Professional Documents
Culture Documents
• Risk avoider
• Risk neutral Risk Neutral
REWARD
adverse profile
• Risk taker
GO
Risk taker
NO GO
RISK
Consider the following propositions
Scenario 1
a. ) £800 for
sure or
Scenario 2
loss) or
0.8
-£0 with
probability 0.2
The Framing Effect (Kahneman & Tversky 1979)
Scenario 1 Scenario 2
£800 for sure -£800 for sure (i.e. loss)
Most choose the sure thing, Most choose the gamble, despite
despite them being formally them being formally identical
identical (EV=800). (EV=800).
Implications include:
• The way problems are framed matters
• Response in the domain of losses is more extreme
• Leads to systematic biases:
▫ Risk seeking when framed in domain of
losses
▫ Risk averse when framed in domain of gains
• People value things more once they 'own' them.
This presents real problems for risk models for
decision making that try to use monetary value to
make social and environmental decisions.
Heuristics (A rule of thumb)
Availability Heuristic
•Ease of recall
• Retrievability (ease of imagination)
•Presumed associations (illusionary correlation)
Representativeness Heuristic
• Insensitivity to base rates
• Insensitivity to sample size
• Misconceptions of chance
• Regression to mean
•Conjunction fallacy
Anchorage and
Adjustment
• Insufficient adjustment
for anchor
• Conjunctive and
disjunctive events bias
• Over-confidence
How to Prevent Biases (Bazerman 2002)
Identify risks
Analyse risks
Evaluate risks
Implement Plan
Step 1: Establish the Context
The Macro
Environmen
PEST Framework t
Industry
Organisation
The Project
PEST
User Temporar
Team Members Contracts
Requirements y
Activities
Roles and
Ineffective Project
Your Appointment Penalties Responsibilities
Manager
Unclear
Step 2: Identify Risks
Risk Identification Methods ISO
31000
• Brain storming
Team • Workshops
Based
• Flow charting
Structured • System design review
• Hazard and Operability (HAZOP) studies
• What if analysis
General • Scenario Analysis
Poor Good
For example:
• Threats with Financial Consequences
• Threats with Physical Consequences
• Threats with Intellectual Property Consequences
• Threats with Societal Consequences
and opportunities…..
Step 3: Analyse Risks
Reference The risk What can How can it What can Existing Analysis Evaluation
happen happen? happen Controls
(The Risk) (consequ- Likelihood Consequ- Level of Priority
ence) ence Risk
Ex c e p t io n s S t a t e m e
nt
? ? ? e x a m p le
L EG EN D 1
T h e f o llo w in g c o lo u r s a r e u s e d t o d e t a il r is k
L L iv e c a t e g o r ie s : Ex tr e m e >=350
E E m e r g in g V e r y H ig h 350-200
P Pa r ke d H ig h 200-70
C C lo s e d M o d e r a te 70-30
T Th rea t Low 4-30
O O p p o r t u n it y N e g lig ib le 1-3
likelihood of an event
e.g. highly likely project delay of 2 weeks
RISK
the consequence
e.g. liquidated damages of $50,000
Step 3: Analyse Risks
Semi- Quantitative Likelihood Example:
Level Descriptor Example detail description
A Almost Certain Is expected to occur in most circumstances
Substantial Several Sustained Permanent Commission Unable to use + $1M Years 100
Fatalities National Ecological of Inquiry
Media Cover Damage
to localised
area
Minor Minor Injuries Brief Local Limited but Official Shortfall in + $1K to Days 10
Media Cover Medium-term Information functionality $10K
Negative Request to localised
Effects area
Slight loss in
quality to
whole project
B
Possible L M H E E
C
Unlikely L L M H E
D
Rare L L M H H
E
MITIGAT
Key
E: Extreme E
risk H: High
risk
M: Moderate
Step 4: Evaluate Risks
Risk Evaluation using a Risk
Register
Project My project Compiled by G Miller Date xxxx
Analyse Risk
Evaluat
e Risk
Risks to
Evaluate Options
be treated Identify Options Risk
Do they satisfy
& risk Develop/design Treatmen
treatment objectives?
