framework and the process, but let the prac-
before closing. titioners themselves apply the process, assisting
only when they got stuck. The main experience
First Iteration was that the basic idea and structure of the ap-
proach was useful. However, during this first trial
Based on the lists of risk items and resolution session, we only had time to cover half of the
actions from the workshop and insights from risk areas. The practitioners suggested that the
the SPI literature, the authors synthesized the process needed to be facilitated and managed by
brainstorms and developed a prototype of the someone trained in the process, for example, the
risk management approach. A key challenge was researchers. The practitioners found it especially
developing a framework to understand risks and difficult to interpret the questions in the risk tables
actions (see Figure 1 and Table 4). We further in the context of their specific project. Some of
developed our initial classifications through a the risk items needed to be reworded. Finally, to
detailed examination of risk items and resolution ease the interpretation of the risk items, the ses-
actions mentioned in the SPI literature (Grady, sion should have started with an interpretation
1997; Humphrey, 1989; McFeeley, 1996; Statz et of the general terms in Figure 1 in the particular
al., 1997). The resulting risk management process SPI context.

Figure 1. Risk areas for SPI teams

improvement
area improvement
ideas
improvement
process

improvement
actors

0
Building IT Risk Management Approaches

Table 4. Risk resolution strategies for SPI teams

Type of action C oncern


1. Adjust Mission What are the goals of the initiative? Goals may be adjusted to be more or less
ambitious, e.g., targeting only projects developing software for a specific platform.
2. Modify Strategy What strategy is the initiative going to follow? Covers the approach to develop the
process as well as to roll it out in the organization. Roll-out may, for instance, follow
a pilot, big bang, or phased approach.
3. Mobilize From what alliances and energies can the initiative benefit? The likelihood of success
of an improvement initiative can be improved significantly by adjusting which
organizational units and actors are involved and by increasing their commitment.
4. Increase Knowledge On which knowledge of software processes and improvement is the initiative based?
Knowledge can be increased by educating team members, by including additional
expertise into the team, or by hiring consultants.
5. Reorganize How is the initiative organized, conducted, and managed? Covers organizing,
planning, monitoring, and evaluating of the initiative.

Second Iteration provided a comprehensive overview of risk items


and resolution actions. Many comments about the
In the second iteration, we reworded the risk detailed lists of risk items and resolution actions
items and introduced a first step in which the SPI led to subsequent modifications and rewording,
team should interpret the risk model in Figure 1 but the aggregate structure that we had created
in their particular context. Then we performed based on the initial brainstorm and a study of the
a risk analysis with the two SPI practitioners SPI literature was not changed.
responsible for improving project management. The quality assurance improvement project
Both practitioners were skilled project managers was not very active during that period. The
with experience in risk management. The session manager of the quality assurance project was not
included a complete risk analysis with identifica- present at the risk analysis session and had not yet
tion of key risks and resolution strategies. The devoted full attention to quality assurance. The
participating practitioners and researchers agreed other project members were, therefore, mainly in
upon the major lessons. First, the framework and a reactive mode, and little had happened. Risks
the process assisted even skilled project manag- surfaced during the analysis, but none of the
ers through a more disciplined analysis than they practitioners were able to resolve these risks in
usually would do on their own. Second, it would practice. From this, we learned that realizing a
be advantageous to document the interpretations risk and identifying a set of resolving actions do
of specific risk items and resolution actions con- not ensure that actions are or will be taken. The
tinuously throughout the workshop. practitioners that need to commit to the results
At subsequent meetings in the local research of a risk analysis session should be present and
group, the two risk management workshops were involved in the session. After 7 months, there
discussed and assessed in terms of which actions was no agreed-upon plan for the organizational
were taken later by the two SPI teams. Present implementation of quality assurance procedures.
at the meetings were the four SPI practitioners, After 10 months, the quality assurance project had
the three authors, and the fourth researcher. Both rolled out its procedures, but the identified risks
SPI teams found that the suggested framework

0
Building IT Risk Management Approaches

never were managed effectively and consequently including the traditional distinction between
impacted the initiative. consequences and probability of a risk into the
The project management improvement project, process. To keep the approach as simple as pos-
in contrast, had considerable activity. The main sible, we decided not to implement this idea.
risk was that project managers would not find the
improvement attractive and worth their effort. The Fourth Iteration
strategy was, therefore, directed at creating incen-
tives for the project managers. After 1 month, an For the fourth iteration, we made no changes,
appropriate incentive structure was in place. After and applied the approach to an improvement
5 months, the project manager education was a project responsible for improving diffusion and
huge success, and all project managers wanted to adoption practices (Tryde et al., 2002). The ses-
participate (Andersen, Arent et al., 2002). sion had three participants: two practitioners
from Danske Bank’s IT Department and the
Third Iteration fourth action researcher involved in this project.
All three found the approach generally useful.
We started the third iteration by appreciating They found the analysis of the risk areas and the
the lesson learned from the first two iterations: specific actions particularly useful, but they did
successful application of the risk management not find summarizing the strategies particularly
approach required participation of practitioners helpful. The participants emphasized the impor-
with sufficient authority to address key risks. By tance of not merely following the suggested lists
including these actors in the workshop, we ensure of risk items and resolution actions, but also of
that they agree with the outcome of the workshop, supplementing this with a more open-minded
and thereby increase the chances that the agreed- exploration. “We haven’t asked ourselves, ‘what
upon actions actually will be implemented. We can go wrong?’” said one participant. They merely
also introduced a new way to document the process had considered each risk separately as it was
directly onto transparencies and paper versions presented to them.
of the templates.
In the third iteration, we tested the changes Closing
on a project that was responsible for establishing
an organization-wide metrics program (Iversen We discussed and assessed the third and fourth risk
& Mathiassen, 2003). The new documentation analysis sessions with the four SPI practitioners
scheme made it easier for the participants to relate and the fourth researcher at a later meeting of the
risk questions to their particular situation. We local research group. The metrics program had
documented each risk in more detail by answer- suffered several setbacks due to political turmoil
ing the following question: “What are the specific when previously hidden data about software
issues that make this risk particularly important?” projects’ performance were publicized (Iversen &
As we progressed through the risk assessment, Mathiassen, 2003). Nevertheless, the risk analysis
this made it easier to determine why something session led to actions that the project took later.
had been given a specific characterization. The The two main actions decided at the risk manage-
session included a complete risk analysis. The ment session were: (1) develop and maintain top
practitioners found the identified actions useful management’s support and commitment and (2)
and relevant, and they emphasized the benefit of create immediate results that are perceived use-
having reached a shared, overall understanding ful by software projects. At a meeting 3 months
of risks and actions. The practitioners suggested later, it was reported that the project successfully