treatment treatment t Plan
Are they cost beneficial?
objectives options
Residual
Risk
Source: Companion to
Combined Risk Register /
Risk
Treatment
Project Plan Compiled by Date
Refer- The risk What How can What Existing Analysis Evaluat- Treatment
ence can it can Controls ion
happen happen? happen
(The (conseq Likeli- Conseq Level of Priority
Risk) u-ence) hood u-ence Risk
Simple Approach:
Add Risk Treatment Column to your Risk
Register
Separate Risk Treatment Schedule
Project Compiled by Date
Risk (in priority Possible Preferred Result of Cost- Person Timetable for How will this
order) Treatment Option Benefit Responsible for Implementation risk and the
Options Analysis Implementation treatment be
monitored
Source: Companion to
Risk Treatment Plan: Example
AP PEND IX 3: S AM PLE RISK T REAT M ENT PLAN
A ctivity A nalys ts Name(s)
Contrac t No. Review ers Name(s)
Date Sources of Inf ormation
No. Name Threat or Treatment Treatment Monitoring & Treatment Risk Reduction
Opportunity Type Progress Treatment A ctions Res ponsibility Timing Resources Reporting Cos t
3 days w ork f or 1
Unf oreseen ground 1.1 Complete additional logged bores boring rig f rom
1 conditions under piles Threat Minimise F Dagg XY Z- 15,000 n/a
Completed at ev er y s ec ond pile loc ation by 30 Mar'04 Tes ting Ltd.
Summary
Action Plan
1. Proposed Actions
2. Resource Requirements
3. Responsibility
4. Timing
Source: Companion to
Putting it all together
Typical Risk Schedules /
Documents A P P E N D IX 2 : S A M P L E R IS K R E G I S T E R
A c t iv it y A n a ly s t s N a m e ( s )
C o n tra c t No. R e v ie w e r s N a m e ( s )
Da te S o u r c e s o f I n f o r m a t io n
No. Nam e D e s c r ip t io n S ta tu s Th re at o r Co n s e q u e nc e L i k e l ih o o d
E x is t in g O p p o r t u n it y C o n t r o ls S c o r e D e s c r ip t io n
R a t in g ( C) D e s c r ip t io n R a t in g ( L ) = C x L 1
e .g
Un f ore s ee n g ro un d I n s u f f ic ie n t b e a r in g c a p a c it y i s a c h ie v e d o n t h e
1 d r ivci no gn d it
o io
f nt hs e u np dilee sr p i le s u nd e r th e X Y Z p ie r , w h i c h r e q u ir e s le n g t h e n in g o f L T n/a $2M - S e v e re 70 L i k e ly 5 350
p ile s 1 t o 1 6 .
A u n iq u e A s h o r t d e s c r ip t iv e D e t a il t h e s p e c if ic e v e n t t h a t D e t a ils e x is t in g p r o c e s s e s , T h e ou tco m e of T h e e x t e n t t o w h ic h a n
id e n t if y in g n u m b e r t it le is le a d in g t o u n c e r t a in t y d e v ic e s , p r a c t ic e s o r t hv ee n t .
e e v e n t is l ik e ly t o
in a c t iv it y o u t c o m e c o n t r o ls t h a t a c t t o oc c u r.
m
t h in
r ei m
a tiss e o r e n h a n c e
o p p o r t u n it ie s , in c lu d in g a n
in d ic a t io n o f h o w
t h e y m ig h t b e o f
in f lu e n c e .
Risk Register
Significant Risk
Reports
The Risk
Cycle risk management is not 1-off exercise:
Remember
opportunities disturbances
(threats and hazards)
collect signals
respond
filter out noise
develop a risk
control strategy collate information
Additional Texts
• Bowden, Lane, Martin, (2001), Triple Bottom Line Risk
Management,
• Bazerman, M. (2002), Judgement in Managerial Decision
Making, 5th Edition, John Wiley & Sons
Questions ?