0
Building IT Risk Management Approaches

had convinced top management that the collected As an example, consider an SPI team concerned
metrics results should be publicized in all of Dan- with introducing configuration management in
ske Bank’s IT Department, which later happened software engineering projects. Here the improve-
(Iversen & Mathiassen, 2003). The diffusion and ment area includes the software development
adoption project was successful (Tryde et al., projects that will use configuration management
2002). Many of the performed activities came and the people supporting the process after insti-
out of the risk analysis. It was decided to exit the tutionalization. The improvement ideas include
iterations at this point because the experiences the configuration management principles relied
from the four iterations suggested that the risk upon by the SPI team and the tools and methods
management approach was in a stable and useful that are developed to support these principles.
form. Our final activity was eliciting lessons for The improvement process is the improvement
the overall action research endeavor (Iversen et itself, the way it is organized, and the involved
al., 2004). stakeholders. The improvement actors are the
members of the SPI team.
managing sPI risks The risk resolution actions that SPI teams can
apply are aggregated into five different types of
This section outlines the resulting risk analysis strategies, as shown in Table 4. The strategies are
approach. The method has been described in listed according to the degree of change we suggest
more detail in other published works (Iversen et the SPI team’s risk-based intervention will cause.
al., 2002, 2004). Adjust Mission, Modify Strategy, and Reorganize
The approach to managing SPI risks is based target the improvement project’s orientation and
on a framework that aggregates risk items into organization; Increase Knowledge targets the
areas and risk resolution actions into strategies. involved actors’ level of expertise and knowledge;
The first part of the framework describes the and Mobilize targets alliances and energies that
relevant SPI risk areas; the second part outlines will increase the project’s chance of success.
the potential SPI risk resolution strategies. The The mission of an SPI team on configuration
approach is intended to be applied to the risks management may be to introduce configuration
faced by individual SPI action teams. Figure 1 management on all documents (including docu-
illustrates the four different areas in which SPI mentation, code, etc.) in all software engineering
action teams might identify risks: projects in the company. This mission could be
adjusted to include fewer projects (perhaps only
• The improvement area: those parts of the large projects, critical projects, or projects in a
software organization that are affected by specific department) or to exclude certain types
the specific SPI initiative. of documents. The SPI team’s strategy might be
• The improvement ideas: the set of pro- to involve a few key developers to give input to
cesses, tools, and techniques that the SPI the process and, based on this, select a standard
initiative seeks to bring into use in the configuration management tool that every proj-
improvement area. ect then has to use. Modifying the strategy may
• The improvement process: the SPI initiative entail involving more (or fewer) developers or
itself and the way in which it is organized, implementing the chosen tool gradually in each
conducted, and managed. project. Mobilizing may involve establishing
• The improvement actors: those involved agreements with an existing method department,
in carrying out the SPI initiative. a production department, or other departments
or persons that have a vested interest in the

0
Building IT Risk Management Approaches

results of the team’s effort. The SPI team could method we have presented can be used for that
increase its knowledge by attending courses on purpose, and thereby adds to the portfolio of
configuration management or SPI, or by hiring approaches that are available to adapt generic
knowledgeable consultants. If the project is not insights to specific organizations. Similar methods
organized optimally for the task at hand, the ef- are, for example, available to tailor knowledge
fort could be reorganized, e.g., by establishing on software estimation to specific organizational
a formal project, negotiating a project contract contexts (Bailey & Basili, 1981).
with management and the software engineering The method builds on action research experi-
projects, or developing a new project plan. ences that can help organizations address IT-re-
To help SPI practitioners determine a strategy lated problems effectively in line with scientific
based on current risks facing the project, the ap- insights. Our own experiences using the method
proach offers a four-step process based on Davis indicate that a number of competencies are re-
(1982): quired to adopt the method effectively. First, we
had intensive domain (SPI) and risk management
1. Characterize Situation by interpreting the knowledge. Second, we had general competence in
profile and scope of the elements of Figure modeling organizational phenomena that we used
1. to identify and classify risk items and resolution
2. Analyze Risks to assess where the most actions. Third, we had experimental competence
serious risks are. This involves rating each that we used to collect feedback from the test
of the detailed risk items in the risk lists for situations to iteratively arrive at the resulting ap-
the four areas, and then determining which proach. Each of these competencies is required to
area carries the highest risk exposure. apply the proposed CPR method in other contexts.
3. Prioritize Actions to decide on a strategy It is also important to stress that the method, like
that will deal effectively with the identi- most action research processes, is a template that
fied risks. Here, actors use a process that needs to be adapted and supplemented in action,
alternates between individual and group depending on the conditions under which it is
judgments to determine which strategy is applied.
the most sensible given the current assess- In addition to being useful in a specific or-
ment of risks facing the project. ganizational context, the CPR method can help
4. Take Action by revising project plans to tailor risk management approaches to new do-
reflect resolution actions. mains within information systems and software
engineering, for example, business process in-
novation, integration of information services, and
conclusIon ERP implementation. Any form of organizational
change enabled by IT is complex and difficult.
IT managers see risk management as a key to Risk management, as illustrated well in relation
success (Barki et al., 1993). Such approaches to software development and SPI, is a highly ef-
help appreciate many aspects of a project: they fective way to bring relevant knowledge within
emphasize potential causes of failure, they help a particular organization or domain into a form
identify possible actions, and they facilitate a in which it can support and improve professional
shared perception of the project among its partici- practices. We, therefore, encourage researchers
pants (Lyytinen et al., 1996, 1998). This indicates and practitioners within information systems and
that organizations can benefit from adopting IT software engineering to adopt action research to
risk management to their particular needs. The

0
Building IT Risk Management Approaches

tailor risk management to specific organizations From principles to practice (pp. 83-98). Upper
and new domains. Saddle River, NJ: Addison-Wesley.
We conclude this chapter with good advice
Bailey, W., & Basili, V. R. (1981, March 9-12).
to those who wish to create a risk management
Meta-model for software development expendi-
approach for their organization:
tures. Proceedings of the 5t h International Confer-
ence on Software Engineering, San Diego, CA.
• Make sure practitioners are able to relate
wording of risks and resolutions to their Barki, H., Rivard, S., & Talbot, J. (1993). Toward
project. an assessment of software development risk.
• Be aware of whether the approach needs to Journal of Management Information Systems,
be facilitated. For practitioners to apply the 10(2), 203-225.
approach on their own, it must be simple
Boehm, B. W. (1991). Software risk manage-
or well documented and supplemented by
ment: Principles and practices. IEEE Software,
training.
8(1), 32-41.
• Build in documentation of rationales along
the way (what was it about a certain risk Checkland, P. (1991). From framework through
that made it particularly evident in this experience to learning: The essential nature of
project?). action research. In H.-E. Nissen, H. K. Klein, &
• Include mechanisms to ensure action. It is R. A. Hirschheim (Eds.), Information systems
not enough to create a risk resolution plan research: Contemporary approaches and emer-
— the project also needs to carry it out. gent traditions (pp. 397-403). North-Holland:
• Iterate until the approach is stable. Then keep Elsevier.
updating risks and actions to stay current
Chrissis, M. B., Konrad, M., & Shrum, S. (2003).
with changes in the context as well as in the
CMMI: Guidelines for process integration and
literature.
product improvement. Boston: Addison-Wesley
Professional.
references Davis, G. B. (1982). Strategies for information
requirements determination. IBM Systems Jour-
Alter, S., & Ginzberg, M. (1978). Managing uncer- nal, 21(1), 4-30.
tainty in mis implementation. Sloan Management
Donaldson, S. E., & Siegel, S. G. (2001). Success-
Review, 20(1), 23-31.
ful software development. Upper Saddle River,
Andersen, C. V., Arent, J., Bang, S., & Iversen, J. NJ: Prentice Hall.
H. (2002). Project assessments. In L. Mathiassen,
Grady, R. B. (1997). Successful software process
J. Pries-Heje, & O. Ngwenyama (Eds.), Improv-
improvement. Upper Saddle River, NJ: Prentice
ing software organizations: From principles to
Hall PTR.
practice (pp. 167-184). Upper Saddle River, NJ:
Addison-Wesley. Humphrey, W. S. (1989). Managing the software
process. Pittsburgh, PA: Addison-Wesley.
Andersen, C. V., Krath, F., Krukow, L., Mathias-
sen, L., & Pries-Heje, J. (2002). The grassroots Iversen, J., Johansen, J., Nielsen, P. A., & Pries-
effort. In L. Mathiassen, J. Pries-Heje, & O. Ngwe- Heje, J. (1998, June 4-6). Combining quantitative
nyama (Eds.), Improving software organizations: and qualitative assessment methods in software

0
Building IT Risk Management Approaches

process improvement. Proceedings of the Euro- Mathiassen, L., Pries-Heje, J., & Ngwenyama, O.
pean Conference on Information Systems (ECIS (Eds.). (2002). Improving software organizations:
98), Aix-en-Provence, France. From principles to practice. Upper Saddle River,
NJ: Addison-Wesley.
Iversen, J. H., & Mathiassen, L. (2003). Cultivation
and engineering of a software metrics program. McFarlan, F. W. (1981). Portfolio approach to
Information Systems Journal, 13(1), 3-20. information systems. Harvard Business Review,
59(5), 142-150.
Iversen, J. H., Mathiassen, L., & Nielsen, P. A.
(2002). Risk management in process action teams. McFeeley, B. (1996). Ideal: A user’s guide for
In L. Mathiassen, J. Pries-Heje, & O. Ngwenyama software process improvement (Tech. Rep. No.
(Eds.), Improving software organizations: From CMU/SEI-96-HB-001). Pittsburgh, PA: Software
principles to practice (pp. 273-286). Upper Saddle Engineering Institute.
River, NJ: Addison-Wesley.
McKay, J., & Marshall, P. (2001). The dual impera-
Iversen, J. H., Mathiassen, L., & Nielsen, P. A. tives of action research. Information Technology
(2004). Managing risks in software process im- and People, 14(1), 46-59.
provement: An action research approach. MIS
Moynihan, T. (1996). An inventory of personal
Quarterly, 28(3), 395-433.
constructs for information systems project risk
Jones, C. (1994). Assessment and control of researchers. Journal of Information Technology,
software risks. Upper Saddle River, NJ: Yourdon 11, 359-371.
Press, Prentice Hall.
Ould, M. (1999). Managing software quality and
Keil, M., Cule, P. E., Lyytinen, K., & Schmidt, business risk. Chichester, UK: Wiley.
R. C. (1998). A framework for identifying soft-
Paulk, M. C., Weber, C. V., Garcia, S. M., & Chris-
ware project risks. Communications of the ACM,
sis, M. B. (1993). The capability maturity model:
41(11), 76-83.
Guidelines for improving the software process.
Lyytinen, K., Mathiassen, L., & Ropponen, J. Upper Saddle River, NJ: Addison-Wesley.
(1996). A framework for software risk manage-
Ropponen, J., & Lyytinen, K. (2000). Components
ment. Scandinavian Journal of Information
of software development risk: How to address
Systems, 8(1), 53-68.
them? A project manager survey. IEEE Transac-
Lyytinen, K., Mathiassen, L., & Ropponen, J. tions on Software Development, 26(2), 98-112.
(1998). Attention shaping and software risk: A
Schön, D. A. (1983). The reflective practitioner.
categorical analysis of four classical risk manage-
How professionals think in action. New York:
ment approaches. Information System Research,
Basic Books.
9(3), 233-255.
Statz, J., Oxley, D., & O’Toole, P. (1997). Iden-
Mathiassen, L. (2002). Collaborative practice
tifying and managing risks for software process
research. Information Technology and People,
improvement. Crosstalk - The Journal of Defense
15(4), 321-345.
Software Engineering, 10(4), 13-18.
Mathiassen, L., Munk-Madsen, A., Nielsen, P. A.,
Susman, G. I., & Evered, R. D. (1978). An assess-
& Stage, J. (2000). Object-oriented analysis and
ment of the scientific merits of action research.
design. Aalborg, Denmark: Marko.
Administrative Science Quarterly, 23, 582-603.

0
Building IT Risk Management Approaches

Tryde, S., Nielsen, A.-D., & Pries-Heje, J. (2002).


Implementing SPI: An organizational approach.
In L. Mathiassen, J. Pries-Heje, & O. Ngwenyama
(Eds.), Improving software organizations: From
principles to practice (pp. 257-271). Upper Saddle
River, NJ: Addison-Wesley.

This work was previously published in Measuring Information Systems Delivery Quality, edited by E. W. Duggan and J. Reich-
gelt, pp. 244-264, copyright 2006 by IGI Publishing, formerly known as Idea Group Publishing (an imprint of IGI Global).

0

You might also like